text
stringlengths 4
429
|
---|
useful information. The Foreign Affairs article, Pentagon officials said, is the first on-the-record disclosure that a
|
foreign intelligence agency had penetrated the U.S. military's classified systems. In 2008, the Los Angeles Times
|
reported, citing anonymous Defense officials, that the incursion might have originated in Russia.
|
The Pentagon operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in U.S.
|
cyberdefense strategy, Lynn said. In November 2008, the Defense Department banned the use of flash drives, a ban
|
it has since modified.
|
Infiltrating the military's command and control system is significant, said one former intelligence official who spoke on
|
the condition of anonymity because of the sensitivity of the matter. "This is how we order people to go to war. If
|
you're on the inside, you can change orders. You can say, 'turn left' instead of 'turn right.' You can say 'go up' instead
|
of 'go down.' "
|
In a nutshell, he said, the "Pentagon has begun to recognize its vulnerability and is making a case for how you've
|
got to deal with it."
|
Alert
|
January 26, 2010
|
How Can I Tell if I Was
|
Infected By Aurora?
|
McAfee Labs identified a zero-day
|
vulnerability in Microsoft Internet Explorer
|
that was used as an entry point for
|
Operation Aurora
|
to exploit Google and at
|
least 30 other companies.
|
Rasmon.dll:
|
0F9C5408335833E72FE73E6166B5A01B
|
How can I tell if my systems were
|
infected?
|
b.exe
|
9F880AC607CBD7CDFFFA609C5883C708
|
If you are a McAfee VirusScan Engine
|
customer, verify that you are using .DAT
|
5864 released on January 18, 2010
|
(McAfee has provided protection to identify
|
this as of release 5862 and is updating as
|
we continue to debug the attack) and
|
perform a full scan on all machines within
|
your enterprise, starting with most sensitive
|
servers. If you detect the following
|
signatures triggered: Exploit-Comele,
|
Roarur.dr or Roarur.dll, you very likely have
|
an infected Aurora host and should reach
|
out toMcAfee Foundstone, our vulnerability
|
management and protection services division,
|
for onsite Incident Response Services. You
|
AppMgmt.dll
|
6A89FBE7B0D526E3D97B0DA8418BF851
|
a.exe:
|
CD36A3071A315C3BE6AC3366D80BB59C
|
A0029670.dll
|
3A33013A47C5DD8D1B92A4CFDCDA3765
|
msconfig32.sys
|
7A62295F70642FEDF0D5A5637FEB7986
|
VedioDriver.dll
|
467EEF090DEB3517F05A48310FCFD4EE
|
acelpvc.dll
|
4A47404FC21FFF4A1BC492F9CD23139C
|
may also take advantage of McAfee
|
s free
|
Stinger product, used to clean up an Operation
|
Aurora-infected system.
|
If I
|
m not a McAfee customer
|
If you are not a McAfee Virus Scan Engine
|
customer and your anti-malware vendor
|
does not provide comprehensive detection
|
for Aurora binaries, you can perform
|
filename and md5 hash searches on your
|
servers to determine if you have any
|
matches that way. You should ensure that
|
the md5 hash matches along with the
|
filename to avoid false positives, as the
|
filenames themselves are not unique and
|
are very common Windows OS and other
|
legitimate program filenames. The list of
|
files and hashes is as follows:
|
securmon.dll:
|
E3798C71D25816611A4CAB031AE3C27A
|
McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or
|
its affiliates in the U.S. and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other
|
non-McAfee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property
|
of their respective owners.
|
2009 McAfee, Inc. All rights reserved.
|
Alert
|
January 26, 2010
|
Check for outbound Web
|
communications
|
You can also check for outbound past or
|
present Web communication or DNS
|
resolutions of the following domains* known
|
to be associated with the malware activity:
|
ftpaccess[dot]cc
|
360[dot]homeunix[dot]com
|
sl1[dot]homelinux[dot]org
|
ftp2[dot]homeunix[dot]com
|
update[dot]ourhobby[dot]com
|
ad01[dot]homelinux[dot]com
|
ads1[dot]homelinux[dot]org
|
ads1[dot]webhop[dot]org
|
aep[dot]homelinux[dot]com
|
aka[dot]homeunix[dot]net
|
alt1[dot]homelinux[dot]com
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.