Cyber Attacks: Operation Aurora

780 Words2 Pages

Cyber-attacks are very common in the U.S. and around the world. However, From mid-2009 and through December 2009. One of the most sophisticated cyber-attacks was lunched against Google and 20 other companies (McAfee , 2013). McAfee researchers dubbed the attack Operation Aurora. The cyber-attack was first publicly disclosed by Google on January 12, 2010. A group named "Hidden Lynx” out of China is believed to be responsible. McAfee dubbed the Cyber-attack “Operation Aurora”. According to the anti-virus firm McAfee, the hackers were seeking source codes to Google, Adobe, Yahoo, and dozens of other high-profile companies (Zetter, 2010). McAfee firm reported the tactics used in the attack were unprecedented and used combined encryption and stealth programming to find an unknown backdoor into Microsoft internet explorer. Because of this vulnerability this allowed an access breach and allowed the hackers to steal intellectual property from Google and gain access to user’s accounts. McAfee researchers believe in detail hackers of Operation Aurora invisibly infiltrated different systems without any visible signs of malicious intent or actions in a couple of steps. The attack started with sending a link in an email or instant message from a “trusted” source directed to the targeted company or user. Since the link was believed to be trusted by the user. The user would click on the link a website that contains a malicious JavaScript payload. Due to the nature of an executable file, the browser will download the malicious JavaScript. The script will include a zero-day Internet Explorer exploit that will download a binary pretending to be Taiwan servers that will execute the payload. This Trojan will open a backdoor that is encrypted and ...

... middle of paper ...

...the system for the latest threats.
• Adhere to either the FISMA or NSA hardening guidelines and house the SCM on a single-use system.
• Have a good network forensics system that will store and log all traffic for offline analysis (McAfee Labs and McAfee Foundstone Professional Services 11-12).
Although cyber-attacks are quite common in the defense industry, Operation Aurora illuminated that even the once immune commercial sectors are no longer safe from cyber hacking. The world of cybercrime is quickly changing its focus to intellectual property repositories. With vulnerabilities out there, consumers will always be at risk for future attacks. Therefore, it is critical to protect their systems with latest updates and security protection programs such as McAfee. Countermeasures should be taken seriously to ensure system optimal against all threats malicious or not.

More about Cyber Attacks: Operation Aurora

Open Document