Computerworld Australia counts down the 10 biggest ICT stories of 2011 While the repeated hacking of Sony’s PlayStation Network service grabbed mainstream media attention this year, an even more surprising compromise was being played out with RSA’s SecurID tokens, earning it a place in the Top 10 Influential list for 2011. The drama began on 18 March 2011 when security vendor RSA discovered it had been hit by an advanced persistent threat (APT) from an undisclosed nation state which took all the information stored on its SecurID tokens. These tokens are used on PCs, USB devices, phones and key fobs in many companies to provide an extra layer of security beyond a username and password for people logging into programs or networks. Two weeks later, US government contractor Lockheed Martin was reportedly forced to pull access to its virtual private network after hackers compromised the SecureID technology.However, it was not just US based companies that were affected by the APT. Australian banks Westpac and ANZ announced in June that while there were no signs of compromise, a decision was made to replace all SecurID tokens in order to ease customers concerns. At the time Westpac would not say how many tokens were replaced but ANZ revealed it was re-issuing 50,000 new tokens to customers.The story didn’t end there as RSA came in for criticism from the international and Australian IT industry as details were slow in forthcoming, three months after the compromise took place. 2nd Phase founder, Campbell Bradford, questioned why RSA customers were waiting so long for replacement tokens. According to Bradford, Australian customers had invested in one of the most expensive systems on the market and had to “shell out” more expense recalling and redistributing tokens.Rival security token vendors, SafeNet and CA, saw RSA’s APT as an opportunity to poach new business and began offering special offers to affected RSA customers. When RSA finally opened up to the media in August, ANZ general manager, Andy Solterbeck, said that the company “still had a few months” to go before all its tokens were replaced in the ANZ market. It had offered large customers, such as ANZ Banking Group, an early renewal of their contracts along with new devices, while smaller users were able to get free contract extensions.Solterbeck said at the time there was “no question whatsoever” that the company suffered a nation-state-orientated APT attack. “The reason we say that was because of the level of the sophistication of the attack and specifically what they went after,” he said.“We believe that we were one of the only commercial organisations that caught an APT in flight. Unfortunately we didn’t stop it in time but we did see it.”The nightmare was not quite over yet for RSA with the discovery in October by US-based security blogger, Brian Kreb, that customers of Australian internet service providers (ISPs) including Telstra and iiNet may have been compromised. This was because hackers used the same command and control techniques that infiltrated RSA to target 760 companies around the world.“It is not clear how many systems in each of these companies or networks were compromised, for how long those intrusions persisted, or whether the attackers successfully stole sensitive information from all of the victims,” Krebs wrote in his blog.While RSA has learnt the hard way that even a security vendor is vulnerable to outside attacks, one positive aspect of the APT has been greater information sharing. RSA chief information security officer, Eddie Schwartz, told Computerworld Australia in October that the company now has “brothers in arms.” “If you look around the defence industrial base, companies that support the defence community, they’ve all been hacked and had weapon systems and airplane designs stolen,” he said. “That was a lesson learnt because you think you’re fighting a very difficult battle in isolation,” he said.Finally in December, it was revealed that the APT managed to hack RSA’s security network because the company failed to update its Windows XP operating system. Qualys’ vulnerability and malware research labs director, Rodrigo Branco, found that while Windows XP includes data execution prevention (DEP) defensive technology it is not switched on by default – and RSA neglected to turn DEP on. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe