Andrew Cooke | Contents | Latest | RSS | Previous | Next

C[omp]ute

Welcome to my blog, which was once a mailing list of the same name and is still generated by mail. Please reply via the "comment" links.

Always interested in offers/projects/new ideas. Eclectic experience in fields like: numerical computing; Python web; Java enterprise; functional languages; GPGPU; SQL databases; etc. Based in Santiago, Chile; telecommute worldwide. CV; email.

Personal Projects

Choochoo Training Diary

Last 100 entries

Surprise Paradox; [Books] Good Author List; [Computing] Efficient queries with grouping in Postgres; [Computing] Automatic Wake (Linux); [Computing] AWS CDK Aspects in Go; [Bike] Adidas Gravel Shoes; [Computing, Horror] Biological Chips; [Books] Weird Lit Recs; [Covid] Extended SIR Models; [Art] York-based Printmaker; [Physics] Quantum Transitions are not Instantaneous; [Computing] AI and Drum Machines; [Computing] Probabilities, Stopping Times, Martingales; bpftrace Intro Article; [Computing] Starlab Systems - Linux Laptops; [Computing] Extended Berkeley Packet Filter; [Green] Mainspring Linear Generator; Better Approach; Rummikub Solver; Chilean Poetry; Felicitations - Empowerment Grant; [Bike] Fixing Spyre Brakes (That Need Constant Adjustment); [Computing, Music] Raspberry Pi Media (Audio) Streamer; [Computing] Amazing Hack To Embed DSL In Python; [Bike] Ruta Del Condor (El Alfalfal); [Bike] Estimating Power On Climbs; [Computing] Applying Azure B2C Authentication To Function Apps; [Bike] Gearing On The Back Of An Envelope; [Computing] Okular and Postscript in OpenSuse; There's a fix!; [Computing] Fail2Ban on OpenSuse Leap 15.3 (NFTables); [Cycling, Computing] Power Calculation and Brakes; [Hardware, Computing] Amazing Pockit Computer; Bullying; How I Am - 3 Years Post Accident, 8+ Years With MS; [USA Politics] In America's Uncivil War Republicans Are The Aggressors; [Programming] Selenium and Python; Better Walking Data; [Bike] How Fast Before Walking More Efficient Than Cycling?; [COVID] Coronavirus And Cycling; [Programming] Docker on OpenSuse; Cadence v Speed; [Bike] Gearing For Real Cyclists; [Programming] React plotting - visx; [Programming] React Leaflet; AliExpress Independent Sellers; Applebaum - Twilight of Democracy; [Politics] Back + US Elections; [Programming,Exercise] Simple Timer Script; [News] 2019: The year revolt went global; [Politics] The world's most-surveilled cities; [Bike] Hope Freehub; [Restaurant] Mama Chau's (Chinese, Providencia); [Politics] Brexit Podcast; [Diary] Pneumonia; [Politics] Britain's Reichstag Fire moment; install cairo; [Programming] GCC Sanitizer Flags; [GPU, Programming] Per-Thread Program Counters; My Bike Accident - Looking Back One Year; [Python] Geographic heights are incredibly easy!; [Cooking] Cookie Recipe; Efficient, Simple, Directed Maximisation of Noisy Function; And for argparse; Bash Completion in Python; [Computing] Configuring Github Jekyll Locally; [Maths, Link] The Napkin Project; You can Masquerade in Firewalld; [Bike] Servicing Budget (Spring) Forks; [Crypto] CIA Internet Comms Failure; [Python] Cute Rate Limiting API; [Causality] Judea Pearl Lecture; [Security, Computing] Chinese Hardware Hack Of Supermicro Boards; SQLAlchemy Joined Table Inheritance and Delete Cascade; [Translation] The Club; [Computing] Super Potato Bruh; [Computing] Extending Jupyter; Further HRM Details; [Computing, Bike] Activities in ch2; [Books, Link] Modern Japanese Lit; What ended up there; [Link, Book] Logic Book; Update - Garmin Express / Connect; Garmin Forerunner 35 v 230; [Link, Politics, Internet] Government Trolls; [Link, Politics] Why identity politics benefits the right more than the left; SSH Forwarding; A Specification For Repeating Events; A Fight for the Soul of Science; [Science, Book, Link] Lost In Math; OpenSuse Leap 15 Network Fixes; Update; [Book] Galileo's Middle Finger; [Bike] Chinese Carbon Rims; [Bike] Servicing Shimano XT Front Hub HB-M8010; [Bike] Aliexpress Cycling Tops; [Computing] Change to ssh handling of multiple identities?; [Bike] Endura Hummvee Lite II; [Computing] Marble Based Logic; [Link, Politics] Sanity Check For Nuclear Launch; [Link, Science] Entropy and Life

© 2006-2017 Andrew Cooke (site) / post authors (content).

Details on the RSA Attack

From: andrew cooke <andrew@...>

Date: Sat, 2 Apr 2011 08:49:07 -0300

On 17 March 2011 RSA dissclosed that it had detected an APT (Advanced
Persistent Threat - http://en.wikipedia.org/wiki/Advanced_Persistent_Threat)
to it's SecureID tokens - http://www.rsa.com/node.aspx?id=3872

SecureID tokens are small devices that display "random" numbers that you use
to connect to secure networks (the kind of thing that many banks here in Chile
use to secure online banking).  These are used by securityand political
agencies, amongst others, and an "APT" typically means "some foreign
government", so this could be a big deal.

More information on the attack has now been released -
http://blogs.rsa.com/rivner/anatomy-of-an-attack/ .  It seems that it was
started by using a zero-day attack agains Flash embedded in a mail attachment
sent to several workers.  Once the attackers could enter the system they used
privilege escalation attacks to gain access to secure servers and then
transferred data out.

No details, that I can see, on who was responsible.

Andrew

RSA Attackers Got (and Used) SecureID Data

From: andrew cooke <andrew@...>

Date: Sat, 28 May 2011 09:45:34 -0400

http://www.reuters.com/article/2011/05/27/us-usa-defense-hackers-idUSTRE74Q6VY20110527

Andrew

Secure ID Hack Confirmed

From: andrew cooke <andrew@...>

Date: Mon, 6 Jun 2011 23:19:26 -0400

http://online.wsj.com/article/SB10001424052702304906004576369990616694366.html

"The Lockheed attack showed that it was technologically feasible to hack a
third-party using data taken from RSA, and the defense contractor may not be
the last example."

Andrew

The RSA Email

From: andrew cooke <andrew@...>

Date: Fri, 26 Aug 2011 08:12:52 -0300

http://www.f-secure.com/weblog/archives/00002226.html

Andrew

Over 760 RSA Attack Victims

From: andrew cooke <andrew@...>

Date: Fri, 28 Oct 2011 08:45:44 -0300

https://krebsonsecurity.com/2011/10/who-else-was-hit-by-the-rsa-attackers/

"a list of companies whose networks were shown to have been phoning home to
some of the same control infrastructure that was used in the attack on RSA"

Andrew

Comment on this post