Aurora hackers may have accessed law enforcement targets

Pro

23 May 2013

In January 2010, Google shocked the cyberworld by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China’s People Liberation Army.

"[We] have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists," Google Senior Vice President and Chief Legal Officer David Drummond wrote in blog post at the time.

Now after more than three years, on from what became known as Operation Aurora, it appears that the cyber marauders were after more than just information on activists. They were also after information on investigations on Chinese spies in the United States being conducted by the FBI and US Department of Justice.

The Aurora hackers gained access to Google’s servers to a database that contained information on US surveillance targets, the Washington Post reported this week, citing former and current government officials as sources for the story.

 

advertisement



 

Such information would be invaluable to China because it would allow its intelligence operatives to destroy information before counter intelligence agents got their hands on it and allow the spies to evade capture and prosecution.

The database included years of surveillance information, including thousands of court orders issued to law enforcement officials around the nation seeking to monitor suspects’ email, as well as classified orders targeting foreign subjects and issued under the Foreign Intelligence Surveillance Act.

The incident set off a tiff between Google, the DOJ and FBI, the Post reported, because the federal agencies wanted to access the company’s technical logs and other information about the breach to assess the potential damage done to its counter espionage efforts.

Google representative Jay Nancarrow said in an email that the company is not commenting on the matter at this time.

Google was not alone target in Operation Aurora. More than 20 companies were attacked, including Adobe Systems, Juniper Networks, Rackspace, Yahoo, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical.

Last month, a Microsoft executive said that the Aurora bandits had also breached his company’s servers snooping for accounts it had lawful wiretap orders on. Since that time, the executive has recanted those remarks.

"I was referring to statements in the media from the January 2010 timeframe," Dave Aucsmith, senior director for Microsoft’s Institute for Advanced Technology, said in a statement. "My comments were not meant to cite any specific Microsoft analysis or findings about motive or attacks, but I recognise that my language was imprecise."

Matt Thomlinson, Microsoft general manager for trustworthy computing and security added in an email, "The so-called ‘Aurora’ attacks did not breach the MS network."

The Chinese government has denied being behind Aurora. It has noted that cyberattacks and espionage are against Chinese law and has done all it can to combat such online activities.

While an attack on the database is feasible, because of the breadth of Aurora, it is unlikely it was a specific target, reasoned Jeffrey Carr, CEO of Taia Global and author of "Inside Cyber Warfare: Mapping the Cyber Underworld."

"Google was only one of 20-plus companies attacked at the same time by the same group," he said in an interview. "So I would be surprised if the database was the objective of the attack. It was likely a crime of opportunity."

It is also an object lesson for organisations dealing with cloud storage that is operated by a third party, added Alan Brill, senior managing director for Kroll Advisory Solutions.

"There’s more trust being given to cloud services than some of them deserve," he said in an interview. "It has become so easy [to store data somewhere else] that you might store something somewhere without thinking whether or not you really ought to do that."

IDG News Service

Read More:


Back to Top ↑

TechCentral.ie