archive.f-secure.com Open in urlscan Pro
2a05:d014:275:cb00::c8  Public Scan

Submitted URL: http://www.f-secure.com/weblog/archives/00002226.html
Effective URL: https://archive.f-secure.com/weblog/archives/00002226.html
Submission: On March 31 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

<<<NEWS FROM THE LAB - Friday, August 26, 2011>>>

 
ARCHIVES | SEARCH

--------------------------------------------------------------------------------

 

How We Found the File That Was Used to Hack RSA Posted by Mikko @ 09:29 GMT

--------------------------------------------------------------------------------

RSA was hacked in March. This was one of the biggest hacks in history.

The current theory is that a nation-state wanted to break into Lockheed-Martin
and Northrop-Grumman to steal military secrets. They couldn't do it, since these
companies were using RSA SecurID tokens for network authentication. So, the
hackers broke into RSA with a targeted e-mail attack. They planted a backdoor
and eventually were able to gain access to SecurID information that enabled them
to go back to their original targets and successfully break in. In the aftermath
of the attack, RSA was forced to replace SecurID tokens for their customers
around the world.



Already in April, we knew that the attack was launched with a targeted e-mail to
EMC employees (EMC owns RSA), and that the e-mail contained an attachment called
"2011 Recruitment plan.xls". RSA disclosed this information in their blog post.
Problem was, we didn't have the file. It seemed like nobody did, and the
antivirus researcher mailing lists were buzzing with discussion about where to
find the file. Nobody had it, and eventually the discussion quieted down.

This bothered Timo Hirvonen. Timo is an analyst in our labs and he was convinced
that he could find this file. Every few weeks since April, Timo would go back to
our collections of tens of millions of malware samples and try to mine it to
find this one file — with no luck. Until this week.

Timo wrote a data analysis tool that analyzed samples for flash objects. We knew
the XLS file in question used a Flash object to take over the system. The new
tool located several relevant samples. However, one of them was not an Excel
file. It was an Outlook message file (MSG). When Timo opened it up, he knew he
was onto something. The message file turned out to be the original e-mail that
was sent to RSA on the 3rd of March, complete with the attachment 2011
Recruitment plan.xls.

After five months, we finally had the file.

And not only that, we had the original e-mail. Turns out somebody (most likely
an EMC/RSA employee) had uploaded the e-mail and attachment to the Virustotal
online scanning service on 19th of March. And, as stated in the Virustotal
terms, the uploaded files will be shared to relevant parties in the anti-malware
and security industry. So, we all had the file already. We just didn't know we
did, and we couldn't find it amongst the millions of other samples.


The sample was uploaded on 19th of March as file-1994209_msg

So, what did the e-mail look like? It was an e-mail that was spoofed to look
like it was coming from recruiting website Beyond.com. It had the subject "2011
Recruitment plan" and one line of content:

"I forward this file to you for review. Please open and view it".

The message was sent to one EMC employee and cc'd to three others.



When opened, this is what the XLS attachment looked like:



Here's a YouTube video that shows in practice what happens when you open the
malicious Excel file.



In this video you can see us opening the e-mail to Outlook and launching the
attachment. The embedded flash object shows up as a [X] symbol in the
spreadsheet. The Flash object is executed by Excel (why the heck does Excel
support embedded Flash is a great question). The Flash object then uses the
CVE-2011-0609 vulnerability to execute code and to drop a Poison Ivy backdoor to
the system. The exploit code then closes Excel and the infection is over.

After this, Poison Ivy connects back to its server at good.mincesur.com. The
domain mincesur.com has been used in similar espionage attacks over an extended
period of time.



Once the connection is made, the attacker has full remote access to the infected
workstation. Even worse, it has full access to network drives that the user can
access. Apparently the attackers were able to leverage this vector further until
they gained access to the critical SecurID data they were looking for.

The attack e-mail does not look too complicated. In fact, it's very simple.
However, the exploit inside Excel was a zero-day at the time and RSA could not
have protected against it by patching their systems.

So, was this an Advanced attack? The e-mail wasn't advanced. The backdoor they
dropped wasn't advanced. But he exploit was advanced. And the ultimate target of
the attacker was advanced. If somebody hacks a security vendor just to gain
access to their customers systems, we'd say the attack is advanced, even if some
of the interim steps weren't very complicated.

Timo will be discussing his research on the topic in detail in the T2 Data
Security conference in October in his talk titled
"How RSA Was Breached".



P.S. For those who are still looking for the sample:

MD5 of the MSG file: 1e9777dc70a8c6674342f1796f5f1c49
MD5 of the XLS file: 4031049fe402e8ba587583c08a25221a