Hackers of RSA scalp 760 businesses

Powered by SC Magazine
 

Aussies telcos names

At least 760 organisations potentially including Australian businesses appear to have been victims of the same attacks that compromised RSA’s SecurID authentication system earlier this year.

The names appear on a list of victim machines that had phoned home to command and control servers used in the March attacks on RSA.

The list was shared by information professionals to US Congress and published by KrebsonSecurity.

It includes security companies including Verizon Australia, eBay, Motorola, IBM, McAfee and VMWare.

Australian telcos Telstra, iiNet, AAPT, TPG, and Macquarie Telecom also appeared on the list but likely because subscribers, not the organisations, were compromised.

A whopping 300 of the 339 command and control servers identified in the attacks were located in China, according to the analysis.

Details of the attack on RSA were not publicly known. Director Art Conviello said last month only that the company was hit with a sophisticated two-pronged attack.

RSA said it lacked the evidence to determine the culprit of the attacks but controversially maintained the compromised SecurID token system did not result in customer data loss.

“There has been no successful attacks with the information and only one incident where the information taken was used in an attack,” Conviello said.

 

Copyright © SC Magazine, Australia


Hackers of RSA scalp 760 businesses
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1082

Vote