text
stringlengths 4
429
|
---|
This Palantir screen capture shows the GhostNet servers we uncovered and their relationship with the malicious email sent to, 1) the |
International Tibet Support Network, 2) the infected computer at the Office of His Holiness the Dalai Lama; and, 3) the honey pot network set |
up at the Citizen Lab. |
JR02-2009 Tracking GhostNet - PART TWO |
The four control servers are: |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, Hainan-TELECOM, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, US |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CHINANET-SC, CN |
The six control/command servers are: |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-HI, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CUHKNET, HK |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-JS, CN |
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN |
The data obtained from WHOIS records concerning domain name registration reveals that most |
of the domains are traceable to the same individual. However, the attacker(s) could have simply |
stolen the domains from someone else, or compromised the servers hosting these domains. |
Table 1: Domain name registration information |
xxxxxxxxxxxxx |
xxxxxxxxxxxxx |
xxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxxxxxxxxxxxxx |
25/04/06 |
xxxxxxxxxxxxx |
xxxxxxxxxxxxx |
xxxxxxxxxxxxx |
xxxxxxxxxxxxx |
26/11/07 |
xxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxx |
xxxxxxxxxxxxxxxxxxx |
20/06/08 |
xxxxxxxxxxxxxxxxxx |
xxxxxxxxx |
xxxxxxxxxxxxxxxxxx |
03/09/08 |
List of infected computers (see Fig. 8 - p. 33) |
The Server List interface provides information on each computer infected by the attacker(s) |
malware, indicating the name given to the computer (by its owner/operator), its IP address, when |
it was first infected, when it last called home (i.e. the control server), and how many times it |
has called home. Each infected computer is assigned a unique identification number so that the |
infected computer can be tracked even when its IP address changes. The page also features a link |
to the Send Command interface, through which the attacker(s) sends instructions to the infected |
JR02-2009 Tracking GhostNet - PART TWO |
Fig. 8 |
The GhostNet |
Server List |
interface. |
This screen capture of the GhostNet interface shows all infected computers that have |
checked in |
with the control server. It has been obscured |
to protect the identity of the victims. |
JR02-2009 Tracking GhostNet - PART TWO |
computers. There is also a button at the top of the page that links to a Command Result page that |
shows the status of the commands sent to the host and their results. |
To corroborate our findings, there was an entry in the Server List page of the infected OHHDL |
computer that we analysed during our field investigations outlined in Part One. It contained the |
unique ID, the IP address, computer name, and a link to issue commands to the infected computer. |
Sending commands |
The Send Command link provided for each entry yields an interface that allows an attacker(s) to |
send specific commands to the selected infected computer. In addition to a custom command, the |
attacker(s) may choose from a menu of commands, which includes options to download binaries that |
provide additional functionality (such as keystroke logging or remote administration), acquire system |
information (list computer information, software and documents on the computer), or cause the |
malware to become dormant. (See Fig. 9 - p. 35) |
Using the Send Command interface, the attacker(s) issues instructions to the infected computers to |
download malicious files that are disguised as standard image files. As mentioned above, the files |
are most often hosted on additional command servers that appear to be dedicated to hosting these |
infected files.46 These command servers contain a variety of files. While the exact function of each |
file is not known, the file names given to them by the attacker(s) provide some indication of their |
functionality. There are file names associated with the retrieval of files as well as keystroke logging. |
One of the commands available to the attacker(s) instructs infected computers to download the |
gh0st RAT remote administration tool, which gives the attacker(s) full, real-time control of the infected |
computer. Gh0st RAT is an open source Trojan that is widely available online. It was developed by |
Chinese programmers but has now been translated into English. The program allows an attacker to |
create an executable file that can be repacked and disguised and used to infect and compromise a target |
computer. This file can be configured to directly connect to the gh0st RAT owner or to a third location, a |
control server, when it retrieves the current IP address of the gh0st RAT owner. (See Fig. 10 - p. 36) |
Once the infected computer connects to the gh0st RAT owner, an entry appears in the Connection |
window with some information about the infected computer. The gh0st RAT owner may then |
issue commands to the infected computer. These commands include file manager, screen capture, |
keylogger, remote shell, system, webcam view, audio capture, as well as the ability to force the |
infected host to download and execute additional malware, such as a gh0st RAT update. |
During the course of the investigation, we infected a honey pot computer with the attacker(s) |
malware. We instructed our infected computer to download the attacker(s) |
version of gh0st RAT |
using the malicious network |
s web-based administration interface. The gh0st RAT attempted to |
connect to several *.broad.hk.hi.dynamic.163data.com.cn IP addresses before finally successfully |
connecting to xxxxxxxxxxxxxxxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn). |
In some cases the malicious image files are hosted on the control servers themselves. |
JR02-2009 Tracking GhostNet - PART TWO |
Fig. 9 |
The GhostNet |
Send Command |
interface. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.