The network of defense contractor Lockheed-Martin was attacked using counterfeit electronic keys. Since the RSA Security network was hacked and the keys to its SecurID tokens were compromised a few months ago, the world has been waiting for the proverbial other shoe to drop. Well, it dropped.
In an analysis of the breach at RSA Security, NSS Labs predicted, "This was a strategic move to grab the virtual keys to RSA's customers--who are the most security conscious in the world. One or several RSA clients are likely the ultimate target of this attack. Military, financial, governmental, and other organizations with critical intellectual property, plans and finances are at risk."
Cyber attacks have evolved into precision tools for corporate and government espionage. Since the compromise of the SecurID keys, there have been malware and phishing campaigns probing for specific data connecting RSA tokens to the end-user, suggesting that those attacks were being conducted by the original RSA Security attackers with a goal in mind.
Most crimes are crimes of opportunity, and most crimes of opportunity can be avoided. Stay in populated, well-lit areas, and you're relatively safe. Walk down dark, deserted alleys and your odds of getting mugged go up. Lock your car doors and keep valuable hidden, and you probably won't get things stolen. Leave your car unlocked with your iPad sitting on the passenger seat and it probably won't be there when you get back.
However, avoiding a targeted attack--a stalker dedicated to trailing you specifically--is much more difficult. The attack against RSA Security does not appear to have been a random crime of opportunity, but rather a targeted attack calculated with the goal of acquiring the keys necessary to tackle larger prey like Lockheed-Martin.
I am sure that Lockheed-Martin and the United States government have information security experts much smarter than me investigating these incidents and connecting the dots, but it certainly seems at face value like either a state-sponsored attack, or an attack by well-funded hackers with the intent to market whatever information can be extracted internationally to other governments.
Thankfully, Lockheed-Martin detected the attack and acted quickly to thwart it. A spokesperson for Lockheed-Martin reports that no customer, program, or employee data has been compromised as a result of this attack.
But, the entire incident--starting from the RSA Security attack and compromise of the SecurID tokens, and ending at Lockheed-Martin--illustrates that malware and cyber-crime are becoming more insidious. Malware has evolved from a trivial, script-kiddie nuisance, to a professional crime syndicate, and now into a tool for precision corporate and government espionage.
Welcome!
Welcome to our online presence. We hope you find this site helpful. Here you can find free information in the computer industry, free "how to's", the latest software reviews and more. You can also shop our links. We encourage you subscribe to our site so you don't miss anything. As always, we welcome your suggestions!
Get them while they last!
New Computers & Parts
In need of a new computer, laptop or computer parts? We got you covered! Shop Now!
Need Computer Help? Check our forum.
Sunday, May 29, 2011
Lockheed-Martin compromised. Info from PC World.
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
4:52 PM
0
comments
Wednesday, November 17, 2010
Gartner's Top 10 Technologies for 2011
October 20, 2010
1: Cloud computing
This group of technologies has been on the top 10 lists for a few years. Now everything as a service will alter business models and IT procurement. Gartner analyst David Cearley said what has changed is that there are multiple services. Companies will probably need cloud computing brokers. Things to watch:
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
10:33 AM
0
comments
Monday, November 8, 2010
Tech Myths Debunked!
By Mark Tiongco - November 7, 2010
In this tech tip, we expose the myth and reality surrounding some of the biggest trends in our technology-oriented world. Hopefully, this will shed some light which can help you better understand how these crazy gadgets work!
In this tech tip, we expose the myth and reality surrounding some of the biggest trends in our technology-oriented world. Hopefully, this will shed some light which can help you better understand how these crazy gadgets work!
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
9:51 AM
0
comments
Thursday, November 12, 2009
Facebook Invasion: Beware of New 'Smart' Worm - PC World
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
6:26 PM
0
comments
Monday, November 2, 2009
Windows 7 upgrade problems vex users | The Money Times
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
9:39 AM
0
comments
Friday, October 23, 2009
Ten free Windows apps no one should be without!
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
5:33 PM
0
comments
Monday, October 12, 2009
Brace Yourself: Microsoft Readies Record-Setting Patch Tuesday - PC World
Posted by
Ric Carter - Owner - Computer Authorities Plus & My Technology Broker.com
at
7:04 PM
0
comments
Subscribe to:
Posts (Atom)