meta_pixel
Tapesearch Logo
Log in
Malicious Life

EP55: Operation Aurora, Part 1

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 12 September 2019

⏱️ 34 minutes

🧾️ Download transcript

Summary

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation.



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi and welcome to Malicious Life in collaboration with Cyberism. I'm Ren Levy. In August of 2009, Miron Selen, a white hat hacker in Israel, privately reached out to

0:29.8

Microsoft to report a vulnerability it found in the Internet Explorer browser.

0:35.8

It was a severe kind of security flaw easily exploited by a maliciously crafted link. The legitimacy and severity of this vulnerability marked CVEE 2010-O-249

0:50.0

was confirmed by Microsoft the month after it was first reported.

0:54.8

A patch was only scheduled for half a year later, however,

0:58.6

when the company planned to release a full-scale update of Internet Explorer. It seems like a long time. It didn't

1:07.3

matter. They were already too late.

1:12.1

As early as April 2009, for full months before Sellin's report, a foreign entity had began

1:21.2

work on an exploit for the 0249. The

1:23.0

O249 vulnerability

1:26.0

gravity of what they would achieve with it

1:29.0

suggests months of careful analysis,

1:32.0

planning and preparations during those months.

1:36.0

It was a fateful day when one Google employee received such a maliciously crafted link in Microsoft Messenger.

1:45.0

Little could that person have anticipated

1:48.0

the world altering consequences of just one little. The attack that began with that mouse click was given a name, Operation Aurora, after a file path called Aurora in a malware's binary.

2:15.0

According to MacAfee's Dimitri Alperovic,

2:18.0

this may be the name the hackers themselves were using to describe their attack. It's hardly the kind of scary name

2:26.2

that you might associate with the massive events you'll soon hear about.

2:30.8

Maybe it was named after the colors of the Google logo. But who was that

2:37.2

enemy? Google is one of the world's most well organized and well defended companies. You'd have an easier time hacking into a small

2:47.2

country, maybe even the US government, depending on the branch. Something big had to be behind this. The NSA, FBI, Google,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.