Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 3000 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

RSA hackers exploited Flash zero-day bug

April 3 2011

Last month's hack of RSA Security began with an exploit of a then-unpatched vulnerability in Adobe Flash Player, the company confirmed Friday.

According to RSA, attackers gained access to its network by sending two small groups of employees e-mails with attached Excel spreadsheets. One of those employees opened the attachment, which was titled "2011 Recruitment plan.xls."

The spreadsheet contained an embedded Flash file that exploited a "zero-day" vulnerability -- a bug then unknown to Adobe, and thus unpatched -- that allowed hackers to commandeer the employee's PC.

From there, the attackers installed a customized variant of the Poison Ivy remote administration tool (RAT) on the compromised computer. Using the RAT, hackers harvested users' credentials to access other machines within the RSA network, searched for and copied sensitive information, and then transferred the data to external servers they controlled.

Although RSA has not detailed what was stolen, it has admitted that information related to the company's SecurID two-factor authentication products was part of the hacker's haul.

Last week's description of the Flash attack vector helps explain the reaction of Adobe and others to the flaw, and shows that RSA was hacked at least several days before the company went public.

RSA first reported the attack and the data theft late on Thursday, March 17.

Three days before that, however, Adobe had issued a security advisory acknowledging that attackers were exploiting an unpatched bug in Flash Player using tricked-out Excel documents.

"There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an e-mail attachment," Adobe said in the March 14 advisory.

At the time, Adobe did not name RSA as the target of the ongoing attacks.

But Adobe did promise to patch the Flash vulnerability the next week, a promise it kept when it shipped an "out-of-cycle" update of the popular media player seven days later, on Monday, March 21.

Adobe has delivered emergency patches for Flash before. In 2010, for instance, it rushed out fixes three times, one in only six days, the other two times in seven days each.

In hindsight, the seriousness of the Flash vulnerability should have been apparent. On March 17, Microsoft told Office users to protect themselves by running an advanced configuration tool.

Microsoft made those recommendations several hours before RSA's top executive admitted that his company's network had been breached.

The RSA employee who opened the attack Excel file must have been using a version of Office earlier than Office 2010. In a March 17 blog post , a manager and security engineer with the Microsoft Security Response Center (MSRC) said that Excel 2010 was not susceptible to the attacks then circulating.

Excel 2010 automatically enables DEP (data execution prevention), a key Windows anti-exploit technology, and also isolates malicious files inside Office 2010's "Protected View," a "sandbox" that prevents attack code from escaping the application.

Older versions of Excel, including those in Office 2003 and Office 2007, were not protected by DEP or Protected View, said Microsoft.

While RSA has characterized the attack as an "advanced persistent threat," or APT -- an oft-used label for slow, stealthy attacks, typically attributed to Chinese hackers -- some security experts seemed to see it as just ordinary.

"2 emails and a Adobe Flash 0-day and you too can be an APT!" said Jeremiah Grossman , the CTO an WhiteHat Security, on Twitter Friday.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html