Last Updated on June 2, 2011
Hard Times to come for U.S. Defense Contractors: it looks like each new day reveals information of a new cyber-attack to military technology companies using (alleged) compromised SecureID seeds.
This time Fox News reports that Northrop Grumman, another Defense Contractor has been the victims of a Cyber Attack, on On May 26, when the company shut down remote access to its network without warning, catching even senior managers by surprise and leading to speculation that a similar breach had occurred.
Even if there is no evidence so far that the cyber attack could be the consequence of the RSA Breach on March, there are at least two strange coincidences: the fact that this is the third attack to a U.S. Defense Contractor unleashed in less than a week (after Lockheed Martin and L-3), and the fact that Northrop Grumman is an RSA SecureID customer.
If the attack should be confirmed to have been carryed out by mean of compromised seeds, this would undoubtely confirm the RSA Breach was only the first stage of a (vertical) cyber-operation targeted to steal U.S. Military secretes (at this point I would not be surprised if other institutions belonging to different verticals are already under attack without realizing it).
Probably, as David Cenciotti said in a post of ysterday, it is time to rethink Strong Authentication: “something you know and something you have” is revealing to be a too weak paradigm if compared with the strenghts of Ciberweapons (because we are talking of Cyberweapons) who have shown to be capable to subtract any kind of data, sometimes leveraging users’ naivety with old-school techniques).
Morevoer also the users should be educated to face the new shape of cyberwar phishing if it is true, as it supposed to have happened in case of Lockheed Martin, that phishing techniques were used to map users to their token.
Biometrics Reloaded?
Related articles
- Top Defense Tech FirmStruck by Cyberattackers (foxnews.com)
- Some Random Thoughts On RSA Breach (paulsparrows.wordpress.com)
- (IN)SecureID (paulsparrows.wordpress.com)
Pingback: Exclusive Infographic: all Cyber Attacks on Military Aviation and Aerospace Industry « The Aviationist
Pingback: One Year Of Lulz (Part I) « Il Blog di Paolo Passeri
Pingback: Finally I Saw One! « Il Blog di Paolo Passeri
Pingback: Antisec hacks another Defense Contractor? « Il Blog di Paolo Passeri
Pingback: The Two Faces of Hacking « Il Blog di Paolo Passeri
Pingback: The Mother Of All Breaches « Il Blog di Paolo Passeri
Pingback: Another One Bytes The Dump « Il Blog di Paolo Passeri
Pingback: 2011 CyberAttacks Timeline « Il Blog di Paolo Passeri
Pingback: Seeds For Free « Il Blog di Paolo Passeri
Pingback: Seeds On Sale? « Il Blog di Paolo Passeri