Back to all incidents

RSA SecurID — APT seed-record exfiltration

Spear-phishing via a malicious Excel attachment exploiting an Adobe Flash zero-day gave attackers RSA's SecurID seed database, compromising two-factor tokens used by defence contractors.

Target
RSA SecurID — APT seed-record exfiltration
Date public
17 March 2011
Sector
Technology
Attack type
Nation State
Threat actor
Chinese state-sponsored actors (subsequently attributed)
Severity
Critical
Region
Global

RSA made the security tokens that millions of people used to log into sensitive systems -- the little devices that display a six-digit code that changes every thirty seconds. The codes were generated using secret values called seed records, unique to each token. In theory, even if an attacker stole your password, they could not log in without the physical token that only you held. In March 2011, attackers compromised that theory. They tricked an RSA employee into opening a malicious spreadsheet, gained access to RSA's internal network, and stole the seed records -- the master secrets that made every token tick. With those, an attacker who also had your password could generate the right six-digit code without having your physical token at all. Two months later, Lockheed Martin -- one of the largest US defence contractors -- detected an attempted intrusion using those stolen RSA values. Others followed. RSA ended up replacing tokens for thousands of customers at enormous cost. The breach is a canonical example of a supply-chain attack: the real targets were not RSA but its customers. Breaking into RSA was the means; the defence contractors and government agencies trusting RSA tokens were the end.

What happened

On 17 March 2011, RSA Security — the security division of EMC and the manufacturer of the SecurID two-factor authentication system — disclosed in an open letter to its customers that it had suffered “an extremely sophisticated cyber attack” that had resulted in the theft of information related to its SecurID products. The letter was deliberately vague about what was taken. Subsequent reporting, including a detailed Wired investigation, established that the attackers had accessed and exfiltrated the SecurID seed database: the master cryptographic values used to generate the time-based one-time codes that SecurID hardware and software tokens display every thirty seconds.

The SecurID system was deployed globally by defence contractors, financial institutions, healthcare organisations, and government agencies to provide two-factor authentication for VPN and network access. The seed records were the secret foundation of that system’s security. With seed values, an attacker who also possessed a user’s PIN or password could generate valid one-time codes without possessing the physical token. The attack therefore compromised the second factor in the two-factor authentication of an estimated 40 million SecurID hardware tokens and 250 million software tokens worldwide.

In May 2011, Lockheed Martin disclosed that it had detected and blocked an attempted intrusion that used stolen RSA SecurID credentials; similar attempts were reported by Northrop Grumman and L-3 Communications. All three are among the largest US defence contractors. RSA subsequently announced it would replace the affected tokens for customers who requested it — at a cost that the company never formally disclosed but analysts estimated in the hundreds of millions of dollars.

US officials attributed the attack to Chinese state-sponsored intelligence services several years after the breach, and it was assessed as part of a broader campaign targeting the US defence industrial base.

How it worked

The attack began with a spear-phishing email sent to a small number of RSA employees with the subject line “2011 Recruitment Plan.” The email contained an Excel attachment with an embedded Flash object that exploited a zero-day vulnerability (CVE-2011-0609) in Adobe Flash Player that permitted arbitrary code execution from a malicious spreadsheet. When the recipient opened the spreadsheet and enabled the content, the Flash exploit executed, dropped a remote access tool called Poison Ivy onto the machine, and established a connection back to attacker-controlled infrastructure.

From the initial foothold, the attackers used Poison Ivy to expand their access. They moved laterally through RSA’s network by compromising additional accounts, escalating privileges, and staging data aggregation on internal servers. RSA’s subsequent disclosures indicated that the attackers specifically sought and accessed the systems where seed records were stored, demonstrating that the intrusion was targeted rather than opportunistic — they knew what they were looking for.

The exfiltrated data was staged and then transferred out via FTP to an external server that had itself been compromised to serve as a relay, obscuring the ultimate destination. The attack demonstrated a clear chain: phishing for initial access, lateral movement for privilege escalation, targeted data collection for the specific objective, and relay infrastructure for exfiltration.

The strategic architecture of the breach repays analysis. RSA was not the ultimate target. The value of the seed records lay entirely in what they enabled: access to the systems of RSA’s customers. Attacking RSA was a supply-chain attack — breaking the security vendor to gain access to the vendor’s customers — a model that became increasingly common in subsequent years, from the Target breach via an HVAC vendor to the SolarWinds supply-chain intrusion. The attacker invested the effort of compromising a sophisticated, security-focused company in order to undermine trust in the authentication infrastructure that thousands of other organisations depended on.

Timeline

  • Weeks before March 2011 — Attack preparation; attacker infrastructure staged.
  • Early March 2011 — Spear-phishing email with malicious Excel attachment sent to small group of RSA employees. At least one employee opens the attachment; CVE-2011-0609 Flash zero-day executes; Poison Ivy RAT installed.
  • March 2011 — Lateral movement through RSA network; privilege escalation; seed record database accessed and exfiltrated.
  • 17 March 2011 — RSA publishes open letter to customers disclosing “an extremely sophisticated cyber attack” related to SecurID products; does not confirm what was taken.
  • May 2011 — Lockheed Martin discloses a detected and blocked intrusion attempt using compromised SecurID credentials.
  • Late May — June 2011 — Northrop Grumman and L-3 Communications report similar attempted intrusions using stolen RSA SecurID data. RSA confirms to customers that seed record information was stolen.
  • June 2011 — RSA announces token replacement programme for customers whose deployments are determined to be at elevated risk.
  • August 2011 — Wired publishes detailed account of the RSA breach mechanism, including the Flash zero-day and Poison Ivy backdoor.
  • 2014 onward — US attribution of the attack to Chinese state-sponsored actors established in subsequent government reporting and congressional testimony.

What defenders should learn

The RSA breach is the definitive supply-chain attack against a security vendor, and it raises a question that is still inadequately addressed: when you trust a security product, what assumptions underpin that trust, and what happens if those assumptions are violated?

Every enterprise that deployed SecurID was implicitly trusting RSA to protect the seed records that made the system work. That trust was not validated through independent security review, contractual assurance about seed storage architecture, or auditable controls. The seeds were held by the vendor and the customers had no visibility into how well they were protected. The lesson is not that vendors cannot be trusted, but that trust in security-critical components requires verification — and the questions to ask vendors about crown-jewel data protection should be as specific as the questions asked about any other critical dependency.

The spear-phishing vector is noted in almost every significant breach, and yet RSA — a security company — was compromised through it. The targeting was specific: the email was plausible (“2011 Recruitment Plan” is a realistic subject for an HR or management audience), the attachment exploited a zero-day that no amount of patching could have blocked at the time, and the initial victim likely had no reason to be especially suspicious. This illustrates the limits of training-based phishing defence against well-prepared adversaries: the attacker has more information about the target than the target has about the attacker, and they will find an approach that is believable.

The defence implications operate at the architectural level. Two-factor authentication schemes that depend on a shared secret held by a centralised third party are vulnerable to that third party being compromised. Hardware-based FIDO authentication, which generates credentials locally on the device without any shared secret ever leaving the hardware, eliminates the seed-record attack surface entirely. The SecurID breach was one of the events that accelerated the development and adoption of FIDO standards.

For organisations that were still relying on SecurID or equivalent shared-secret OTP systems after the 2011 breach: the window between public knowledge of the compromise and individual organisations’ token replacement was a period of elevated risk that required compensating controls — additional authentication factors, VPN access monitoring for anomalous login patterns, and heightened vigilance on the specific accounts with access to the most sensitive systems. Managing that window is now part of the playbook for how organisations respond to a vendor security incident affecting a component they depend on.

Sources

Back to all incidents