Skip to main content

Operation Aurora


Cyber-attack incidents are increasing day by day in the computer world. A couple of months ago US accused China of Hacking COVID 19 research data. In June 2020 Australia hit by massive cyber-attack by Chinese hackers. So, these types of cyber-attacks are got a very long history. However, when it comes to the topic of Cyber-attack, we should know the massive attack from China in 2010 that completely frightened the world.

Operation Aurora:- 

A series of cyber-attack from China took place in the year of 2010. The attack majorly Targeted the USA private sector companies such as Google, Adobe, Yahoo, Morgan Stanley, and more than 20 companies.

Let's take you to the purpose of Operation Aurora.

According to McAfee, the main goal of the attack was to gain access and potentially modify source code repositories at these high tech, security, and defense contractor companies. 

So, what happened exactly?.

That was on 12th Jan 2010 Google revealed that it had been the victim of cyber-attack occurred in Mid-December and originated from China.
In 2010 china was the second-largest economy and also it had a membership of WHO. The series of cyber-attack conducted by Elderwood gang others such as PLA unit 61398. They accessed lakhs of computers of US Private computers. The major reason behind the attack is to get access to the latest technology developed by US Companies. It targeted various sectors of Companies such as shipping, engineering, electronics, finance, software sectors, Manufacturing, and many more. It majorly targeted the internet explorer and the plan is to break the defense and steal the data. It all started in the mid of 2009 and on January 4th China stopped the attack.

The internet has seen a massive increase in usage over the last decade. The capabilities of software programs have also enhanced exponentially. The need for distributed computing and connectivity to the world to remain updated on current trends is the reason for businesses to increase their online presence. Some of these businesses are completely online with no offline element in their service or product.

 

Let’s look into 5 easy way to protect yourself from cyber-attack: -

1. Use an Internet Security Suite: - A collection of software services that protect a user's computer from viruses and other malware. A Premium Internet Security Software can prevent most of the cyber-attacks and malware which steal private data stored on your computer.
2. Use Strong Passwords: - A strong password protects from fraud and identity theft. Hackers use password guessing as the most common way to break your computer.
3. Keep Your Software Up-to-Date: - Software updates offer plenty of benefits includes repairing the security holes, which will protect your computer from hackers.
4. Manage your social media settings: -
It’s very important that you keep your information as secure as possible from strangers, avoid any "public" settings. Check your audience before posting a status and manage your privacy settings.
5. Fraudulent emails: - recognize and avoid fraudulent email. Scammers use email to trick you into giving them your personal information. They may try to steal your account numbers, passwords, or Social Security numbers. If they get that info, they could access your email, bank, or other accounts.

Lessons Learned: -

It's been a 10-year journey. 10 years since Aurora we have to educate people, most of the companies looked into their policy and procedure after the incidents and started tracking the connection is good or bad.

Education on cyber-attacks, information security is one of the key components however we need an additional level of protection to prevent the data loss.

Comments

Popular posts from this blog

Top sites to find remote jobs

1. FlexJobs:- The #1 job search site for hand-screened flexible and remote jobs since 2007. Plus get resume, coaching, and career help. Join today! This is a concept that lets an employee  work  full-time hours over fewer days. It allows employees to  work  longer hours on some days and accrue enough time for an additional day off Be proactive with job notifications. As awesome as your skills may be, no one is going to know about them unless you get out there and make them known by applying for jobs—now. ... 1.Fill out your resume profile. ... 2.Do your research. ... 3.Become more advanced. ................................................ 2. Upwork:- Upwork, formerly Elance-oDesk, is an American freelancing platform where enterprises and individuals connect in order to conduct business. In 2015, the Elance-oDesk merger was rebranded as Upwork and the company's full name is now Upwork Global Inc Upwork  allows clients to interview, hire a...

Satyam scam

Hello Readers, You may know the famous quote given by the Sophocles, “Rather fail with honor than succeed by fraud”. Yes, today we are going to talk about the biggest Indian Accounting fraud it is Satyam scam which collapsed India’s fourth-largest IT company from the top slots. What is the Satyam scam about? The company misrepresented its accounts both to its board, stock exchanges, regulators, investors and all other stakeholders. Let's know something inside it.   In 1987 Ramalinga Raju establishes Satyam Computer with his two brothers in Hyderabad. In 2001 it was one of the fastest-growing companies in India. So the share price was continuously increasing At that time, Ramalingam starts to concentrate on the real estate business for that he wanted an investment and he started to show more profit in Satyam computer than actually, it was. He created fake sales invoices and created fake bank balances as well. Now it’s the time for investors, usually, when a company makes m...

Top sites to get Royalty free images for your YouTube Videos/Blogs/Websites.

https://www.pexels.com All Photos and Videos on Pexels can be downloaded and used for free  What is allowed? 1. We tried to keep the Pexels License as simple as possible. Keep reading to find out more. 2. All photos and videos on Pexels are free to use. 3. Attribution is not required. Giving credit to the photographer or Pexels is not necessary but always appreciated. 4. You can modify the photos and videos from Pexels. Be creative and edit them as you like   What is not allowed? Respect the hard work of our contributors and keep these restrictions in mind. 1. Identifiable people may not appear in a bad light or in a way that is offensive. 2. Don't sell unaltered copies of a photo or video, e.g. as a poster, print, or on a physical product without modifying it first. 3. Don't imply endorsement of your product by people or brands on the imagery. 4. Don't redistribute or sell the photos and videos on other stock photo or wallpaper platforms....