A Hacker's Hit List of American Infrastructure - The Atlantic: Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.