RSA SecurID Breach: Spear Phishing Email Blamed

In spite of a surfeit of security technologies that it develops to detect fraud and malicious activity on networks in real-time, it seems that security firm RSA was unable to detect a targeted phishing attack last month before attackers took information related to the company’s SecurID authentication products. Over two weeks after informing its channel […]

Apr 4, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In spite of a surfeit of security technologies that it develops to detect fraud and malicious activity on networks in real-time, it seems that security firm RSA was unable to detect a targeted phishing attack last month before attackers took information related to the company’s SecurID authentication products. Over two weeks after informing its channel and customer base about the incident that put SecurID deployments at risk, RSA, the security division of EMC, finally disclosed in an analyst briefing and a blog late on Friday some details as to how the company was compromised, foreshadowing an acquisition announcement today of forensics firm NetWitness, which provided tools that detected the breach.

According to Uri Rivner, head of new technologies and consumer identity protection at RSA, the attacker struck by sending two specially crafted phishing emails over a two-day period to two small groups of employees that Rivner said were not necessarily high value targets.

"The email was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached excel file," Rivner explained.  "It was a spreadsheet titled ‘2011 Recruitment plan.xls.’ The spreadsheet contained a zero-day exploit that installs a backdoor through an Adobe Flash vulnerability."

From there, the attacker installed a tool on the infected machine that enabled remote administration and started digging deeper into the network. RSA offered a ton of credit to NetWitness on Friday for offering the tools critical to the detection. It seems the props offered by the firm and perhaps the description of attack details may have been a very calculated lead in to the announcement of EMC’s decision to acquire NetWitness and merge it with RSA. The announcement went over the wire this morning, but EMC says the deal closed on Friday.

Commenting on the breach details following the analyst briefing on Friday, Gartner analyst Avivah Litan says that RSA’s quick disclosure of the breach is commendable as was its spotting of the threat that struck the company. However, she believes RSA should have been able to use the tools and techniques it sells to customers to discover the threat before it stole information.

"(The people at) RSA (didn’t) eat their own dog food. RSA sells its own fraud detection systems based on user and account profiling which use statistical Beysian models, and rules, to spot abnormal behavior and intervene in real time to re-authenticate users and verify the authenticity of suspect access, behavior, or transactions," Litan explains. "They should have applied these techniques to their own internal systems. They need to stay innovative and apply the lessons learned from serving their clients to their own internal enterprise systems. The old adage rings true – the shoemaker’s children have no shoes."

While RSA has made a step towards better transparency about how it was struck, the firm has still not disclosed the details for which many customers and channel partners have been clamoring: information about what exactly was stolen. At the moment, the industry is still left speculating about how much of the SecurID infrastructure intel is floating around.

 

Recommended for you...

Galactic Advisors Wins Credential-Free Assessment Patent

Galactic Advisors patents a user-activated, credential-free pen testing tool, boosting MSP security with risk-free, forensic-grade assessments.

Jordan Smith
Aug 6, 2025
Shadow AI Meets Its Match in SentinelOne’s Latest Move

SentinelOne acquires Prompt Security to secure GenAI use, adding real-time visibility, control, and protection across AI tools and enterprise systems.

Frank Vitagliano on GTDC Research & Future of Platforms

GTDC CEO Frank Vitagliano shares insights on vendor onboarding, distribution’s evolving role, and platforms shaping the IT channel’s future.

Cloudbrink Adds Native ID Management, Crowdstrike Integration

Cloudbrink expands Personal SASE with identity services and Crowdstrike integration, unifying user and device security for zero-trust access control.

Jordan Smith
Aug 5, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.