Blog article
See all stories »

An article relating to this blog post on Finextra:

RSA hacked: SecurID two factor authentication data leaked

RSA has warned customers of a security breach that may have compromised its SecurID two-factor authentication system, which is widely used by banks around the world to protect their internal and custo...


See article

What to do about the SecurID hack?

 

RSA's public response to the compromise of its famous SecurID One Time Password is curious.  On the one hand, it's admirable to have disclosed that they've been 'hacked'; on the other hand, their public releases have been short on details, and some corporate customers who have enjoyed private briefings say they're none the wiser.

By way of countermeasures, so far RSA has provided only vanilla security advice, like monitor unauthorised access and maintain strong security policy.

I haven't used SecurID for many years but I had two of them for a while in the early '00s, one for logging on to a corporate VPN and the other for Internet banking. I recall it was standard practice at the time to have a static password (and user name) as well as the OTP. Is that still the case?

If so, then the first response by any corporate to this compromise is surely to have all SecurID users change their static passwords. If attackers have the master keys to SecurID, they still shouldn't be able to take over user accounts without also knowing the static passwords. 

For VPNs and internal corporate users, I would also suspend remote access to as many non-critical accounts as possible, and monitor them for unauthorised usage.

 

4452

Comments: (1)

Stephen Wilson
Stephen Wilson - Lockstep Consulting - Sydney 21 March, 2011, 22:02Be the first to give this comment the thumbs up 0 likes

Stop press: SecurID's inventor Kenneth Weiss confirmed that a successful attack on any one SecurID urser's account will require knowledge of the "PIN" (static password) as well.  The PINs I believe are managed by each SecurID corporate customer (on their ACE Server) so RSA themselves don't know the PINs.

It's a good defence-in-depth solution. It seems to me that the actual threat enabled by the SecurID hack is well and truly manageable if end users change to a sound static password, and if corporate security managers review the integrity of their ACE servers.

 

Now hiring