![]() And with a growing sense of dread, Leetham had finally traced the intruders’ footprints to their final targets: the secret keys known as “seeds,” a collection of numbers that represented a foundational layer of the security promises RSA made to its customers, including tens of millions of users in government and military agencies, defense contractors, banks, and countless corporations around the world. Leetham-a bald, bearded, and curmudgeonly analyst one coworker described to me as a “carbon-based hacker-finding machine”-had been glued to his laptop along with the rest of the company’s incident response team, assembled around the company’s glass-encased operations center in a nonstop, 24-hours-a-day hunt. It was a spring evening, he says, three days-maybe four, time had become a blur-after he had first begun tracking the hackers who were rummaging through the computer systems of RSA, the corporate security giant where he worked. ![]() Amid all the sleepless hours that Todd Leetham spent hunting ghosts inside his company’s network in early 2011, the experience that sticks with him most vividly all these years later is the moment he caught up with them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |