text
stringlengths
4
429
useful information. The Foreign Affairs article, Pentagon officials said, is the first on-the-record disclosure that a
foreign intelligence agency had penetrated the U.S. military's classified systems. In 2008, the Los Angeles Times
reported, citing anonymous Defense officials, that the incursion might have originated in Russia.
The Pentagon operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in U.S.
cyberdefense strategy, Lynn said. In November 2008, the Defense Department banned the use of flash drives, a ban
it has since modified.
Infiltrating the military's command and control system is significant, said one former intelligence official who spoke on
the condition of anonymity because of the sensitivity of the matter. "This is how we order people to go to war. If
you're on the inside, you can change orders. You can say, 'turn left' instead of 'turn right.' You can say 'go up' instead
of 'go down.' "
In a nutshell, he said, the "Pentagon has begun to recognize its vulnerability and is making a case for how you've
got to deal with it."
Alert
January 26, 2010
How Can I Tell if I Was
Infected By Aurora?
McAfee Labs identified a zero-day
vulnerability in Microsoft Internet Explorer
that was used as an entry point for
Operation Aurora
to exploit Google and at
least 30 other companies.
Rasmon.dll:
0F9C5408335833E72FE73E6166B5A01B
How can I tell if my systems were
infected?
b.exe
9F880AC607CBD7CDFFFA609C5883C708
If you are a McAfee VirusScan Engine
customer, verify that you are using .DAT
5864 released on January 18, 2010
(McAfee has provided protection to identify
this as of release 5862 and is updating as
we continue to debug the attack) and
perform a full scan on all machines within
your enterprise, starting with most sensitive
servers. If you detect the following
signatures triggered: Exploit-Comele,
Roarur.dr or Roarur.dll, you very likely have
an infected Aurora host and should reach
out toMcAfee Foundstone, our vulnerability
management and protection services division,
for onsite Incident Response Services. You
AppMgmt.dll
6A89FBE7B0D526E3D97B0DA8418BF851
a.exe:
CD36A3071A315C3BE6AC3366D80BB59C
A0029670.dll
3A33013A47C5DD8D1B92A4CFDCDA3765
msconfig32.sys
7A62295F70642FEDF0D5A5637FEB7986
VedioDriver.dll
467EEF090DEB3517F05A48310FCFD4EE
acelpvc.dll
4A47404FC21FFF4A1BC492F9CD23139C
may also take advantage of McAfee
s free
Stinger product, used to clean up an Operation
Aurora-infected system.
If I
m not a McAfee customer
If you are not a McAfee Virus Scan Engine
customer and your anti-malware vendor
does not provide comprehensive detection
for Aurora binaries, you can perform
filename and md5 hash searches on your
servers to determine if you have any
matches that way. You should ensure that
the md5 hash matches along with the
filename to avoid false positives, as the
filenames themselves are not unique and
are very common Windows OS and other
legitimate program filenames. The list of
files and hashes is as follows:
securmon.dll:
E3798C71D25816611A4CAB031AE3C27A
McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or
its affiliates in the U.S. and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other
non-McAfee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property
of their respective owners.
2009 McAfee, Inc. All rights reserved.
Alert
January 26, 2010
Check for outbound Web
communications
You can also check for outbound past or
present Web communication or DNS
resolutions of the following domains* known
to be associated with the malware activity:
ftpaccess[dot]cc
360[dot]homeunix[dot]com
sl1[dot]homelinux[dot]org
ftp2[dot]homeunix[dot]com
update[dot]ourhobby[dot]com
ad01[dot]homelinux[dot]com
ads1[dot]homelinux[dot]org
ads1[dot]webhop[dot]org
aep[dot]homelinux[dot]com
aka[dot]homeunix[dot]net
alt1[dot]homelinux[dot]com