RSA hacking fallout!

The hack that occurred on May 24th is having resounding fallout in the form of hacking using cloned devices. When we first blogged about the hack the question was what did the hackers actually make off with and was it enough to cause serious damage. The answer, as it turns out, is a resounding, “YES”. Subsequent hacks against Lockheed Martin, L-3 Communications and Northrop Grumman have forced RSA to start replacing those fun little two-factor authentication SecurID tokens. Yikes!

The RSA hack that occurred on May 24th is having resounding fallout in the form of hacking using cloned devices.  When we first blogged about the hack the question was what did the hackers actually make off with and was it enough to cause serious damage.  The answer, as it turns out, is a resounding, “YES”.   Subsequent hacks against Lockheed Martin, L-3 Communications and Northrop Grumman have forced RSA to start replacing those fun little two-factor authentication SecurID tokens.

Per RSA:

    • RSA will replace the SecurID tokens for customers that need to protect their intellectual property and corporate networks, which in essence could apply to all of the company’s customers.

 

    • RSA is offering to set up specific “risk-based authentication strategies” for customers with a large number of users who typically conduct online financial transations.

 

Yikes!

Thoughts?  Sound off below or feel free to reach out to us at IDMWorks.