Hunting Down the Aurora Creator

Earlier this year, search engine giant Google announced it had been subjected to cyber attacks back in December and more than 20 other companies experienced similar attacks. The attacks, termed Aurora, now appear to have hit even more companies than originally reported, according to DarkReading.com.

However, researchers may be closing in on the identity of the creator of the malware used in the attacks.

Greg Hoglund, founder and CEO of HBGary, who released a report on the investigation, said:

“The attack called Operation Aurora is larger than just [the attacks acknowledged at the] 30 companies. That attack is still in operation and is much larger.”

Presently, there is little evidence the malware developer was within the Chinese government, however, the coding did have Chinese-language ties. HBGary believes it has also identified specific markers that will help to reveal the identity of the code developer.

The company has also released a free cleaning tool, which will clean the Aurora malware off a victim’s computer.

Researchers with Mandiant also claim to have been able to preliminarily identify the Aurora developers based on the coding used. Kevin Mandia, CEO of Mandiant, said, “We feel like we know a couple of them in their coding — we recognize their trademarks … down to the person.”

You may also be interested in...

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap - top government contractors - best government contracting event

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap

David Egts, chief technologist for Red Hat's North American public sector, has said there are several options …

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication - top government contractors - best government contracting event

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication

The Department of Health and Human Services has released a four-volume document that outlines 10 …

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019 - top government contractors - best government contracting event

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019

Some of the trends in the cybersecurity market to watch in 2019 include the availability …