text
stringlengths 4
429
|
---|
of communications between the infected computer and the control servers, they are related such |
that there appear to be two distinct families of malware. In both cases, the malware uses the |
protocol for standard web traffic, HTTP, in order make the network activity appear as if it were |
normal Internet browsing. |
The first family of malware used HTTP connections to connect to PHP files.41 Despite connecting |
to different IP addresses and requesting different files, both used the same unique key when |
communicating, indicating that they are part of the same family of malware. |
1) The malware made connections to a control server on IP address xxxxxxxxxxxx |
using two host names, xxxxxxxxxxxxxxxx and xxxxxxxxxxxxxxxxxx. The IP address |
xxxxxxxxx is in a range assigned to Hainan-TELECOM (xxxxxxxxxxxxxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxx) in China. The malware used HTTP to connect to various PHP files |
on the control server in order to update its status and receive instructions about where |
to download commands. The commands are embedded in what appear to be image files |
(e.g. JPEG). |
2) The malware made connections to a control server on IP address xxxxxxxxxxx, port |
8000. This IP address reverse resolved to xxxxxxxxxxx.broad.hk.hi.dynamic.163data. |
com.cn and is in an IP range assigned to Hainan-TELECOM (HAIFU node adsl dialup |
ports) in China. The malware used HTTP POST to upload content to the control server.42 |
The investigation carried out in Phase 2 identified the network of control servers used in this |
particular attack. The control servers we discovered include the control server used in the welldocumented instances of social malware used frequently against Tibetan targets during the 2008 |
Olympics in Beijing. |
The second family of malware used HTTP POST to connect to a CGI43 script to communicate between |
the infected computer and the control server. While their functions appear to be different, with one |
malware focusing on reporting and commands and the other on document retrieval, they are likely part |
of the same family of malware. In addition, the domain names used, www.lookbytheway.net and www. |
macfeeresponse.org, are registered to the same person, |
zhou zhaojun |
1) The malware made connections to a control server on IP address 221.5.250.98 using |
the host name www.lookbytheway.net. The IP address 221.5.250.98 is assigned to |
CNCGROUP-CQ (CNC Group CHINA169 Chongqing Province Network) in China. The |
malware on the infected computer used HTTP to connect to a file in an attempt to |
inform the control server of the infected computer |
s status and to download commands. |
PHP is a popular scripting language often used in web applications. |
HTTP POST is a method often used to upload content to a web server. |
CGI scripts are often written in the Perl programming language. |
JR02-2009 Tracking GhostNet - PART TWO |
In one case, the file the infected computer was requesting was not present and the |
infected computer received a 404 error. However, successful connections were made |
via HTTP to CGI scripts. The infected computer used HTTP POST to submit data to CGI |
scripts hosted on the control server. |
2) The malware made connections to a control server on 218.241.153.61 using the host name |
www.macfeeresponse.org. The IP address 218.241.153.61 is assigned to BITNET (Beijing |
Bitone United Networks) in Beijing, China. The malware on the infected computer used |
HTTP to connect to a file to inform the control server of the infected computer |
s status |
and download commands. In addition, connections were made via HTTP to CGI scripts. The |
infected computer used HTTP POST to submit data to CGI scripts hosted on the control |
server. Connections to one CGI script appear to inform the control server of the presence of |
particular documents, while connections to a second CGI script appear to cause the infected |
computer to upload documents to the control server using HTTP POST. |
Instances of malware that connect to control server locations www.lookbytheway.net and www. |
macfeeresponse.org have been analysed by security companies.44 This network extends to a variety |
of domain names including: |
www.lookbytheway.com |
210.51.7.155 |
www.macfeeresponse.com - 210.51.7.155 |
www.msnppt.net - 221.5.250.98 |
www.msnxy.net - 210.51.7.155 |
www.msnyf.com - 221.5.250.98 |
www.networkcia.com - 210.51.7.155 |
www.indexnews.org - 61.188.87.58 |
www.indexindian.com - 210.51.7.155 |
During the in situ investigation at the Dalai Lama |
s private office we observed several documents |
being exfiltrated from the computer network and uploaded to www.macfeeresponse.org, including |
a document containing thousands of email addresses and one detailing and discussing the Dalai |
Lama |
s envoy |
s negotiating position. (see Fig. 5 - p. 26) |
Our investigators did not have access to the stolen documents for reasons of confidentiality. |
However, we can assume their significance to Sino-Tibetan negotiations. One example is the fact |
that GhostNet penetrated computers of organizations involved in China-TGIE negotiations.45 |
See, http://www.threatexpert.com/report.aspx?md5=79f7f4695b8878cf1760e8626129ca88 and http://www.threatexpert.com/report. |
aspx?md5=ea03a7359505e19146994ad77b2a1e46 |
Lodi Gyari is the lead person designated by the Dalai Lama to coordinate negotiations with the Chinese government. Our invesigator |
interviewed him in December 2008 in Delhi. We briefed him on our ongoing investigation and offered advice on information security |
while engaged in negotiations in Beijing. Lodi Gyari is also the Executive Chairman of the Board of the International Campaign for |
Tibet (ICT), an independent Washington-based human rights advocacy group. (Note that our investigation uncovered that seven of |
s computers were compromised by GhostNet). |
JR02-2009 Tracking GhostNet - PART TWO |
Fig. 5 |
Malware retrieving a sensitive document. |
This screen capture of the Wireshark network analysis tool shows an infected computer at the Office of His Holiness the Dalai Lama uploading a |
sensitive document to one of the CGI network |
s control servers. |
JR02-2009 Tracking GhostNet - PART TWO |
Tibetan Government-in-Exile (TGIE) |
On September 11, 2008, Wireshark was used to capture packets from a TGIE computer xxxxxxx. An |
analysis revealed that this computer was compromised by malware which sent communication to, and |
received communication from, control servers. |
The malware made connections to a control server on 221.10.254.248 using the host name 927. |
bigwww.com. The IP address 221.10.254.248 is assigned to CNCGROUP-SC (CNC Group CHINA169 |
Sichuan Province Network) in China. The malware on the infected computer used HTTP to connect |
to a JPEG file, which was not an image file but instead contains an IP address and port number |
(124.135.97.21:8005). This IP address, 124.135.97.21, is assigned to CNCGROUP-SD (CNC Group |
CHINA169 Shandong Province Network) in China. |
Offices of Tibet |
London |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.