SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Industry Advisory
Two-Factor Authentication Compromise
Initial Distribution: April 4, 2011
Increased Threats to Authentication Services
Why am I receiving this? >>
About NERC Alerts >>
Status: No Reporting is Required – For Information Only
Public: No restrictions. Will be posted to NERC’s website alert
page.
More on handling >>
Instructions: NERC Advisories are designed to improve reliability by disseminating critical
reliability information and are made available pursuant to Rule 810 of
NERC’s Rules of Procedure, for such use as your organization deems
appropriate. No particular response is necessary. This NERC Advisory is
not the same as a reliability standard, and your organization will not be
subject to penalties for a failure to implement this Advisory. Additionally,
issuance of this Advisory does not lower or otherwise alter the requirements
of any approved Reliability Standard, or excuse the prior failure to follow the
practices discussed in the Advisory if such failure constitutes a violation of a
Reliability Standard.
Distribution: Initial Distribution: Primary Compliance Contacts
Reliability Coordinator, Transmission Owner, Transmission Operator,
Balancing Authority, Generation Owner, Generation Operator, Distribution
Provider.
Who else will get this alert? >>
What are my responsibilities? >>
Primary Interest
Groups:
Cyber Security – Control Systems, Cyber Security – Corporate IT, System
Administrators, EMS Administrators, GMS Administrators, RSA
Administrators
Advisory: NERC has confirmed with RSA the recent cyber attack on SecurID two-factor
authentication products. This attack may affect the security of the two-factor
authentication tokens from RSA used by industry to allow remote access to
entity devices and systems. Although the extent of the cyber attack on RSA
is unknown, enough information may have been obtained by the attacker to
allow a less sophisticated attack such as social engineering to succeed. The
concern now is focused on information systems administration and user
education steps that should be taken to help detect or prevent potential
attackers from acquiring additional information from users.
NERC is encouraging entities to implement the mitigation strategies outlined
in Attachment 1 of this Advisory. This attachment contains specific
information and suggested actions for mitigation in accordance with standard
detection, prevention, and recovery phases of an
effective incident response and cybersecurity program.
NERC is further encouraging entities to carefully review the Early Warning
and Indicator Notice (EWIN)-11-077-01A Update that is attached to the Alert
and take appropriate actions as described in Attachment 1.
Since RSA has confirmed that specific information related to SecurID two-
factor authentication products was compromised with the extent of the
compromise unknown, the ES-ISAC estimates the potential risk to bulk
power system reliability from this attack is MEDIUM.
Attached:
Attachment 1 – Mitigation Measures for Two Factor Authentication
Compromise
Attachment 2 – Early Warning and Indicator Notice (EWIN)-11-077-01A
UPDATE
Background: On March 17, 2011, RSA announced that a cyber attack on its systems was
successful and resulted in the compromise and disclosure of information
“specifically related to RSA's SecurID two-factor authentication products.”
While the full extent of the breach remains unconfirmed, RSA states that “this
information could potentially be used to reduce the effectiveness of a current
two-factor authentication implementation as part of a broader attack.”
Enough information may have been obtained by the attacker to facilitate
successful spearphishing or social engineering attacks.
Attachment 1 provides specific actions for consideration by IT administrators
and end user communities. Possible attack vectors include:
1. RSA Seed Record Compromise – A seed record is a shared secret
between a hardware authenticator (e.g. token) and the authentication server.
These seed records are commonly, but not always, used in combination with
a user generated Personal Identification Number (PIN). Compromise of the
seed code could potentially allow duplicate token values to be generated
without possession of the token requiring only the guessing of the Users PIN,
if a PIN had been used, to achieve full compromise and potential subsequent
access.
2. Social engineering – Social engineering attacks trick users into
performing an act that provides the attacker with confidential information.
Depending on the nature of the information that was compromised from RSA,
social engineering could be used to obtain the missing information necessary
for the adversary to guess a Users PIN or might even trick the User into
giving their PIN directly to the attacker.
Although an old technique, social engineering attacks are still effective and
end user training is critical for reminding users to be wary of such attacks and
to report suspicious events.
Contact: Steve Applegate
Cyber Security Threat and Vulnerability Program Manager
North American Electric Reliability Corporation (NERC)
1120 G Street NW, Suite 990
Washington, DC 20005
Telephone: (202) 503-7192
Fax: (202) 393-3955
Steven.Applegate@nerc.net
To report any incidents related to this Advisory, contact:
ES-ISAC 24-hour hotline
609.452.1422
esisac@nerc.com
A-2011-04-04-01
You have received this message because you are listed as the designated contact for your organization on the North American
Electric Reliability Corporation’s compliance registry. If believe you have received this message in error, please notify the sender
immediately and delete or otherwise dispose of all occurrences or references to this email. If you have questions about your
membership in this list, please contact Chris Lada at NERC by calling 609.452.8060 or emailing Chris directly at: chris.lada@nerc.net.
North American Electric Reliability Corporation
116-390 Village Blvd.
Princeton, NJ 08540
609.452.8060 | www.nerc.com

Contenu connexe

Plus de Hai Nguyen

Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808Hai Nguyen
 

Plus de Hai Nguyen (20)

Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

A 2011-04-02-01 two-factor authentication compromise-final

  • 1. Industry Advisory Two-Factor Authentication Compromise Initial Distribution: April 4, 2011 Increased Threats to Authentication Services Why am I receiving this? >> About NERC Alerts >> Status: No Reporting is Required – For Information Only Public: No restrictions. Will be posted to NERC’s website alert page. More on handling >> Instructions: NERC Advisories are designed to improve reliability by disseminating critical reliability information and are made available pursuant to Rule 810 of NERC’s Rules of Procedure, for such use as your organization deems appropriate. No particular response is necessary. This NERC Advisory is not the same as a reliability standard, and your organization will not be subject to penalties for a failure to implement this Advisory. Additionally, issuance of this Advisory does not lower or otherwise alter the requirements of any approved Reliability Standard, or excuse the prior failure to follow the practices discussed in the Advisory if such failure constitutes a violation of a Reliability Standard. Distribution: Initial Distribution: Primary Compliance Contacts Reliability Coordinator, Transmission Owner, Transmission Operator, Balancing Authority, Generation Owner, Generation Operator, Distribution Provider. Who else will get this alert? >> What are my responsibilities? >> Primary Interest Groups: Cyber Security – Control Systems, Cyber Security – Corporate IT, System Administrators, EMS Administrators, GMS Administrators, RSA Administrators Advisory: NERC has confirmed with RSA the recent cyber attack on SecurID two-factor authentication products. This attack may affect the security of the two-factor authentication tokens from RSA used by industry to allow remote access to entity devices and systems. Although the extent of the cyber attack on RSA is unknown, enough information may have been obtained by the attacker to allow a less sophisticated attack such as social engineering to succeed. The concern now is focused on information systems administration and user education steps that should be taken to help detect or prevent potential attackers from acquiring additional information from users. NERC is encouraging entities to implement the mitigation strategies outlined in Attachment 1 of this Advisory. This attachment contains specific information and suggested actions for mitigation in accordance with standard
  • 2. detection, prevention, and recovery phases of an effective incident response and cybersecurity program. NERC is further encouraging entities to carefully review the Early Warning and Indicator Notice (EWIN)-11-077-01A Update that is attached to the Alert and take appropriate actions as described in Attachment 1. Since RSA has confirmed that specific information related to SecurID two- factor authentication products was compromised with the extent of the compromise unknown, the ES-ISAC estimates the potential risk to bulk power system reliability from this attack is MEDIUM. Attached: Attachment 1 – Mitigation Measures for Two Factor Authentication Compromise Attachment 2 – Early Warning and Indicator Notice (EWIN)-11-077-01A UPDATE Background: On March 17, 2011, RSA announced that a cyber attack on its systems was successful and resulted in the compromise and disclosure of information “specifically related to RSA's SecurID two-factor authentication products.” While the full extent of the breach remains unconfirmed, RSA states that “this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.” Enough information may have been obtained by the attacker to facilitate successful spearphishing or social engineering attacks. Attachment 1 provides specific actions for consideration by IT administrators and end user communities. Possible attack vectors include: 1. RSA Seed Record Compromise – A seed record is a shared secret between a hardware authenticator (e.g. token) and the authentication server. These seed records are commonly, but not always, used in combination with a user generated Personal Identification Number (PIN). Compromise of the seed code could potentially allow duplicate token values to be generated without possession of the token requiring only the guessing of the Users PIN, if a PIN had been used, to achieve full compromise and potential subsequent access. 2. Social engineering – Social engineering attacks trick users into performing an act that provides the attacker with confidential information. Depending on the nature of the information that was compromised from RSA, social engineering could be used to obtain the missing information necessary for the adversary to guess a Users PIN or might even trick the User into giving their PIN directly to the attacker. Although an old technique, social engineering attacks are still effective and end user training is critical for reminding users to be wary of such attacks and to report suspicious events.
  • 3. Contact: Steve Applegate Cyber Security Threat and Vulnerability Program Manager North American Electric Reliability Corporation (NERC) 1120 G Street NW, Suite 990 Washington, DC 20005 Telephone: (202) 503-7192 Fax: (202) 393-3955 Steven.Applegate@nerc.net To report any incidents related to this Advisory, contact: ES-ISAC 24-hour hotline 609.452.1422 esisac@nerc.com A-2011-04-04-01 You have received this message because you are listed as the designated contact for your organization on the North American Electric Reliability Corporation’s compliance registry. If believe you have received this message in error, please notify the sender immediately and delete or otherwise dispose of all occurrences or references to this email. If you have questions about your membership in this list, please contact Chris Lada at NERC by calling 609.452.8060 or emailing Chris directly at: chris.lada@nerc.net. North American Electric Reliability Corporation 116-390 Village Blvd. Princeton, NJ 08540 609.452.8060 | www.nerc.com