(Again, funny how these stories/incidents/events always come out heading into 
RSA.  -- rick)


Key Internet operator VeriSign hit by hackers

http://old.news.yahoo.com/s/nm/20120202/wr_nm/us_hacking_verisign

SAN FRANCISCO (Reuters) – VeriSign Inc, the company in charge of delivering 
people safely to more than half the world's websites, has been hacked 
repeatedly by outsiders who stole undisclosed information from the leading 
Internet infrastructure company.

The previously unreported breaches occurred in 2010 at the Reston, 
Virginia-based company, which is ultimately responsible for the integrity of 
Web addresses ending in .com, .net and .gov.

VeriSign said its executives "do not believe these attacks breached the servers 
that support our Domain Name System network," which ensures people land at the 
right numeric Internet Protocol address when they type in a name such as 
Google.com, but it did not rule anything out.

VeriSign's domain-name system processes as many as 50 billion queries daily. 
Pilfered information from it could let hackers direct people to faked sites and 
intercept email from federal employees or corporate executives, though 
classified government data moves through more secure channels.

"Oh my God," said Stewart Baker, former assistant secretary of the Department 
of Homeland Security and before that the top lawyer at the National Security 
Agency. "That could allow people to imitate almost any company on the Net."

The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange 
Commission filing in October that followed new guidelines on reporting security 
breaches to investors. It was the most striking disclosure to emerge in a 
review by Reuters of more than 2,000 documents mentioning breach risks since 
the SEC guidance was published.

Even if the name system is safe, VeriSign offers a number of other services 
where security is paramount. The company defends customers' websites from 
attacks and manages their traffic, and it researches international cybercrime 
groups.

VeriSign would possess sensitive information on customers, and its registry 
services that dispense website addresses would also be a natural target.

Ken Silva, who was VeriSign's chief technology officer for three years until 
November 2010, said he had not learned of the intrusion until contacted by 
Reuters. Given the time elapsed since the attack and the vague language in the 
SEC filing, he said VeriSign "probably can't draw an accurate assessment" of 
the damage.

Baker said VeriSign's description will lead people to "assume that it was a 
nation-state attack that is persistent, very difficult to eradicate and very 
difficult to put your hands around, so you can't tell where they went 
undetected."

VeriSign declined multiple interview requests, and senior employees said 
privately that they had not been given any more details than were in the 
filing. One said it was impossible to tell if the breach was the result of a 
concerted effort by a national power, though that was a possibility. "It's an 
ugly, slim sliver of facts. It's not enough," he said.

The 10-Q said that security staff responded to the attack soon afterward but 
failed to alert top management until September 2011. It says nothing about a 
continuing investigation, and the Department of Homeland Security did not 
respond to questions about an inquiry or recommendations for VeriSign customers.

Until August 2010, VeriSign was one of the largest providers of Secure Sockets 
Layer certificates, which Web browsers look for when connecting users to sites 
that begin "https," including most financial sites and some email and other 
communications portals.

If the SSL process were corrupted, "you could create a Bank of America 
certificate or Google certificate that is trusted by every browser in the 
world," said prominent security consultant Dmitri Alperovich, president of 
Asymmetric Cyber Operations.

VeriSign sold its certificate business in the summer of 2010 to Symantec Corp, 
which has kept the VeriSign brand name on those products.

Symantec spokeswoman Nicole Kenyon said "there is no indication that the 2010 
corporate network security breach mentioned by VeriSign Inc was related to the 
acquired SSL product production systems."

Some smaller issuers of such validation certificates have been compromised in 
the past, and false certificates have been used to spread the most 
sophisticated malicious software yet detected, including Stuxnet, which 
attacked the Iranian nuclear program.

In written Senate testimony on Tuesday, U.S. Director of National Intelligence 
James Clapper called the known certificate breaches of 2011 "a threat to one of 
the most fundamental technologies used to secure online communications and 
sensitive transactions, such as online banking." Others have said SSL as a 
whole is no longer trustworthy and effective.

In a section of its filing devoted to risk factors, VeriSign said it was a 
frequent subject of "the most sophisticated form of attacks," including some 
that are "virtually impossible to anticipate and defend against."

Security experts said the breach reminded them of last year's attack on RSA, an 
authentication company owned by storage maker EMC Corp. RSA's SecurID tokens 
authorize remote access and have been in wide use by government agencies and 
military contractors including Lockheed Martin Corp, which said it was probed 
on the heels of the RSA breach.

"This breach, along with the RSA breach, puts the authentication mechanisms 
that are currently being used by businesses at risk," said Melissa Hathaway, a 
former intelligence official who led U.S. President Barack Obama's 
cybersecurity policy review and later pushed for the SEC guidance. "There 
appears to be a structured process of hunting those who provide authentication 
services."

Even if VeriSign's certificates were not compromised, a significant breach 
"means that prevention is futile," Alperovich said. He said he hoped new 
legislation on cybersecurity, expected to reach the Senate floor this month, 
would call for more disclosures and bring more aid to companies under attack.

(Reporting by Joseph Menn; Editing by Gary Hill)


---
Just because i'm near the punchbowl doesn't mean I'm also drinking from it.

_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to