Attacks/Breaches
7/28/2011
11:55 AM
Connect Directly
RSS
E-Mail
50%
50%

RSA SecurID Breach Cost $66 Million

EMC details second quarter 2011 cost to replace tokens, monitor customers, and handle fallout from RSA's SecurID breach.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Between April and June 2011, EMC spent $66 million dealing with the fallout from a March cyber attack against its systems, which resulted in the compromise of information relating to the SecurID two-factor authentication sold by EMC's security division, RSA.

That clean-up figure was disclosed last week during an EMC earnings call, by David Goulden, the company's chief financial officer. It doesn't include post-breach expenses from the first quarter, when EMC began investigating the attack, hardening its systems, and working with customers to prevent their being exploited as a result of the attacks.

In spite of the breach, EMC reported strong second-quarter financial results, earning consolidated revenue of $4.85 billion, which is an increase of 20% compared with the same period one year ago. Meanwhile, second-quarter GAAP net income increased by 28% from the same period last year, to reach $546 million. The company saw large growth in its information infrastructure and virtual infrastructure products and services, including quarterly revenue increases of 19% for its information storage group.

Those results led executives to increase their financial outlook for 2011 and predict consolidated revenue in excess of $19.8 billion, which would be a 16% increase from EMC's 2010 revenues of $17 billion.

Growth was slower for RSA, however, which saw year-on-year revenue growth increase slightly, from 8% to 13%, fueled by the company's identity management, protection, and security management compliance businesses. "It is likely that RSA growth will remain a bit slower as remediation efforts continue," said Goulden. But he said that "overall customer feedback is positive and increasingly, customers are showing confidence."

As that suggests, RSA faced criticism after the breach for failing to disclose details of what had been stolen, or how it might be used against its customers. RSA's approach changed somewhat, however, after attackers used stolen SecurID information to launch attacks against numerous defense contractors, including Lockheed Martin.

Facing increasing criticism from customers and commentators after those attacks, RSA chairman Art Coviello in early June issued an open letter providing additional details about the breach and RSA's approach to handling it. He also announced that RSA would offer replacement tokens to more customers. But despite the additional details, Coviello stopped short of explaining exactly what attackers had stolen and how that might effect customers.

According to Goulden, RSA ultimately offered replacement tokens to the one-third of its customers who use SecurID to protect intellectual property and corporate networks. For the other two-thirds of customers, who largely use the tokens to protect "Web-based consumer financial transactions," the company offered additional security monitoring. That strategy was decided by EMC after determining that attackers didn't appear to be seeking consumers' financial details. Rather, he said, "our analysis of the attack led us to believe that likely targets were the defense sector and related government agencies."

On the earnings call, Goulden also defended RSA's post-breach approach, saying the shift in strategy hadn't been related to a change in the actual risk facing customers. "What did change was our customer's sensitivity to risk. This was caused by the same news flow around cyber attacks as in addition to press coverage of the attack on Lockheed Martin, there was broad media coverage of attacks on organizations including Google, Sony, Epsilon, the Australian government and PBS," he said. "While these attacks were entirely unrelated to RSA, the publicity resulted in many customers risk tolerance going down while the level of awareness and concern went up."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.