Protecting Your Critical Assets: Lessons Learned From "Operation Aurora"

Download Now Free registration required

Executive Summary

As Operation Aurora highlighted, Advanced Persistent Threats (APT) are an increasingly common form of complex and directed attacks that use insidious techniques for gaining access to privileged systems and maintaining that access until all of the attackers' goals and objectives have been met. Operation Aurora employed an APT technique that proved extremely successful in targeting, exploiting, accessing, and exfiltrating highly valuable intellectual property from its victims. This paper details Operation Aurora and provides some insight into what was learned and how to prevent such attacks from being successful in the future.

  • Format: PDF
  • Size: 2611.2 KB