text
stringlengths 4
429
|
---|
amd[dot]homeunix[dot]com
|
amt1[dot]homelinux[dot]com
|
amt1[dot]homeunix[dot]org
|
aop01[dot]homeunix[dot]com
|
aop1[dot]homelinux[dot]com
|
asic1[dot]homeunix[dot]com
|
bdc[dot]homeunix[dot]com
|
corel[dot]ftpaccess[dot]cc
|
ddd1[dot]homelinux[dot]com
|
demo1[dot]ftpaccess[dot]cc
|
du1[dot]homeunix[dot]com
|
fl12[dot]ftpaccess[dot]cc
|
ftp1[dot]ftpaccess[dot]cc
|
patch[dot]homeunix[dot]org
|
up1[dot]mine[dot]nu
|
hho1[dot]homeunix[dot]com
|
hp1[dot]homelinux[dot]org
|
i1024[dot]homeunix[dot]org
|
i1024[dot]homelinux[dot]com
|
ice[dot]game-host[dot]org
|
il01[dot]servebbs[dot]com
|
il01[dot]homeunix[dot]com
|
il02[dot]servebbs[dot]com
|
il03[dot]servebbs[dot]com
|
lih001[dot]webhop[dot]net
|
lih002[dot]webhop[dot]net
|
lih003[dot]webhop[dot]net
|
list1[dot]homelinux[dot]org
|
live1[dot]webhop[dot]org
|
patch1[dot]gotdns[dot]org
|
patch1[dot]ath[dot]cx
|
patch1[dot]homelinux[dot]org
|
ppp1[dot]ftpaccess[dot]cc
|
sc01[dot]webhop[dot]biz
|
temp1[dot]homeunix[dot]com
|
tor[dot]homeunix[dot]com
|
ttt1[dot]homelinux[dot]org
|
up01[dot]homelinux[dot]com
|
up1[dot]homelinux[dot]org
|
up1[dot]serveftp[dot]net
|
up2[dot]mine[dot]nu
|
update1[dot]homelinux[dot]org
|
update1[dot]merseine[dot]nu
|
jlop[dot]homeunix[dot]com
|
on1[dot]homeunix[dot]com
|
vm01[dot]homeunix[dot]com
|
vvpatch[dot]homelinux[dot]org
|
war1[dot]game-host[dot]org
|
xil[dot]homeunix[dot]com
|
*In the names above,
|
[dot]
|
is substituted for
|
protect users from accidentally clicking and launching
|
malicious domains.
|
We recommend searching for outbound
|
requests for, at minimum, the 12/10/09 to
|
1/6/10 timeframe. The above domains and
|
file names and hashes may not be all
|
inclusive of all those associated with Aurora
|
but give a reasonable representation. If you
|
see Web communication to any of the
|
above sites you should analyze the
|
origination machine immediately and reach
|
out to McAfee Foundstone for onsite
|
Incident Response Services.
|
McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or
|
its affiliates in the U.S. and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other
|
non-McAfee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property
|
of their respective owners.
|
2009 McAfee, Inc. All rights reserved.
|
CA Internet Security Business Unit | Internet Security Intelligence
|
In-depth Analysis of Hydraq
|
The face of cyberwar enemies unfolds
|
Zarestel Ferrer and Methusela Cebrian Ferrer
|
CA ISBU Senior Researchers, Melbourne Australia
|
Abstract
|
There are thousands of undetected online threats and malware attacks from around the world
|
every day. Most of these attacks take place in cyberspace, where unsuspecting people fall prey to
|
various forms of cybercrime. Common cyber criminal activity involves stealing sensitive information such as credit card details, online login credentials, browsing history and email addresses.
|
However, notable skilled attacks occur when the target is in possession of highly-valuable information that could be leveraged as a weapon for warfare.
|
Hydraq is a family of threats used in highly sophisticated, coordinated attacks against large and
|
high-profile corporate networks. It is referred to as Operation Aurora, Google Hack Attack and
|
Microsoft Internet Explorer 0-day (CVE-2010-0249). An in-depth code investigation and analysis
|
will highlight Hydraq features and capabilities, and as it unfolds, questions will unravel on to
|
whether the discovery of this threat is just the beginning of a global arms race against cyberwarfare.
|
Table of Contents
|
Introduction
|
Anatomy of an Attack
|
1. How Hackers Gain Access
|
1.1 Reconnaissance
|
1.2 0Day Hack Attack
|
1.3 MS10-002 (CVE-2010-049) Analysis
|
1.4 Hydraq Binary Shellcode
|
2. How Hackers Maintain Access
|
2.1 Win32/Hydraq (EXE) Dropper: Generating Random Service
|
2.2 Win32/Hydraq (DLL) Backdoor: Method of Installation
|
3. Cyber Spy In Control
|
3.1 Initialization of the Backdoor Configuration
|
3.2 Command and Control
|
3.3 Backdoor Configuration: Resource Section and Registry Key
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.