Operation "Aurora": A Revolution in the Threat Landscape

Blog post

Following this attack — each user has to be treated as an insider threat since cyber-criminals and government proxies can take control of legitimate user accounts by employing sophisticated phishing techniques and social engineering. This “Aurora” attack was not a direct breach of Google networks. They got access first by attacking an end-point — tricking a user into installing malware.