Home » Jazz News » Technology

49

Google Hackers Had Ability to Alter Source Codes

Source:

View read count
Hackers who breached Google and other companies in January targeted source code management systems, security firm McAfee asserted Wednesday, manipulating a little-known trove of security flaws that would allow easy unauthorized access to the intellectual property it is meant to protect.

The software management systems, widely used at businesses unaware that the holes exist, were exploited by the so-called Aurora hackers in a way that would have enabled them to siphon source code as well as modify it to make customers of the software vulnerable to attack - - akin to making yourself a set of keys in advance for locks that are going to be sold far and wide.

A white paper (.pdf) released by security firm McAfee during this week's RSA security conference in San Francisco provides a couple of new details about the “Operation Aurora" attacks that affected some 34 U.S. companies, including Google and Adobe, beginning last July. McAfee helped Adobe investigate the attack on its system and also provided information to Google about malware that was used in the attacks.

According to the paper, the hackers gained access to software configuration management systems (SCM), which could have allowed them to steal proprietary source code or surreptitiously make changes to the code that could seep undetected into commercial versions of the company's product. Stealing the code would also allow attackers to examine the source code for vulnerabilities in order to develop exploits to attack customers who use the software, such as Adobe Reader, for example.

“[The SCMs} were wide open," says Dmitri Alperovitch, McAfee's vice president for threat research. “No one ever thought about securing them, yet these were the crown jewels of most of these companies in many ways -- much more valuable than any financial or personally identifiable data that they may have and spend so much time and effort protecting."

Many of the companies that were attacked used the same source code management system made by Perforce, a California-based company whose products are used by many large companies. McAfee's white paper focuses on the insecurities in the Perforce system and provides suggestions for securing it, but the company said it also would be looking at other source code management systems in the future. The paper doesn't indicate exactly which companies were using Perforce or had vulnerable configurations installed.

As previously reported, the attackers gained initial access by conducting a spear- phishing attack against specific targets within the company. The targets received an e- mail or instant message that appeared to come from someone they knew and trusted. The communication contained a link to a web site hosted in Taiwan that downloaded and executed a malicious JavaScript, with a zero-day exploit that attacked a vulnerability in the user's Internet Explorer browser.

A binary disguised as a JPEG file then downloaded to the user's system and opened a backdoor onto the computer and set up a connection to the attackers' command and control servers, also hosted in Taiwan.

Continue Reading...

For more information contact .

Tags



Comments

News

Popular

Get more of a good thing!

Our weekly newsletter highlights our top stories, our special offers, and upcoming jazz events near you.

Install All About Jazz

iOS Instructions:

To install this app, follow these steps:

All About Jazz would like to send you notifications

Notifications include timely alerts to content of interest, such as articles, reviews, new features, and more. These can be configured in Settings.