Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Lockheed Martin Suffers Massive Cyberattack

"Significant and tenacious" attack targeted multiple U.S. defense contractors and may have involved hack of RSA SecurID system.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
A major online attack was launched earlier this month against the networks of Lockheed Martin, the country's largest defense contractor.

On Saturday, Lockheed Martin released a statement confirming the attack, which it described as "significant and tenacious." But it said its information security team "detected the attack almost immediately and took aggressive actions to protect all systems and data."

As a result, the company said, "our systems remain secure; no customer, program, or employee personal data has been compromised."

Hackers reportedly exploited Lockheed's VPN access system, which allows employees to log in remotely by using their RSA SecurID hardware tokens. Attackers apparently possessed the seeds--factory-encoded random keys--used by at least some of Lockheed's SecurID hardware fobs, as well as serial numbers and the underlying algorithm used to secure the devices.

That suggests that whoever attacked Lockheed Martin may also have been behind the successful breach in March of EMC's RSA division, which manufactures SecurID. "Since then, there have been malware and phishing campaigns in the wild seeking specific data linking RSA tokens to the end user, leading us to believe that this attack was carried out by the original RSA attackers," Rick Moy, president and CEO of NSS Labs, said in a blog post.

According to security blogger Robert Cringely, aka Mark Stephens, who broke news of the attack against Lockheed Martin, "It seems likely that whoever hacked the RSA network got the algorithm for the current tokens and then managed to get a keylogger installed on one or more computers used to access the intranet" at Lockheed Martin. From there, attackers reportedly gained access to the company's internal network.

What types of information might attackers have been targeting? Lockheed Martin, which earned revenue of $45.8 billion in 2010, makes everything from Trident missiles and F-22 fighter jets to a network of satellites for the Department of Defense that are designed to support high-priority wartime communications.

By all accounts, Lockheed Martin's swift detection of the attack helped avert potential disaster. "The good news here is that the contractor was able to detect an intrusion then did the right things to deal with it," Cringely said. "A breach like this is very subtle and not easy to spot." Furthermore, he said, the same day that Lockheed Martin detected the attack, all remote access for employees was disabled, and the company told all telecommuters to work from company offices for at least a week. Then on Wednesday, the company informed all remote workers that they'd receive new RSA SecurID tokens and told all 133,000 employees to reset their network passwords.

In a statement released Sunday, EMC said it was "premature to speculate" on the details of the attack. But if attackers did use information stolen from RSA to hack into the SecurID system used by Lockheed Martin, then EMC could be forced to finally reveal, publicly, any risks that the use of its system might now pose to the 40 million users of SecurID hardware token customers and 250 million users of its SecurID software.

Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens Aug. 3-4 in Las Vegas. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22152
PUBLISHED: 2021-05-13
A Denial of Service due to Improper Input Validation vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially to prevent any new user connections.
CVE-2021-22153
PUBLISHED: 2021-05-13
A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim’s local machine with t...
CVE-2021-22154
PUBLISHED: 2021-05-13
An Information Disclosure vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially gain access to a victim's web history.
CVE-2021-20331
PUBLISHED: 2021-05-13
Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as "saslStart", "saslContinue", "i...
CVE-2021-31215
PUBLISHED: 2021-05-13
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.