Preview

Operation Aurora Overview

Better Essays
Open Document
Open Document
1078 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operation Aurora Overview
Cyber-attacks are common in the defense industry, but in January 2010, a sophisticated, advanced persistent threat hacked into the commercial sector forever changing the face of cyber security. Dubbed “Operation Aurora” by McAfee, the attack targeted specific high profile corporations to obtain valuable intellectual property. Google, Yahoo, Juniper Networks and Adobe Systems were also among the victims of this highly coordinated cyber heist. By manipulating computer codes the attackers were able to exploit the Microsoft Internet Explorer vulnerabilities to gain access and obtain valuable sensitive information from over thirty high profile companies. Operation Aurora proves that the world is entering into a high-risk era where cybercrimes are no longer solely targeting governments but all sectors of different corporations and companies that were once immune are now under threat (McAfee Labs and McAfee Foundstone Professional Services 1).
According to Microsoft, sources admitted that there was an apparent Internet Explorer flaw in as earlier as September 2009. The Microsoft Security Response Center was planning to issue a patch for this vulnerability in February 2010. Unfortunately, Operation Aurora was able to hack into the vulnerabilities of Microsoft Explorer and exploit its codes to gain access and possibly take complete control of affected systems during the December 2009 and January 2010 time period (Naraine). A similar attack was discovered in July 2009, in which approximately 100 IT companies were hacked into by emails with malicious PDF attachments. The results and effects of the attacks have not been released therefore the success of that attack was unclear (Zetter, Google Hackers Targeted Source Code of More Than 30 Companies | Threat Level | Wired.com).
McAfee explains that the hackers of Operation Aurora invisibly infiltrated different systems without any visible signs of malicious intent or actions in a couple of steps. The attack began with



Cited: Evers, Joris and Ian Bain. McAfee Offers Guidance and Protection as China-Linked Google Cyberattack Continues to Unfold. 17 January 2010. 03 September 2010 . McAfee Labs and McAfee Foundstone Professional Services. "White Paper: Protecting Your Critical Assets – Lessons Learned from “Operation Aurora”." March 2010. McAfee - threat_center - McAfee Labs Technical White Papers. 03 September 2010 . Naraine, Ryan. Microsoft knew of IE zero-day flaw since last September | ZDNet.com. 21 January 2010. 03 September 2010 . Zetter, Kim. Google Hack Attack Was Ultra Sophisticated, New Details Show | Threat Level | Wired.com. 14 January 2010. 03 September 2010 . —. Google Hackers Targeted Source Code of More Than 30 Companies | Threat Level | Wired.com. 13 January 2010. 03 September 2010 .

You May Also Find These Documents Helpful

  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Badke, Williams. “How Stupid Is Google Making Us?” Online, Nov/Dec2010, Vol. 34 Issue 6, p51-53, 3p.…

    • 291 Words
    • 2 Pages
    Good Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    "Key Events in the History of Computer Hacking (sidebar)." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 6 June 2008. Web. 24 June 2013. .…

    • 1042 Words
    • 5 Pages
    Good Essays