RSA was hacked in March. This was one of
the biggest hacks in history.
As
far as we know, a nation-state wanted to
break in to
Lockheed-Martin
and
Northrop-Grumman
to steal military secrets. They couldn't
do it, since these companies were using
RSA SecurID tokens for network
authentication. So, the hackers broke into
RSA with a targeted email attack. They
planted a backdoor and finally were able
to gain access to SecurID information that
enabled them to go back to their original
targets and succesfully break into there.
In the aftermath of the attack, RSA was
forced to replace the SecurID tokens for
their customers.
Already in April, we knew
that the attack was launched with a
targeted email to EMC employees (EMC owns RSA), and that the email contained an
attachment called
"2011 Recruitment plan.xls". RSA disclosed this information in
their blog post. Problem was, we didn't have the file.
It seemed like nobody did, and the
antivirus researcher mailing lists were
buzzing with discussion about where to
find the file. Nobody had it, and
eventually the discussion quieted down.
This
bothered Timo Hirvonen. Timo has been
working as an analyst in our labs and we
was convinced that he could find this
file. Every few weeks since April, Timo
would go back to our collections of tens
of millions of malware samples and try to
mine it to find this one file - with no
luck. Until this week.
Timo
wrote a data analysis tool that analysed
samples for flash objects. We knew the XLS
file in question used a Flash object to
take over the system. The new tool located
several relevant samples. However, one of
them was not an Excel file. It was an
Outlook message file (MSG). When Timo
opened it up, he knew he was onto
something. The message file turned out to
be the original email that was sent to RSA
on 3rd of March, complete with the
attachment
2011 Recruitment plan.xls
After five months, we finally
had the file. And not only that, we had
the original email. Turns out somebody
(most likely an EMC employee) had uploaded
the email and attachment to the
Virustotal
online scanning service on 19th of March.
And, as stated in the Virustotal terms,
the uploaded files will be shared to
relevant parties in the anti-malware and
security industry. So, we all had the file
already. We just didn't know we did, and
we couldn't find it amongst the millions
of other samples.
The sample was uploaded on 19th of
March as
file-1994209_msg
So, what did the email look
like? It was an email that was spoofed to
look like it had come from recruiting
website
Beyond.com. It had the subject
"2011 Recruitment plan"
and one line of content:
"I forward this file to you for review.
Please open and view it". The message was sent to one EMC
employee and cc'd to three others.
When opened, this is what
the XLS attachment looked like:
Here's a
Youtube video
that shows in practice what happens when
you open the malicious Excel file.
In this video you can see us
opening the email to Outlook and launching
the attachment is launched. The embedded
flash object shows up as a
[X]
symbol in the spreadsheet. The Flash
object is executed by Excel (why the heck
does Excel support embedded Flash is a
good question). Flash object then uses the
CVE-2011-0609
vulnerability to execute code and to drop
a
Poison Ivy backdoor
to the system. The exploit then code
closes Excel and the infection is over.
After this, Poison Ivy
connects back to it's server at
good.mincesur.com. The domain
mincesur.com
has been used in similar espionage attacks
over an extended period of time.
Once the connection is made,
the attacker has full remote access to the
infected workstation. Even worse, it has
full access to network drives that the
user can access. Apparently the attackers
were able to leverage this vector further
until they gained access to the critical
SecurID data they were looking for.
The
attack email does not look too
complicated. In fact, it's very simple.
However, the exploit inside Excel was a
zero-day at the time and RSA could not
have protected against it by patching
their systems. Was this an Advanced
attack? The email wasn't advanced. The
backdoor they dropped wasn't advanced. The
exploit was advanced. The ultimate target
of the attacker was advanced. If somebody
hacks a security vendor just to gain
access to their customers systems, we'd
say the attack is advanced, even if some
of the interim steps weren't very
complicated.
Timo will be
discussing his research on the topic in
detail in the
T2 Data
Security conference in October in his talk
titled
"How RSA Was Breached".
PS. For those who are still
looking for the sample: MD5 of the
MSG file:
1e9777dc70a8c6674342f1796f5f1c49 MD5
of the XLS file:
4031049fe402e8ba587583c08a25221a