Group Behind 'Aurora' Attack on Google Still Active 21
New submitter trokez writes "Symantec has monitored the activities of a group using a specific trojan (Hydraq/Aurora) since 2009. The particular group has been connected (by Symantec) to the attack on Gmail in China, but also other high-profile attacks. 'These attackers have used a large number of zero-day exploits against not just the intended target organization, but also on the supply chain manufacturers that service the company in their cross hairs. These attackers are systematic and re-use components of an infrastructure we have termed the "Elderwood Platform." The term "Elderwood" comes from the exploit communication used in some of the attacks. This attack platform enables them to quickly deploy zero-day exploits.' The attacks seems to focus on industry espionage, with the defense industry and its suppliers at the focus."
Are these the dudes... (Score:1, Funny)
...who hacked the gibson?
Re: (Score:3)
+1 for obscure "Hackers" Movie reference.
Strange Symbol (Score:2)
RSA Hack (Score:2, Interesting)
Yea, we saw this with the RSA hack, basically it's going up the supply chain to exploit suppliers of big companies/the government. In the RSA hack they actually made it look like it was coming from an RSA supplier, and spoofed an email with the THIRD version of an excel spreadsheet that contained a zero day exploit. The Chinese, they're good at this.
Perfect (Score:3)
Sleep tight.
Re: (Score:2)
Complimentary Egg Roll (Score:1)
Re: (Score:2)
Unfortunately, it turned out to be for *last* month...
Watering Hole Attack. (Score:5, Funny)
All well and good. The good folk at Symantec, a site that definitely caters to an audience of people who would be interested in this particular exploit, then goes on to link to their research paper:
That's right. The link to the research paper is, presumably by order of some marketroid who wants to get some metrics about this high-profile story (or are they?) is a goddamn bit.ly link redirector that goes directly to a PDF, and can be expected to spawn precisely one of the sorts of vectors that the attackers have been exploiting for years.
Peter Norton is still alive, but if he weren't, he'd be rolling in his grave. As it stands, he's merely rolling in a big pile of money.
Microsoft Windows only .. (Score:4, Interesting)
Re: (Score:3)
So you can only get infected if you do have an Symantec antivirus?
"Elderwood" really? (Score:2)
Re: (Score:2)
Re: (Score:2)
Of course, the name is the only reason I checked out the comments, as I have been looking to grow some elder trees in my yard, and the berries are currently in season (mmmm). Of course, trying to get some from my pagan friends turned out to be too much hassle (important tree, need some rituals or some such).... so we just ordered some seeds, got them yesterday actually.
Well the thing is names make it easier to distinguish and actually talk about them. If I compared ExTrojA.1234 with CERT-2001-19 you probabl
oh noes (Score:2)
Let's just hope they don't steal the secrets to milliliter wave scanners!
Nobody would be safe if terrorists had such power under their control!