[HN Gopher] The Full Story of the Stunning RSA Hack Can Finally ...
       ___________________________________________________________________
        
       The Full Story of the Stunning RSA Hack Can Finally Be Told
        
       Author : whiteyford
       Score  : 101 points
       Date   : 2021-05-20 13:38 UTC (9 hours ago)
        
 (HTM) web link (www.wired.com)
 (TXT) w3m dump (www.wired.com)
        
       | neilv wrote:
       | > _Now, staring at the network logs on his screen, it looked to
       | Leetham like these keys to RSA's global kingdom had already been
       | stolen._
       | 
       | That must've been a sickening feeling.
        
       | tptacek wrote:
       | Since when were NDAs routinely limited to 10 years?
        
         | ianhawes wrote:
         | My thoughts exactly. I'm curious if these people _thought_
         | their NDAs expired after 10 years.
        
         | eganist wrote:
         | > Since when were NDAs routinely limited to 10 years?
         | 
         | I'm not seeing an indication that it was routine, just that all
         | the people involved happened to have 10 year NDAs in place.
         | Might've been RSA-specific, potentially as a consequence of the
         | breach or just an artifact of RSA's own policies; it's not
         | actually mentioned. I'm also only familiar with 5 year NDAs.
        
           | tptacek wrote:
           | I just went through all the Confidentiality agreements I
           | could find in my mail spool and none of them had an explicit
           | time limit. Is it normal for people to have 5-year NDAs, or
           | even 10-years, for company secrets? How does that make sense?
           | One of the main characters in this story had a tenure at RSA
           | that exceeded 10 years.
        
             | dadrian wrote:
             | It's standard-ish to be able to request a 10-year NDA for
             | anything that your not part of / on your way out, e.g. I
             | know people that have them for severance / mutual non-
             | disparagement packages.
        
             | eganist wrote:
             | I've got an equal mix of 5 year and unrestricted NDAs, no
             | 10 year NDAs, oddly enough.
        
             | idlewords wrote:
             | Could it be a matter of state law?
        
       | eganist wrote:
       | If anyone else is wondering as to why there's so much human drama
       | written in what should otherwise probably have been a normal
       | retrospective, it's (at least by my judgment) to increase the
       | likelihood that the article gets optioned for a film or tv
       | series, etc.
       | 
       | This isn't a first for Andy Greenberg, either.
       | https://www.imdb.com/name/nm5200697/
       | 
       | (My comment isn't critical of his writing; it's merely an effort
       | at explaining it.)
        
         | munificent wrote:
         | I mean, I also found the story much more engaging because it
         | involved actual humans with human feelings and reactions.
        
         | zinglersen wrote:
         | It was a bit long-winded but I was thinking that it would make
         | a great movie already in the first half.
         | 
         | Now I wonder if there are any cool SecOps movies or tv shows
         | out there(?)
        
       | ddlatham wrote:
       | > In the hours that followed, RSA's executives debated how to go
       | public. One person in legal suggested they didn't actually need
       | to tell their customers, Sam Curry remembers. Coviello slammed a
       | fist on the table: They would not only admit to the breach, he
       | insisted, but get on the phone with every single customer to
       | discuss how those companies could protect themselves. Joe Tucci,
       | the CEO of parent company EMC, quickly suggested they bite the
       | bullet and replace all 40 million-plus SecurID tokens. But RSA
       | didn't have nearly that many tokens available--in fact, the
       | breach would force it to shut down manufacturing. For weeks after
       | the hack, the company would only be able to restart production in
       | a diminished capacity.
       | 
       | > As the recovery effort got under way, one executive suggested
       | they call it Project Phoenix. Coviello immediately nixed the
       | name. "Bullshit," he remembers saying. "We're not rising from the
       | ashes. We're going to call this project Apollo 13. We're going to
       | land the ship without injury."
       | 
       | This is the sort of response that would increase my trust to
       | choose this company in the future. This is not easy. Our human
       | instincts naturally kick in to minimize our faults and protect
       | ourselves. Choosing to put the customer first at risk of your own
       | reputation is hard, but the right choice, even for your
       | reputation in the end.
        
         | YetAnotherNick wrote:
         | I don't know the contract with clients or anything but "didn't
         | actually need to tell their customers" seems totally illegal to
         | me if the RSA is the provider of one of the most fundamental
         | layer of security to large companies. It is a PR piece. Not
         | saying that RSA likely did the best they could do to be secured
         | from the hack, but this story is a pr piece.
        
         | m463 wrote:
         | There's plenty of examples supporting that. The earliest I
         | remember was the Tylenol murders where 31 million bottles of
         | tylenol were taken off the shelves:
         | 
         | https://en.wikipedia.org/wiki/Tylenol_(brand)#1982_Chicago_T...
         | 
         | In the end, their brand got stronger and more trustworthy.
         | 
         | (and I believe we got sealed bottles)
        
           | cafard wrote:
           | Tamper-proof. Yes, that was the example that occurred to me.
        
           | beambot wrote:
           | Looks like Tylenol is/was owned by J&J... the same company
           | that knowingly sold talcum powder that caused cancer:
           | 
           | https://www.npr.org/2020/05/19/859182015/johnson-johnson-
           | sto...
        
       | NelsonMinar wrote:
       | This story was big news when it happened and I'm grateful to Andy
       | Greenberg for writing this retrospective. Pretty much nothing has
       | changed about security at companies in the last ten years that
       | would foil this kind of attack. I mean maybe folks are a little
       | smarter about catching spearfishing Office docs, and Flash
       | exploits are now a thing of the past, but those are replaced by
       | contemporary equivalents. And I'm sure conveniences like the not-
       | quite-airgapped crucial equipment still persist. We truly have no
       | idea how to secure systems on the Internet.
       | 
       | As for RSA, it came out a couple years later their products were
       | compromised various ways by the NSA. Then a couple years later
       | the NSA lost control of its own hacking tools with the infamous
       | Shadow Brokers release. Not only is building secure systems hard,
       | but the US government actively works to undermine its own
       | companies' security.
       | 
       | https://www.reuters.com/article/idUSBRE9BJ1C220131220?irpc=9...
       | https://arstechnica.com/information-technology/2014/01/how-t...
        
       | lbriner wrote:
       | "single, well-protected server"
       | 
       | It doesn't sound like it. Even our production servers hosted by a
       | "rackspace" company have outgoing ports closed by default, we
       | earn a tiny amount compared to RSA.
       | 
       | I know there will be reasons but honestly, the server should have
       | been air-gapped or something. I can't imagine they need changing
       | very often so why not copy it across the gap on a USB stick when
       | you need it and leave it non-networked otherwise?
       | 
       | Of course, I know nothing about this organisation, it just sounds
       | weird that a system that was so crucial was so vulnerable.
        
         | mattpavelle wrote:
         | I'd bet that they had most ports blocked and the attackers used
         | multi-stage tunnels. Details like that probably just don't make
         | it into a Wired article.
        
         | jaywalk wrote:
         | The article explains all of this.
        
       | znpy wrote:
       | non-paywalled link?
        
         | mywacaday wrote:
         | Open link in duckduckgo
        
         | Jaymoon85 wrote:
         | https://outline.com/uE6PA4
        
         | gvb wrote:
         | Disable javascript
        
       | BombNullIsland wrote:
       | This story would be many times more interesting with more
       | technical details and less "human drama".
        
         | eganist wrote:
         | The story was almost certainly written with media optioning in
         | mind, hence the human drama. It's common with longform
         | journalism, and it's common for the author as well.
         | https://www.imdb.com/name/nm5200697/
        
       | tyingq wrote:
       | _" Moments later, his computer's command line came back with a
       | response: "File not found." He examined the Rackspace server's
       | contents again. It was empty. Leetham's heart fell through the
       | floor: The hackers had pulled the seed database off the server
       | seconds before he was able to delete it."_
       | 
       | I get the compulsion to delete it, but deleting it wouldn't have
       | provided any real comfort. You would have no idea if that was the
       | only copy. So, delete it just in case it is, but it doesn't
       | change what you would have to do afterwards...the master keys
       | have to be assumed leaked.
        
         | PUSH_AX wrote:
         | I mean you're never not going to delete it when given the
         | option. As tiny as the chances are, it could mean your
         | downstream consumers end up safe. Although yes, it should not
         | stop you going into full damage control mode.
        
           | xyzzy123 wrote:
           | It's moderately likely the employee in fact deleted that copy
           | and the "disappeared seconds before it happened" is a fig
           | leaf or polite fiction.
           | 
           | Have to assume the data were compromised anyway, as you point
           | out.
        
       | ianhawes wrote:
       | Good on the author for noting that while common now, the practice
       | of dumping passwords in memory (a la Mimikatz) was not common
       | until some time after this attack.
        
       | wussboy wrote:
       | Man do I ever hate the word "stunning" in headlines.
        
       | btbuilder wrote:
       | I would think it would be better to have a provisioning design
       | that did not require that the company retain the seed data for
       | every fob they had sold.
        
         | briffle wrote:
         | Or at least auto-delete them after 30 days, in case a customer
         | didn't get theirs, and needed it resent. Retention policies
         | limit the blast radius when there is a problem.
        
         | ianhawes wrote:
         | And a wise business decision since you would also benefit from
         | having to replace the client's fobs in the event that they lost
         | their seeds.
        
         | benlivengood wrote:
         | Unlike U2F and similar specs there was no direct communication
         | between the SecurID tokens and any other device, limiting the
         | bandwidth to less entropy than necessary to validate public key
         | signatures. That necessitated having a shared secret between
         | the token and auth server.
        
           | throw0101a wrote:
           | > _That necessitated having a shared secret between the token
           | and auth server._
           | 
           | Yes, but why did there have to be a central server with the
           | shared secret _for every token on the planet_?
           | 
           | The way the SecurIDs were designed, there was not way to plug
           | into them, so there was no way to program them. So when you
           | bought a batch you entered each serial number into your RSA
           | auth server, which phoned home, and got the seed/secret.
           | 
           | Huge single point of failure.
           | 
           | TOTP (and HOTP before it) has a shared secret between the
           | auth server and the token (software), but if Company X is
           | hacked they don't get the secrets to Company Y:
           | 
           | * https://en.wikipedia.org/wiki/Time-based_One-Time_Password
        
             | fmajid wrote:
             | Both HOTP and TOTP are vulnerable to phishing, unlike U2F.
        
               | throw0101a wrote:
               | "Perfect is the enemy of good."
               | 
               | I'll take whatever improvements I can get in security.
        
             | mrandish wrote:
             | > but why did there have to be a central server with the
             | shared secret for every token on the planet?
             | 
             | Yeah, this struck me as a huge flaw. The breached system
             | was used to create CDs full of IDs for customer deployment.
             | For convenience the manufacturing system was almost but not
             | fully air gapped. They retained the ID data in case the
             | customer needed a copy in the future. However, keeping all
             | of the IDs ever made on one system seems crazy.
             | 
             | If they had just deleted the data after backing it up to
             | discrete offline media every week...
        
               | mcfedr wrote:
               | It's great that the system that was printing CDs somehow
               | had to be internet connected, it's not like they are
               | emailing these keys
        
       | chinathrow wrote:
       | > RSA executives told me that the part of their network
       | responsible for manufacturing the SecurID hardware tokens was
       | protected by an "air gap"--a total disconnection of computers
       | from any machine that touches the internet. But in fact, Leetham
       | says, one server on RSA's internet-connected network was linked,
       | through a firewall that allowed no other connections, to the seed
       | warehouse on the manufacturing side.
       | 
       | That's not really an air gap, isn't it?
        
         | amackera wrote:
         | Seems more like an attempted air gap :facepalm:
        
         | jaywalk wrote:
         | "A firewall that only allows connections from one Internet-
         | connected server" is quite literally not an air gap. It's one
         | of those things that you look back on and wonder how in the
         | world that decision was made.
        
           | sterlind wrote:
           | seems totally unjustifiable to me. if they truly needed to
           | keep backups of their customers' seeds, then send them
           | through a data diode to an actually-airgapped tape deck.
           | there's no reason to keep seeds on the machines where they
           | were generated.
           | 
           | ...also, since they detected the breach before the attackers
           | got to the "seed warehouse," why did they try to tail them in
           | real time? just pull power to the whole DC.
        
             | jaywalk wrote:
             | The only thing I can think of with the "tailing in real
             | time" is that there was some journalistic license taken to
             | spice up the story. Otherwise, you don't even need to pull
             | power to the whole DC. Just cut off all Internet access.
        
         | jarym wrote:
         | They must have meant the executives had an air gap between
         | their ears.
        
       | criddell wrote:
       | I don't have an ad-blocker on this machine and I couldn't finish
       | reading the page. The ads are ridiculously obnoxious.
       | 
       | It wasn't that long ago when magazines like Wired cared a great
       | deal about the page. What a mess.
        
         | i_like_kotlin wrote:
         | They still do, if you pay.
        
           | criddell wrote:
           | That's not true. I just subscribed and they obnoxious ads and
           | reflowing text are still there.
           | 
           | Edit: I had to sign out and then back in after paying. Now
           | the only ads I see are in-house ones (they really want you to
           | sign up for newsletters).
        
             | i_like_kotlin wrote:
             | I see no ads as a subscriber and the subscription terms
             | explicitly states ad-free, unlimited browsing for 1 year
             | for $10, subscription benefits listed here: https://subscri
             | be.wired.com/subscribe/wired/121743?source=AM...
        
               | criddell wrote:
               | I signed out and then signed back in and now they are
               | gone. Thanks.
        
         | bigbillheck wrote:
         | > It wasn't that long ago when magazines like Wired cared a
         | great deal about the page
         | 
         | Do you remember the super-early Wired print editions, because
         | those colors made it barely readable.
        
           | criddell wrote:
           | Every one of those choices were deliberate though. There was
           | an aesthetic and style they were after. You can't say the
           | same thing about flashing ads and text shuffling around as
           | you scroll.
        
             | munificent wrote:
             | I think the aesthetic they are going for these days is
             | "profitable".
        
         | pwg wrote:
         | Install uBlock origin and block the javascript running on the
         | page.
         | 
         | You still get to read the article, but no "ridiculously
         | obnoxious" ads appear anywhere.
        
       ___________________________________________________________________
       (page generated 2021-05-20 23:03 UTC)