Teddy Rogers Posted January 20, 2010 Share Posted January 20, 2010 As we know, the recent Operation Aurora has been making waves due to a highly organized attack targeting companies such as Google, Adobe and other high profile companies. A security breach due to a vulnerability in Microsoft’s Internet Explorer, CVE-2010-0249, caused remote code execution leading to download of malware on compromised systems./>http://www.avertlabs.com/research/blog/index.php/2010/01/18/an-insight-into-the-aurora-communication-protocol/Ted. Link to comment Share on other sites More sharing options...
Shub-Nigurrath Posted January 20, 2010 Share Posted January 20, 2010 this is highly related />http://hexblog.com/2010/01/hexrays_against_aurora.html#morea really interesting post! Link to comment Share on other sites More sharing options...
Teddy Rogers Posted January 21, 2010 Author Share Posted January 21, 2010 Here is another article by Joe Stewart... Operation Aurora: Clues in the Code/>http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/Ted. Link to comment Share on other sites More sharing options...
Shaddy Posted January 21, 2010 Share Posted January 21, 2010 Here is another article by Joe Stewart... Operation Aurora: Clues in the Code/>http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/Ted.This could be seen as a test "remarkable" that the origin is Chinese. (Some already undeniable).Cheers! Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now