SHARE
Facebook X Pinterest WhatsApp

Breaching the NSA: Is Your Enterprise Next?

Venafi, a leading cyber security company in next-generation trust protection, recently announced the results of in-depth research by its Threat Center team into how Edward Snowden successfully breached the National Security Agency (NSA). After months of review, analysis and peer feedback, this research reveals that the contract worker leveraged valid credentials as a low-level system […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Nov 27, 2013

Venafi, a leading cyber security company in next-generation trust protection, recently announced the results of in-depth research by its Threat Center team into how Edward Snowden successfully breached the National Security Agency (NSA). After months of review, analysis and peer feedback, this research reveals that the contract worker leveraged valid credentials as a low-level system administrator to fabricate cryptographic keys and digital certificates, which he then used to access and steal classified information and U.S. intellectual property. The NSA’s inability to detect or respond to anomalous key and certificate activity on its network allowed him to infiltrate systems and exfiltrate data without being detected.

Breaching the NSA: Is Your Enterprise Next? - slide 1

Click through for a closer look at how NSA security was breached and how it could happen to your organization, as identified by Venafi.

Breaching the NSA: Is Your Enterprise Next? - slide 2

Military experts, and now IT security teams, are using Kill Chain analysis to establish how an adversary can attack or has attacked an organization.

Breaching the NSA: Is Your Enterprise Next? - slide 3

Just like any government contractor, Edward Snowden was issued a CAC smart card with digital certificates and keys. As an administrator, he was also issued SSH keys for systems he was required to administer. This allowed Snowden to have valid access to some data and understand what else was out there.

Breaching the NSA: Is Your Enterprise Next? - slide 4

As described in testimony by General Keith Alexander, Edward Snowden fabricated digital keys because of the NSA’s failure to detect anomalies. He used his authorized access to create new keys, obtain unauthorized keys, and create trust for new keys.

Breaching the NSA: Is Your Enterprise Next? - slide 5

To get data out unnoticed, Edward Snowden needed to transfer data between systems. The transfer needed to go undetected, so he encrypted his data transfer sessions using self-signed certificates.

Breaching the NSA: Is Your Enterprise Next? - slide 6

What attackers are looking for.

Breaching the NSA: Is Your Enterprise Next? - slide 7

17K keys and certificated per enterprise.

Breaching the NSA: Is Your Enterprise Next? - slide 8

Over half of all enterprises don’t know where keys and certificated are or how to use them.

Breaching the NSA: Is Your Enterprise Next? - slide 9

Sixty percent have more than a 24 hour response time.

Breaching the NSA: Is Your Enterprise Next? - slide 10

There has been a 10x increase in malware digitally signed with a compromised or stolen digital certificate.

Breaching the NSA: Is Your Enterprise Next? - slide 11

Your organization is a target and cannot hide. All enterprises have had attacks on keys and certificates within the last two years.

Breaching the NSA: Is Your Enterprise Next? - slide 12

If the most secure organization in the world can be attacked, guess who’s next.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.