text
stringlengths 4
429
|
---|
Information Warfare Monitor field research |
Office of His Holiness the Dalai Lama |
Tibetan Government-in-Exile |
Offices of Tibet |
Drewla |
Phase 2: Identifying command and control servers |
List of infected computers |
Sending commands |
Command results |
Methods and capabilities |
Analysis of list of infected computers |
Methodology |
Selected infections |
Infection timeline |
p. 17 |
p. 17 |
p. 22 |
p. 22 |
p. 27 |
p. 27 |
p. 27 |
p. 30 |
p. 32 |
p. 34 |
p. 37 |
p. 39 |
p. 40 |
p. 40 |
p. 42 |
p. 44 |
Part Three: Investigating GhostNet: Conclusions |
p. 46 |
Alternative explanations |
Attribution |
The significance of GhostNet |
Part Four: About the Information Warfare Monitor |
p. 47 |
p. 48 |
p. 49 |
p. 51 |
Boxes |
Box 1: Chinese Internet SIGINT in practice |
p. 28 |
Tables |
Table 1: Domain name registration information |
Table 2: List of selected infections |
p. 32 |
p. 42 |
Figures |
Fig. 1: A |
Social Engineering |
attack connects to GhostNet |
Fig. 2: A |
Socially Engineered |
email sent to the International Tibet Support Network |
Fig. 3: A Virus Total Screen Capture of a malware infected email attachment |
Fig. 4: Field researchers discovered malware at five Tibetan locations |
Fig. 5: Malware retrieving a sensitive document |
Fig. 6: The OHHDL and Drewla were infected by the same malware |
Fig. 7: The GhostNet control servers |
Fig. 8: The GhostNet |
Server List |
interface |
Fig. 9: The GhostNet |
Send Command |
interface |
Fig. 10: The gh0st RAT interface |
Fig. 11: The GhostNet |
List Command |
interface |
Fig. 12: The geographic location of infected hosts |
Fig. 13. GhostNet infection timeline |
p. 19 |
p. 20 |
p. 21 |
p. 23 |
p. 26 |
p. 29 |
p. 31 |
p. 33 |
p. 35 |
p. 36 |
p. 38 |
p. 41 |
p. 45 |
JR02-2009 Tracking GhostNet - SUMMARY |
Summary |
Trojan horse programmes and other associated malware are often cited as vectors for conducting |
sophisticated computer-based espionage. Allegations of cyber espionage (computer network |
exploitation) are increasingly common, but there are few case studies in the unclassified realm that |
expose the inner workings of such networks. |
This study reveals the existence and operational reach of a malware-based cyber espionage network |
that we call GhostNet. |
Between June 2008 and March 2009 the Information Warfare Monitor conducted an extensive and |
exhaustive two-phase investigation focused on allegations of Chinese cyber espionage against the |
Tibetan community. |
We conducted field-based investigations in India, Europe and North America. In India we worked |
directly with affected Tibetan organizations, including the Private Office of the Dalai Lama, the |
Tibetan Government-in-Exile, and several Tibetan NGOs. In Europe and North America we worked with |
Tibetan missions in London, Brussels, and New York. The fieldwork generated extensive data that |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.