- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
IDG News Service - The hackers who broke into EMC's RSA Security division last March used the same attack code to try to break into several other companies, including two U.S. national security organizations, according to data provided by the VirusTotal website.
"According to our data, RSA was just one of the targets," said Bernardo Quintero, the founder of malware analysis site VirusTotal. Attackers "used the same malware to try to penetrate other networks," he said in an email interview.
VirusTotal is a popular site with security professionals who use it to get a quick industry consensus take on suspicious files. It runs any file through a battery of antivirus scanning engines and spits out a report within minutes. Someone at EMC used the service on March 19 to analyze an email message that contained that spearphishing attack that was used to break into RSA.
But according to Quintero, before the attack was publicly disclosed in mid-March, the same maliciously encoded Excel spreadsheet had already been uploaded to VirusTotal 16 times from 15 different sources. The first was on March 4 -- the day after the message was sent to RSA -- and the malware was detected by none of the site's 42 antivirus engines.
Because it relies on anonymous submissions, VirusTotal won't say who uploaded the documents. But according to Quintero's analysis, two of the targets were entities related to U.S. national security.
Buried in the metadata of the attack files is another clue: a sign that whoever created the attack used a Chinese language version of Excel -- Windows Simplified Chinese (PRC, Singapore). The attackers could have deliberately changed the file's settings to make it look like it came from China, but Quintero believes it "was a simple oversight" on the part of the hackers.
It would be natural for the person who wrote the RSA attack code to try to use it as much as possible before it was discovered and patched. Here the code was embedded in Excel documents, but the flaw it exploited when the documents were opened actually lay in Adobe's Flash Player.
Adobe learned of the issue on March 9, when a "partner in the security community" noticed the attack code at an undisclosed customer site, said Weibke Lips, an Adobe spokeswoman. Before Adobe released its first advisory, a second customer -- not RSA -- reported the attack, Lips said.
The RSA hackers broke in using a basic social engineering attack. They sent an email that looked like it came from an RSA partner, online recruiting firm Beyond.com, with the simple message, "I forward this file to you for review. Please open and view it." That file was named 2011 Recruitment plan.xls. Quintero says that a second file name -- survey-questions_2011.xls -- was also used by the hackers.
In a post written shortly after the Adobe flaw was first disclosed, the Contagio Malware Dump blog listed four different Excel files that were being used in attacks, including a Nuclear Radiation Exposure And Vulnerability Matrix.xls file that was doctored to look as though it came from the U.S. Nuclear Regulatory Commission.