Jump to content
Tuts 4 You

An Insight into the Aurora Communication Protocol


Teddy Rogers

Recommended Posts

As we know, the recent Operation Aurora has been making waves due to a highly organized attack targeting companies such as Google, Adobe and other high profile companies. A security breach due to a vulnerability in Microsoft’s Internet Explorer, CVE-2010-0249, caused remote code execution leading to download of malware on compromised systems.


/>http://www.avertlabs.com/research/blog/index.php/2010/01/18/an-insight-into-the-aurora-communication-protocol/

Ted.

Link to comment
Share on other sites

Shub-Nigurrath

this is highly related


/>http://hexblog.com/2010/01/hexrays_against_aurora.html#more

a really interesting post!

Link to comment
Share on other sites

Here is another article by Joe Stewart... Operation Aurora: Clues in the Code


/>http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/

Ted.

Link to comment
Share on other sites

Here is another article by Joe Stewart... Operation Aurora: Clues in the Code


/>http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/

Ted.

This could be seen as a test "remarkable" that the origin is Chinese. (Some already undeniable).

Cheers!

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...