Report: China the source of RSA hack, hundreds of others also hit
Connecting state and local government leaders
GSA and the IRS, along with many large companies and other organizations, reportedly were hit in attacks emanating from command-and-control servers in China.
Evidence presented to Congress reportedly points to China as the source of the hack of RSA Security in March and identifies 760 companies, government agencies and other organizations that may have been hit by the same operation.
Security blogger Brian Krebbs, citing information he said was presented to congressional staffers, notes that of the more than 300 command-and-control networks used in the attacks, 299 are located in or around Beijing.
He also provides the list of organizations that were apparently compromised by parts of the same control infrastructure used to attack RSA, while noting that there are no details on how many networks in each organization were attacked, how successful any of those attacks were, or whether some of the organizations, such as ISPs, were linked incidentally.
Related coverage:
RSA: Nation-state was behind SecurID hack
RSA confirms its tokens used in Lockheed hack
The list includes the General Services Administration, IRS, Homeland Security Department, several universities and major IT companies, such as Cisco Facebook, Google, IBM, Intel, Northrop Grumman, Research in Motion and Verisign.
The hack against RSA netted information about the company’s SecurID two-factor authentication tokens that was used in a failed attempt to hack defense contractor Lockheed Martin.
At the company’s conference in London earlier this month, RSA’s Executive Chairman Art Coviello said the attacks “could only have been perpetrated by a nation-state," because of the level of skill and resources required, but said RSA had not been able to identify the country.
The initial attack was an Advanced Persistent Threat that targeted information about SecurID, the company has said. Attackers used phishing techniques on RSA employees to get them to click on a link that delivered a zero-day exploit.
Coviello said there were two groups of hackers working in tandem.
Until now, there hadn’t been mention of so many other organizations being hit by the same group, although speculation about China’s involvement isn’t new. In August, Joe Stewart, director of malware research for Dell SecureWorks, told Computerworld that he had traced the command-and-control servers used for the RSA attack to networks in Beijing and Shanghai.
However, the location of servers doesn’t necessarily indicate the source of the attacks. As Stewart told Computerworld, “This gives us the where, but not the who."