The hackers sent phishing emails, which were tainted with malicious software, to specific people at the targeted organizations. If the unsuspecting receiver of the mail clicked on the attached malicious software, it would infect their computer which in turn would give the hacker access to their computer.8
Jim Finkle (2011-08-03). "State actor seen in "enormous" range of cyber attacks". Reuters. Retrieved 2011-08-03. https://www.reuters.com/article/us-cyberattacks-idUSTRE7720HU20110803 ↩
Dmitri Alperovitch (2011-08-02). "Revealed: Operation Shady RAT" (PDF). McAfee. Archived from the original (PDF) on 2011-08-04. Retrieved 2011-08-03. https://web.archive.org/web/20110804083836/http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf ↩
"Governments, IOC and UN hit by massive cyber attack". BBC News. 2011-08-03. Retrieved 3 August 2011. https://www.bbc.co.uk/news/technology-14387559 ↩
Nakashima, Ellen, "Report on ‘Operation Shady RAT’ identifies widespread cyber-spying", Washington Post, 3 August 2011. https://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html ↩
"Q+A: Massive cyber attack dubbed "Operation Shady RAT"". Reuters. 2011-08-03. Retrieved 2023-11-02. https://www.reuters.com/article/us-cyberattacks-qa-idUSTRE7720IS20110803 ↩
Gross, Michael Joseph, "Enter the Cyber-dragon", Vanity Fair, September 2011. http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109 ↩