Posted on January 19, 2010 by

chinahackThe hackers which penetrated Google’s defenses recently demonstrated a level of sophistication which paints a frightening picture of just how vulnerable the internet is. The hackers used a combination of encryption, stealth programing and found an unknown hole in internet Explorer. A dozen or more pieces of malware and numerous lawyers of encryption allowed the hackers to bore deeply into company networks and hide their presence as stealthy aliens. The hackers stole intellectual property and gained access to the Gmail accounts of human rights activists and the attacks originated from China. The attacks which targeted 34 companies in the technology, financial and defense sectors was dubbed “Operation Aurora” as this was the name the hackers used for their mission and the name was on the computer of one of the hackers. The initial piece of code was shell code encrypted three times and then was activatedt to penetrate. One malicious code opened a remote backdoor to the computer established by an encrypted secret shannel hiding as an SSL connection to avoid detection. This allowed ongoing access to a computer which afforded the hackers entry to other parts of the network in order to search for login credentials and other data.

Leave a Reply