text
stringlengths
4
429
Information Warfare Monitor field research
Office of His Holiness the Dalai Lama
Tibetan Government-in-Exile
Offices of Tibet
Drewla
Phase 2: Identifying command and control servers
List of infected computers
Sending commands
Command results
Methods and capabilities
Analysis of list of infected computers
Methodology
Selected infections
Infection timeline
p. 17
p. 17
p. 22
p. 22
p. 27
p. 27
p. 27
p. 30
p. 32
p. 34
p. 37
p. 39
p. 40
p. 40
p. 42
p. 44
Part Three: Investigating GhostNet: Conclusions
p. 46
Alternative explanations
Attribution
The significance of GhostNet
Part Four: About the Information Warfare Monitor
p. 47
p. 48
p. 49
p. 51
Boxes
Box 1: Chinese Internet SIGINT in practice
p. 28
Tables
Table 1: Domain name registration information
Table 2: List of selected infections
p. 32
p. 42
Figures
Fig. 1: A
Social Engineering
attack connects to GhostNet
Fig. 2: A
Socially Engineered
email sent to the International Tibet Support Network
Fig. 3: A Virus Total Screen Capture of a malware infected email attachment
Fig. 4: Field researchers discovered malware at five Tibetan locations
Fig. 5: Malware retrieving a sensitive document
Fig. 6: The OHHDL and Drewla were infected by the same malware
Fig. 7: The GhostNet control servers
Fig. 8: The GhostNet
Server List
interface
Fig. 9: The GhostNet
Send Command
interface
Fig. 10: The gh0st RAT interface
Fig. 11: The GhostNet
List Command
interface
Fig. 12: The geographic location of infected hosts
Fig. 13. GhostNet infection timeline
p. 19
p. 20
p. 21
p. 23
p. 26
p. 29
p. 31
p. 33
p. 35
p. 36
p. 38
p. 41
p. 45
JR02-2009 Tracking GhostNet - SUMMARY
Summary
Trojan horse programmes and other associated malware are often cited as vectors for conducting
sophisticated computer-based espionage. Allegations of cyber espionage (computer network
exploitation) are increasingly common, but there are few case studies in the unclassified realm that
expose the inner workings of such networks.
This study reveals the existence and operational reach of a malware-based cyber espionage network
that we call GhostNet.
Between June 2008 and March 2009 the Information Warfare Monitor conducted an extensive and
exhaustive two-phase investigation focused on allegations of Chinese cyber espionage against the
Tibetan community.
We conducted field-based investigations in India, Europe and North America. In India we worked
directly with affected Tibetan organizations, including the Private Office of the Dalai Lama, the
Tibetan Government-in-Exile, and several Tibetan NGOs. In Europe and North America we worked with
Tibetan missions in London, Brussels, and New York. The fieldwork generated extensive data that