Other

RSA SecurID Seed Value Theft (40M Tokens Compromised)

πŸ“… 2011-03-01 🏒 RSA SecurID (two-factor authentication tokens); Adobe Flash πŸ”Ž CVE-2011-0609
Primary Source β†—

Incident Details

In March 2011, RSA Security (division of EMC) suffered a breach when a spear-phishing email titled ‘2011 Recruitment Plan’ was opened by an employee. The Excel attachment exploited CVE-2011-0609, an Adobe Flash zero-day, to install a Poison Ivy RAT backdoor. The attackers (believed to be Chinese state-sponsored, attributed to Comment Panda/APT1) used the RAT to pivot through RSA’s network and ultimately exfiltrate the SecurID token seed database β€” the master secret values used to generate TOTP codes for approximately 40 million RSA SecurID hardware tokens. This effectively compromised the security of any two-factor authentication system depending on RSA SecurID. In May-June 2011, attackers used the stolen seed data to conduct a follow-on attack against Lockheed Martin, the US defense contractor β€” attempting to breach classified systems by generating valid RSA SecurID OTP codes. The attack was ultimately unsuccessful at Lockheed. RSA offered token replacements to all customers and eventually replaced or upgraded 40 million tokens. This breach is historically significant as one of the first known attacks targeting a security vendor’s core product secrets as a stepping stone to attacking downstream targets β€” a proto-supply chain attack. EMC (RSA’s parent) estimated breach-related costs of $66.3 million.

Technical Details

Initial Attack Vector
Spear-phishing email with an Excel spreadsheet exploiting an Adobe Flash zero-day (CVE-2011-0609) was opened by an RSA employee; the embedded malware installed a backdoor enabling attackers to extract the SecurID token seed database
Vendor / Product
RSA SecurID (two-factor authentication tokens); Adobe Flash
CVE / GHSA References
CVE-2011-0609

Timeline

  1. 2011-03-01 Breach occurred
  2. 2011-03-17 Publicly disclosed
  3. 2011-03-17 Customers notified