请输入您要查询的百科知识:

 

词条 Operation Aurora
释义

  1. History

  2. Attackers involved

  3. Attack analysis

  4. Response and aftermath

  5. See also

  6. References

  7. External links

{{confused|Aurora Generator Test}}{{Infobox military conflict
| conflict = Operation Aurora
| partof =
| image =
| caption =
| date = June–December 2009
| place = Not specified – occurs on a worldwide scale.
| result = Diplomatic incident between the United States and China
| combatant1 = {{flag|United States}}
  • Google

| combatant2 = {{flag|China}}
  • Unknown

| commander1 =
| commander2 =
| strength1 =
| strength2 =
| casualties1 = Google intellectual property stolen[1]
| casualties2 = Unknown
}}Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army.[1] First publicly disclosed by Google on January 12, 2010, in a blog post,[2] the attacks began in mid-2009 and continued through December 2009.[3]

The attack has been aimed at dozens of other organizations, of which Adobe Systems,[4] Juniper Networks[5] and Rackspace[6] have publicly confirmed that they were targeted. According to media reports, Yahoo, Symantec, Northrop Grumman, Morgan Stanley[7] and Dow Chemical[8] were also among the targets.

As a result of the attack, Google stated in its blog that it plans to operate a completely uncensored version of its search engine in China "within the law, if at all", and acknowledged that if this is not possible it may leave China and close its Chinese offices.[2] Official Chinese sources claimed this was part of a strategy developed by the U.S. government.[9]

The attack was named "Operation Aurora" by Dmitri Alperovitch, Vice President of Threat Research at cyber security company McAfee. Research by McAfee Labs discovered that "Aurora" was part of the file path on the attacker's machine that was included in two of the malware binaries McAfee said were associated with the attack. "We believe the name was the internal name the attacker(s) gave to this operation," McAfee Chief Technology Officer George Kurtz said in a blog post.[10]

According to McAfee, the primary goal of the attack was to gain access to and potentially modify source code repositories at these high tech, security and defense contractor companies. "[The SCMs] were wide open," says Alperovitch. "No one ever thought about securing them, yet these were the crown jewels of most of these companies in many ways—much more valuable than any financial or personally identifiable data that they may have and spend so much time and effort protecting."[11]

History

On January 12, 2010, Google revealed on its blog that it had been the victim of a cyber attack. The company said the attack occurred in mid-December and originated from China. Google stated that over 20 other companies had been attacked; other sources have since cited that more than 34 organizations were targeted.[8] As a result of the attack, Google said it was reviewing its business in China.[2] On the same day, United States Secretary of State Hillary Clinton issued a brief statement condemning the attacks and requesting a response from China.[12]

On January 13, 2010, the news agency All Headline News reported that the United States Congress plans to investigate Google's allegations that the Chinese government used the company's service to spy on human rights activists.[13]

In Beijing, visitors left flowers outside of Google's office. However, these were later removed, with a Chinese security guard stating that this was an "illegal flower tribute".[14] The Chinese government has yet to issue a formal response, although an anonymous official stated that China is seeking more information on Google's intentions.[15]

Attackers involved

{{Main|PLA Unit 61398}}

Technical evidence including IP addresses, domain names, malware signatures, and other factors, show Elderwood was behind the Operation Aurora attack, one of numerous attacks conducted by the Elderwood gang and others such as PLA Unit 61398, a Shanghai-based advanced persistent threat group also called "Comment Crew", named after the technique often used by the group involving internal software "comment" features on web pages, which are used to infiltrate target computers that access the sites. The two largest groups may employ hundreds of people, and work to compromise security and siphon business ideas, advanced designs, and trade secrets from various foreign computer networks.[16] The group behind the Operation Aurora attacks were dubbed "Elderwood" by Symantec after a source-code variable used by the attackers, and "Beijing Group" by Dell Secureworks. The group obtained some of Google's source code, as well as access to information about Chinese activists.[17] Along with other groups such as Unit 61398, also targeted numerous other companies in the shipping, aeronautics, arms, energy, manufacturing, engineering, electronics, financial, and software sectors.[1][18]

Elderwood specializes in attacking and infiltrating second-tier defense industry suppliers that make electronic or mechanical components for top defense companies. Those firms then become a cyber "stepping stone" to gain access to top-tier defense contractors. One attack procedure used by Elderwood is to infect legitimate websites frequented by employees of the target company – a so-called "water hole" attack, just as lions stake out a watering hole for their prey. Elderwood infects these less-secure sites with malware that downloads to a computer that clicks on the site. After that, the group searches inside the network to which the infected computer is connected, finding and then downloading executives' e-mails and critical documents on company plans, decisions, acquisitions, and product designs.[1]

Attack analysis

In its blog posting, Google stated that some of its intellectual property had been stolen. It suggested that the attackers were interested in accessing Gmail accounts of Chinese dissidents. According to the Financial Times, two accounts used by Ai Weiwei had been attacked, their contents read and copied; his bank accounts were investigated by state security agents who claimed he was under investigation for "unspecified suspected crimes".[19] However, the attackers were only able to view details on two accounts and those details were limited to things such as the subject line and the accounts' creation date.[2]

Security experts immediately noted the sophistication of the attack.[10] Two days after the attack became public, McAfee reported that the attackers had exploited purported zero-day vulnerabilities (unfixed and previously unknown to the target system developers) in Internet Explorer and dubbed the attack "Operation Aurora". A week after the report by McAfee, Microsoft issued a fix for the issue,[20] and admitted that they had known about the security hole used since September.[29] Additional vulnerabilities were found in Perforce, the source code revision software used by Google to manage their source code.[21][22]

VeriSign's iDefense Labs claimed that the attacks were perpetrated by "agents of the Chinese state or proxies thereof".[23]

According to a diplomatic cable from the U.S. Embassy in Beijing, a Chinese source reported that the Chinese Politburo directed the intrusion into Google's computer systems. The cable suggested that the attack was part of a coordinated campaign executed by "government operatives, public security experts and Internet outlaws recruited by the Chinese government."[24] The report suggested that it was part of an ongoing campaign in which attackers have "broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002."[25] According to The Guardian's reporting on the leak, the attacks were "orchestrated by a senior member of the Politburo who typed his own name into the global version of the search engine and found articles criticising him personally."[26]

Once a victim's system was compromised, a backdoor connection that masqueraded as an SSL connection made connections to command and control servers running in Illinois, Texas, and Taiwan, including machines that were running under stolen Rackspace customer accounts. The victim's machine then began exploring the protected corporate intranet that it was a part of, searching for other vulnerable systems as well as sources of intellectual property, specifically the contents of source code repositories.

The attacks were thought to have definitively ended on Jan 4 when the command and control servers were taken down, although it is not known at this point whether or not the attackers intentionally shut them down.[27] However, the attacks were still occurring as of February 2010.[3]

Response and aftermath

The German, Australian, and French governments publicly issued warnings to users of Internet Explorer after the attack, advising them to use alternative browsers at least until a fix for the security hole was made.[28][29][30] The German, Australian, and French governments considered all versions of Internet Explorer vulnerable or potentially vulnerable.[31][32]

In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a hole in Internet Explorer. The vulnerability affects Internet Explorer versions 6, 7, and 8 on Windows 7, Vista, Windows XP, Server 2003, Server 2008 R2, as well as IE 6 Service Pack 1 on Windows 2000 Service Pack 4.[33]

The Internet Explorer exploit code used in the attack has been released into the public domain, and has been incorporated into the Metasploit Framework penetration testing tool. A copy of the exploit was uploaded to Wepawet, a service for detecting and analyzing web-based malware operated by the computer security group at the University of California, Santa Barbara. "The public release of the exploit code increases the possibility of widespread attacks using the Internet Explorer vulnerability," said George Kurtz, CTO of McAfee, of the attack. "The now public computer code may help cyber criminals craft attacks that use the vulnerability to compromise Windows systems."[34]

Security company Websense said it identified "limited public use" of the unpatched IE vulnerability in drive-by attacks against users who strayed onto malicious Web sites.[35] According to Websense, the attack code it spotted is the same as the exploit that went public last week.{{unclear|date=March 2019}} "Internet Explorer users currently face a real and present danger due to the public disclosure of the vulnerability and release of attack code, increasing the possibility of widespread attacks," said George Kurtz, chief technology officer of McAfee, in a blog update.[36] Confirming this speculation, Websense Security Labs identified additional sites using the exploit on January 19.[37] According to reports from Ahnlab, the second URL was spread through the Instant Messenger network Misslee Messenger, a popular IM client in South Korea.[37]

Researchers have created attack code that exploits the vulnerability in Internet Explorer 7 (IE7) and IE8—even when Microsoft's recommended defensive measure (Data Execution Prevention (DEP)) is turned on.{{dubious|Protected Mode, not DEP is the defensive mechanism in IE|date=August 2013}} According to Dino Dai Zovi, a security vulnerability researcher, "even the newest IE8 isn't safe from attack if it's running on Windows XP Service Pack 2 (SP2) or earlier, or on Windows Vista RTM (release to manufacturing), the version Microsoft shipped in January 2007."[38]

Microsoft admitted that the security hole used had been known to them since September.[39] Work on an update was prioritized[40] and on Thursday, January 21, 2010, Microsoft released a security patch aiming to counter this weakness, the published exploits based on it and a number of other privately reported vulnerabilities.[41] They did not state if any of the latter had been used or published by exploiters or whether these had any particular relation to the Aurora operation, but the entire cumulative update was termed critical for most versions of Windows, including Windows 7.

Security researchers continued to investigate the attacks. HBGary, a security firm, released a report in which they claimed to have found some significant markers that might help identify the code developer. The firm also said that the code was Chinese language based but could not be specifically tied to any government entity.[42]

On February 19, 2010, a security expert investigating the cyber-attack on Google, has claimed that the people behind the attack were also responsible for the cyber-attacks made on several Fortune 100 companies in the past one and a half years. They have also tracked the attack back to its point of origin, which seems to be two Chinese schools, Shanghai Jiao Tong University and Lanxiang Vocational School.[43] As highlighted by The New York Times, both of these schools have ties with the Chinese search engine Baidu, a rival of Google China.[44] Both Lanxiang Vocational and Jiaotong University have denied the allegation.[45][46]

In March 2010, Symantec, which was helping investigate the attack for Google, identified Shaoxing as the source of 21.3% of all (12 billion) malicious emails sent throughout the world.[47]

To prevent future cyberattacks such as Operation Aurora, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that the United States and China agree to a policy of mutually assured restraint with respect to cyberspace. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps; it would also entail vetting these commitments.[48]

See also

  • Honker Union
  • Cyber-warfare
  • Titan Rain
  • Chinese intelligence activity in other countries
  • GhostNet
  • Economic and Industrial Espionage
  • Chinese Intelligence Operations in the United States
  • Vulcanbot

References

1. ^{{cite web|last=Clayton|first=Mark|title=Stealing US business secrets: Experts ID two huge cyber 'gangs' in China|url=http://www.csmonitor.com/USA/2012/0914/Stealing-US-business-secrets-Experts-ID-two-huge-cyber-gangs-in-China |work=Christian Science Monitor|accessdate=24 February 2013|date=14 September 2012}}
2. ^{{cite web|url=http://googleblog.blogspot.com/2010/01/new-approach-to-china.html|title=A new approach to China|date=2010-01-12 |publisher=Google Inc.|accessdate=17 January 2010}}
3. ^{{cite news|title='Aurora' Attacks Still Under Way, Investigators Closing In On Malware Creators |newspaper=Dark Reading |publisher=DarkReading.com |url=http://www.darkreading.com/vulnerability_management/security/attacks/showArticle.jhtml?articleID=222700786|date=2010-02-10|accessdate=2010-02-13}}
4. ^{{cite web|url=http://blogs.adobe.com/conversations/2010/01/adobe_investigates_corporate_n.html|title=Adobe Investigates Corporate Network Security Issue|date=2010-01-12|accessdate=17 January 2010}}
5. ^{{cite web|url=http://www.marketwatch.com/story/juniper-networks-investigating-cyber-attacks-2010-01-15|title=Juniper Networks investigating cyber-attacks|date=2010-01-15|publisher=MarketWatch|accessdate=17 January 2010}}
6. ^{{cite web|url=http://www.rackspace.com/blog/?p=800|title=Rackspace Response to Cyber Attacks|accessdate=17 January 2010|deadurl=yes|archiveurl=https://web.archive.org/web/20100118021627/http://www.rackspace.com/blog/?p=800|archivedate=18 January 2010|df=}}
7. ^{{cite web|url=http://www.theinquirer.net/inquirer/news/2029754/hbgary-email-leak-claims-morgan-stanley-hacked|title=HBGary email leak claims Morgan Stanley was hacked|accessdate=2 Mar 2010}}
8. ^{{cite news |url=https://www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011300359.html|title=Google China cyberattack part of vast espionage campaign, experts say |last=Cha|first=Ariana Eunjung|author2=Ellen Nakashima|date=2010-01-14|work=The Washington Post|accessdate=17 January 2010}}
9. ^{{cite news|url=http://www.ft.com/cms/s/e6022fe0-05c6-11df-88ee-00144feabdc0,Authorised=false.html|title=Chinese media hit at 'White House's Google'|last=Hille|first=Kathrine|date=2010-01-20|work=Financial Times|accessdate=20 January 2010}}
10. ^{{cite web|url=http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others |first=George |last=Kurtz |title=Operation "Aurora" Hit Google, Others |publisher=McAfee, Inc. |date=2010-01-14|access-date=17 January 2010|archive-url=https://web.archive.org/web/20120911141122/http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-others |archive-date=11 September 2012}}
11. ^{{cite news|url=https://www.wired.com/threatlevel/2010/03/source-code-hacks/|title='Google' Hackers Had Ability to Alter Source Code|work=Wired|date=2010-03-03|accessdate=4 March 2010|first=Kim|last=Zetter}}
12. ^{{cite web|url=https://www.state.gov/secretary/rm/2010/01/135105.htm|title=Statement on Google Operations in China|last=Clinton|first=Hillary|date=2010-01-12|publisher=US Department of State|accessdate=17 January 2010}}
13. ^{{cite web|url=http://www.allheadlinenews.com/articles/7017511426?Congress%20to%20Investigate%20Google%20Charges%20Of%20Chinese%20Internet%20Spying|title=Congress to Investigate Google Charges Of Chinese Internet Spying|publisher=All Headline News|date=13 January 2010|accessdate=13 January 2010|deadurl=yes|archiveurl=https://web.archive.org/web/20100328165130/http://www.allheadlinenews.com/articles/7017511426?Congress%20to%20Investigate%20Google%20Charges%20Of%20Chinese%20Internet%20Spying|archivedate=28 March 2010|df=}}
14. ^{{cite news|url=http://www.theepochtimes.com/n2/content/view/28043/|title=Flowers Laid, and Removed, at Google Headquarters in China|last=Robertson|first=Matthew|date=2010-01-14|work=The Epoch Times|accessdate=18 January 2010}}
15. ^{{cite news|url=http://www.chinadaily.com.cn/china/2010-01/13/content_9316162.htm|title=Chinese govt seeks information on Google intentions|date=2010-01-13|agency=Xinhua|work=China Daily|accessdate=18 January 2010}}
16. ^{{cite web|last=Martin|first=Adam|title=Meet 'Comment Crew,' China's Military-Linked Hackers|url=http://nymag.com/daily/intelligencer/2013/02/meet-comment-crew-chinas-military-hackers.html|work=New York|accessdate=24 February 2013|date=19 February 2013}}
17. ^{{cite web|last=Nakashima|first=Ellen|title=Chinese hackers who breached Google gained access to sensitive data, U.S. officials say |url=https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html|work=WashingtonPost|accessdate=5 December 2015}}
18. ^{{cite web|last=Riley|first=Michael|title=Hackers Linked to China's Army Seen From EU to D.C.|url=https://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html|publisher=Bloomberg|accessdate=24 February 2013|author2=Dune Lawrence|date=26 July 2012}}
19. ^{{cite news |url=http://www.ft.com/cms/s/0/c590cdd0-016a-11df-8c54-00144feabdc0.html |title=The Chinese dissident’s ‘unknown visitors’ |author=Anderlini, Jamil |work=Financial Times|date=January 15, 2010}}
20. ^{{cite web |url=http://www.microsoft.com/technet/security/advisory/979352.mspx|title=Microsoft Security Advisory (979352)|date=2010-01-21|publisher=Microsoft|accessdate=26 January 2010}}
21. ^{{cite web|url=https://www.wired.com/images_blogs/threatlevel/2010/03/operationaurora_wp_0310_fnl.pdf|title=Protecting Your Critical Assets, Lessons Learned from "Operation Aurora", By McAfee Labs and McAfee Foundstone Professional Services|author=|date=|website=wired.com}}
22. ^{{cite web|url=https://www.wired.com/threatlevel/2010/03/source-code-hacks/|title='Google' Hackers Had Ability to Alter Source Code|work=Wired |accessdate=27 July 2016}}
23. ^{{cite web|url=https://arstechnica.com/security/news/2010/01/researchers-identify-command-servers-behind-google-attack.ars|title=Researchers identify command servers behind Google attack|last=Paul|first=Ryan|date=2010-01-14|publisher=Ars Technica|accessdate=17 January 2010}}
24. ^{{cite news |title=Cables Obtained by WikiLeaks Shine Light Into Secret Diplomatic Channels |first1=Scott |last1=Shane |first2=Andrew W. |last2=Lehren |newspaper=The New York Times |date=28 November 2010 |url=https://www.nytimes.com/2010/11/29/world/29cables.html?_r=1&hp |accessdate=28 November 2010}}
25. ^{{cite news |author=Scott Shane and Andrew W. Lehren |title=Leaked Cables Offer Raw Look at U.S. Diplomacy |work=The New York Times |quote=The Google hacking was part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, ... |date=November 28, 2010 |url=https://www.nytimes.com/2010/11/29/world/29cables.html |accessdate=2010-12-26}}
26. ^[https://www.theguardian.com/world/2010/nov/28/us-embassy-cable-leak-diplomacy-crisis US embassy cables leak sparks global diplomatic crisis] The Guardian 28 November 2010
27. ^{{cite news|url=https://www.wired.com/threatlevel/2010/01/operation-aurora/|title=Google Hack Attack Was Ultra Sophisticated, New Details Show|date=2010-01-14|work=Wired|accessdate=23 January 2010|first=Kim|last=Zetter}}
28. ^{{cite news|url=http://tvnz.co.nz/technology-news/france-germany-warn-internet-explorer-users-3334330|title=France, Germany warn Internet Explorer users|last=One News|date=19 January 2010|publisher=TVNZ|accessdate=22 January 2010}}
29. ^{{cite news|url=https://www.independent.co.uk/life-style/gadgets-and-tech/news/why-you-should-change-your-internet-browser-and-how-to-choose-the-best-one-for-you-1872048.html|title=Why you should change your internet browser and how to choose the best one for you|last=Relax News|date=18 January 2010|work=The Independent|accessdate=22 January 2010 |location=London}}
30. ^{{cite web|url=http://www.abc.net.au/news/stories/2010/01/19/2795684.htm|title=Govt issues IE security warning|date=19 January 2010|publisher=ABC (Australia)|accessdate=27 July 2016}}
31. ^{{cite news|url=http://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=10620973|title=France, Germany warn against Internet Explorer|last=NZ Herald Staff|date=19 January 2010|work=The New Zealand Herald|accessdate=22 January 2010}}
32. ^{{cite news |url=https://www.telegraph.co.uk/technology/microsoft/7011626/Germany-warns-against-using-Microsoft-Internet-Explorer.html|title=Germany warns against using Microsoft Internet Explorer |last=Govan|first=Fiona|date=18 January 2010|work=The Daily Telegraph|accessdate=22 January 2010 |location=London}}
33. ^{{cite news|url=http://news.cnet.com/8301-27080_3-10435232-245.html|title=New IE hole exploited in attacks on U.S. firms|last=Mills|first=Elinor|date=14 January 2010|publisher=CNET|accessdate=22 January 2010}}
34. ^{{cite news|url=http://www.infosecurity-us.com/view/6537/internet-explorer-zeroday-code-goes-public/|title=Internet Explorer zero-day code goes public|date=18 January 2010|publisher=Infosecurity|accessdate=22 January 2010}}
35. ^{{cite web|url=http://securitylabs.websense.com/content/Blogs/3530.aspx|title=Security Labs – Security News and Views – Raytheon – Forcepoint|publisher=|accessdate=27 July 2016}}
36. ^{{cite web|url=http://www.computerworld.com/s/article/9145721/Hackers_wield_newest_IE_exploit_in_drive_by_attacks |title=Hackers wield newest IE exploit in drive-by attacks|first=Gregg|last=Keizer|publisher=|accessdate=27 July 2016}}
37. ^{{cite web|url=http://securitylabs.websense.com/content/Blogs/3534.aspx|title=Security Labs – Security News and Views – Raytheon – Forcepoint|publisher=|accessdate=27 July 2016}}
38. ^{{cite news|url=http://www.computerworld.com/s/article/9145958/Researchers_up_ante_create_exploits_for_IE7_IE8?taxonomyId=17|title=Researchers up ante, create exploits for IE7, IE8|last=Keizer|first=Gregg|date=19 January 2010|publisher=Computerworld|accessdate=22 January 2010}}
39. ^Naraine, Ryan. Microsoft knew of IE zero-day flaw since last September, ZDNet, January 21, 2010. Retrieved 28 January 2010.
40. ^{{cite web|url=http://blogs.zdnet.com/security/?p=5268|title=Security – ZDNet|publisher=|accessdate=27 July 2016}}
41. ^{{cite web|url=http://www.microsoft.com/technet/security/bulletin/MS10-002.mspx|title=Microsoft Security Bulletin MS10-002 – Critical|publisher=|accessdate=27 July 2016}}
42. ^{{cite news|url=http://www.thenewnewinternet.com/2010/02/12/hunting-down-the-aurora-creator/|title=Hunting Down the Aurora Creator|date=13 February 2010|publisher=TheNewNewInternet|accessdate=13 February 2010}}(Dead link)
43. ^{{cite news|url=https://www.nytimes.com/2010/02/19/technology/19china.html|title=2 China Schools Said to Be Tied to Online Attacks|date=18 February 2010|publisher=New York Times|accessdate=26 March 2010 |first1=John |last1=Markoff |first2=David |last2=Barboza}}
44. ^{{cite news|url=http://www.itproportal.com/2010/02/19/google-aurora-attack-originated-chinese-schools/|title=Google Aurora Attack Originated From Chinese Schools|date=19 February 2010|publisher=itproportal|accessdate=19 February 2010}}
45. ^{{cite web|url=https://www.wsj.com/articles/SB10001424052702304563104576363461062076684|title=Chefs Who Spy? Tracking Google's Hackers in China|first=James T.|last=Areddy|date=4 June 2011|publisher=|via=www.wsj.com}}
46. ^{{cite web|url=http://en.sjtu.edu.cn/news/shanghai-dailycyber-expert-slams-spy-report/|title=Jiao Tong University - 【Shanghai Daily】Cyber expert slams "spy" report|first=Jiao Tong|last=University|date=|website=en.sjtu.edu.cn}}
47. ^Sheridan, Michael, "Chinese City Is World's Hacker Hub", London Sunday Times, March 28, 2010.
48. ^Etzioni, Amitai, "MAR: A Model for US-China Relations," The Diplomat, September 20, 2013,  .

External links

  • Google China insiders may have helped with attack news.cnet.com
  • Operation Aurora – Beginning Of The Age of Ultra-Sophisticated Hack Attacks! Sporkings.com January 18, 2010
  • In Google We Trust Why the company's standoff with China might change the future of the Internet. Rafal Rohozinski interviewed by Jessica Ramirez of Newsweek on 2010.1.29
  • Recent Cyber Attacks – More than what meets the eye? Sporkings.com February 19, 2010
  • [https://www.wired.com/threatlevel/2010/03/source-code-hacks/ ‘Google’ Hackers Had Ability to Alter Source Code] Wired.com March 3, 2010
  • [https://www.theregister.co.uk/2010/01/26/aurora_attack_origins/ 'Aurora' code circulated for years on English sites Where's the China connection?]
  • Gross, Michael Joseph, "Enter the Cyber-dragon", Vanity Fair, September 2011.
  • Bodmer, S., Kilger, M., Carpenter, G., & Jones, J. (2012). Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. {{ISBN|0-07-177249-9}}, {{ISBN|978-0-07-177249-5}}
  • [https://www.youtube.com/watch?v=SLnne4itbvA The Operation Aurora Internet Explorer exploit – live!]
  • [https://www.youtube.com/watch?v=jfT_GuR3blA McAfee Operation Aurora Overview]
  • [https://www.youtube.com/watch?v=8Y5Vbp6qQRI Operation Aurora Explained by CNET]
{{McAfee}}{{Hacking in the 2010s}}

9 : Cyberattacks|Advanced persistent threat|Cyberwarfare in China|Cyberwarfare in the United States|China–United States relations|2009 controversies|2009 crimes|2009 in technology|McAfee

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/17 7:58:10