text
stringlengths 4
429
|
---|
ftp2.homeunix.com
|
update.ourhobby.com
|
connectproxy.3322.org
|
csport.2288.org
|
* This data is subject to change.
|
* For the latest data, please visit McAfee Aurora site
|
http://www.mcafee.com/us/threat_center/operation_aurora.html
|
Appendix A: Useful URLs related to Aurora
|
http://www.mcafee.com/us/local_content/reports/how_can_u_tell.pdf
|
http://www.mcafee.com/us/threat_center/aurora_enterprise.html
|
http://newsroom.mcafee.com/article_display.cfm?article_id=3613
|
http://www.mcafee.com/us/threat_center/operation_aurora.html
|
http://www.avertlabs.com/research/blog/
|
http://www.microsoft.com/technet/security/advisory/979352.mspx
|
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0249
|
http://podcasts.mcafee.com/audioparasitics/AudioParasitics-Episode80-01-2010.mp3
|
http://community.mcafee.com/groups/operation-aurora
|
JR03-2010
|
SHADOWS IN THE CLOUD:
|
Investigating Cyber Espionage 2.0
|
JOINT REPORT:
|
Information Warfare Monitor
|
Shadowserver Foundation
|
April 6, 2010
|
WEB VERSION. Also found here:
|
http://shadows-in-the-cloud.net
|
INFOWAR
|
MONITOR
|
JR03-2010 Shadows in the Cloud - FOREWORD
|
Foreword
|
Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new
|
opportunities and methods, espionage usually follows in its wake, borrowing techniques and tradecraft. The
|
Shadows in the Cloud report illustrates the increasingly dangerous ecosystem of crime and espionage and its
|
embeddedness in the fabric of global cyberspace.
|
This ecosystem is the product of numerous factors. Attackers employ complex, adaptive attack techniques that
|
demonstrate high-level ingenuity and opportunism. They take advantage of the cracks and fissures that open up
|
in the fast-paced transformations of our technological world. Every new software program, social networking
|
site, cloud computing, or cheap hosting service that is launched into our everyday digital lives creates an
|
opportunity for this ecosystem to morph, adapt, and exploit.
|
It has also emerged because of poor security practices of users, from individuals to large organizations. We
|
take for granted that the information and communications revolution is a relatively new phenomenon, still
|
very much in the midst of unceasing epochal change. Public institutions have adopted these new technologies
|
faster than procedures and rules have been created to deal with the radical transparency and accompanying
|
vulnerabilities they introduce.
|
Today, data is transferred from laptops to USB sticks, over wireless networks at caf
|
hot spots, and stored across
|
cloud computing services whose servers are located in far-off political jurisdictions. These new modalities of
|
communicating de-concentrate and disperse the targets of exploitation, multiplying the points of exposure
|
and potential compromise. Paradoxically, documents and data are probably safer in a file cabinet, behind the
|
bureaucrat
|
s careful watch, than they are on the PC today.
|
The ecosystem of crime and espionage is also emerging because of opportunism on the part of actors. Cyber
|
espionage is the great equalizer. Countries no longer have to spend billions of dollars to build globe-spanning
|
satellites to pursue high-level intelligence gathering, when they can do so via the web. We have no evidence in
|
this report of the involvement of the People
|
s Republic of China (PRC) or any other government in the Shadow
|
network. But an important question to be entertained is whether the PRC will take action to shut the Shadow
|
network down. Doing so will help to address long-standing concerns that malware ecosystems are actively
|
cultivated, or at the very least tolerated, by governments like the PRC who stand to benefit from their exploits
|
though the black and grey markets for information and data.
|
Finally, the ecosystem is emerging because of a propitious policy environment
|
or rather the absence of
|
one
|
at a global level. Governments around the world are engaged in a rapid race to militarize cyber space,
|
to develop tools and methods to fight and win wars in this domain. This arms race creates an opportunity
|
structure ripe for crime and espionage to flourish. In the absence of norms, principles and rules of mutual
|
restraint at a global level, a vacuum exists for subterranean exploits to fill.
|
There is a real risk of a perfect storm in cyberspace erupting out of this vacuum that threatens to subvert
|
cyberspace itself, either through over-reaction, a spiraling arms race, the imposition of heavy-handed controls,
|
or through gradual irrelevance as people disconnect out of fear of insecurity.
|
JR03-2010 Shadows in the Cloud - FOREWORD
|
There is, therefore, an urgent need for a global convention on cyberspace that builds robust mechanisms of
|
information sharing across borders and institutions, defines appropriate rules of the road for engagement in the
|
cyber domain, puts the onus on states to not tolerate or encourage mischievous networks whose activities
|
operate from within their jurisdictions, and protects and preserves this valuable global commons.
|
Until such a normative and policy shift occurs, the shadows in the cloud may grow into a dark, threatening storm.
|
Ron Deibert
|
Director, the Citizen Lab, Munk School of Global Affairs
|
University of Toronto
|
Rafal Rohozinski
|
CEO, The SecDev Group (Ottawa)
|
JR03-2010 Shadows in the Cloud - ACKNOWLEDGMENTS
|
Acknowledgments
|
This investigation is a result of a collaboration between the Information Warfare Monitor and the Shadowserver
|
Foundation. Our ability to share critical information and analytical insights within a dedicated group of
|
professionals allowed us to uncover and investigate the operation of the network documented in this report.
|
The Information Warfare Monitor (infowar-monitor.net) is a joint activity of the Citizen Lab, Munk School
|
of Global Affairs, University of Toronto, and the SecDev Group, an operational consultancy based in Ottawa
|
specialising in evidence-based research in countries and regions under threat of insecurity and violence. The
|
Shadowserver Foundation (shadowserver.org) was established in 2004 and is comprised of volunteer security
|
professionals that investigate and monitor malware, botnets, and malicious attacks. Both the Information
|
Warfare Monitor and the Shadowserver Foundation aim to understand and accurately report on emerging cyber
|
threats as they develop.
|
Steven Adair is a security researcher with the Shadowserver Foundation. He frequently analyzes malware, tracks
|
botnets, and deals with cyber attacks of all kinds with a special emphasis on those linked to cyber espionage.
|
Ron Deibert is Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is
|
a co-founder and principal investigator of the OpenNet Initiative and Information Warfare Monitor. He is Vice
|
President, Policy and Outreach, Psiphon Inc., and a principal with the SecDev Group.
|
Rafal Rohozinski is CEO of the SecDev Group and Psiphon Inc. He is a co-founder and principal investigator of
|
the OpenNet Initiative and Information Warfare Monitor, and a senior research advisor at the Citizen Lab, Munk
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.