4.8 • 1K Ratings
🗓️ 26 September 2019
⏱️ 33 minutes
🧾️ Download transcript
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?...
Click on a timestamp to play from that location
0:00.0 | Google blog, January 12, 2010. |
0:04.0 | Quote, like many other well-known organizations, |
0:07.7 | we face cyber attacks of varying degrees on a regular basis. |
0:12.2 | In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure, |
0:19.0 | originating from China that resulted in the theft of intellectual property from Google. |
0:26.0 | However, it soon became clear that while at first appeared to be solely a security incident, albeit a significant one, was something quite different. Hi, I'm Ran Levy and you're listening to Malicious Life in collaboration with |
0:49.8 | Cyberision. In our previous episode, we learned how hackers, probably associated with the Chinese |
0:59.4 | government exploited a zero-day bug in Microsoft's Internet Explorer browser to infiltrate Google's internal |
1:07.5 | network via a maliciously crafted link. |
1:18.0 | After establishing the probable attribution of Operation Aurora, we try to decipher the motive behind the attack. |
1:22.0 | One potential motive where Google's intentional or unintentional attempts at |
1:28.0 | bypassing the Chinese censorship which imposed strict limits on the company's culture of supporting free and open |
1:36.5 | information sharing. But as I hinted at the end of the last episode, this culture clash was only part of the picture. |
1:55.0 | News that Google was hacked would have been enough excitement for one day. |
1:58.0 | But it was another revelation later in the with the attempts over the past year to further limit free speech on the web |
2:15.0 | have led us to conclude that we should review the feasibility of our business |
2:20.8 | operations in China." |
2:24.3 | The Google. C.N project, a major step for the company just half a decade in the making, now looked |
2:31.6 | like it would be scrapped. Why such a harsh and dramatic response? |
2:38.0 | The reason began to unravel only hours after Google's post went live when Adobe revealed that they too |
2:47.3 | had been breached. Soon came the mudslide. Lockheed Martin, Yahoo, Symantec, Northrop Grumman, Dow Chemical Morgan Stanley. |
2:57.6 | In total, 35 of America's largest companies had been linked to the same attack. So by this point two things |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.