Feeds

Google Aurora hackers AT LARGE, launch 0-day bazookas

Security snoopers back? They never left

Protecting against web application threats using SSL

Security researchers have traced a continuing run of zero-day attacks to the hackers who infamously hit Google and other hi-tech firms three years ago.

Symantec has kept close tabs on the hackers behind the so-called Aurora attacks ever since. No other group has used more zero-day vulnerabilities – eight – to further their malicious goals than the attackers behind Aurora (Hydraq) and other related attacks, the researchers said. Previous unknown vulnerabilities leveraged by the group have included Internet Explorer and Adobe Flash security bugs.

Identifying zero-day attacks takes hard graft as well as skills in reverse-engineering, a factor that means the group must be well-resourced.

"The group behind the Hydraq attacks is very much still active, with evidence indicating their involvement in a consistent and ongoing pattern of large-scale targeted attacks," according to Symantec.

"Targeted sectors include, but are not limited to: the defence industry, human rights and non-governmental organisations (NGOs) and IT service providers," it added.

Attacks used to be launched via targeted email (phishing) but over the years the group has moved on towards increased adoption of "watering hole" attacks – the "watering holes" being websites likely to be visited by the gazelle-like target organisation. Defence supply chain firms (suppliers of electronics and other sub components) of defence systems have been the prime target of these attacks. Suppliers are selected because they have lower security standards than tier-one defence contractors, who have been a prime target for cyber-espionage many years.

The attackers reuse components of an infrastructure Symantec has dubbed the Elderwood Platform. Most of the attacks have focused on either intelligence gathering or swiping valuable trade secrets from compromised computers, say the researchers.

"Although there are other attackers utilising zero-day exploits (for example, the Sykipot, Nitro, or even Stuxnet attacks), we have seen no other group use so many," a blog post by Symantec security response concludes.

At the time of the 2010 hack, Google all but said the attackers behind the Aurora attacks were backed by the Chinese government. Symantec is more circumspect.

The number of victims, the duration of the ongoing attacks as well as their apparent goal of wholesale intelligence and intellectual property theft mean the group must be backed by a nation state or (less probably) a large criminal organisation.

A white paper by Symantec on the ongoing attacks by the group can be found here (PDF). ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.