text
stringlengths 4
429
|
---|
Analysis of list of infected computers |
A detailed analysis of the list of infected computers revealed an overwhelming number of unique |
infections in many countries. The same malware that infected computers at the Dalai Lama |
s office |
and other Tibetan organizations had a much more extensive set of targets. The list of entities and |
locations of those targeted was quite varied. |
In total, we found 1,295 infected computers located in 103 countries. We found that we were able to |
confidently |
on a scale of low, medium, high |
identify 397 of the 1,295 infected computers (26.7%), |
and labelled each one as a high-value target. We did so because they were either significant to the |
relationship between China and Tibet, Taiwan or India, or were identified as computers at foreign |
embassies, diplomatic missions, government ministries, or international organizations. |
Of the remaining infected computers, 536 appear to be computers on private broadband Internet |
providers. The remaining IP addresses do not reverse resolve and available information on these |
hosts does not allow us to make judgements regarding the identity or purpose of these computers. |
Methodology |
We compiled a unified and comprehensive list of infected computers from all the control servers, |
as there was considerable duplication across them. There were several duplicate entries in the list |
of infected computers |
in some cases, the same infected computer was logged multiple times as it |
was connecting from a different IP address. In other instances, multiple infected computers were |
assigned different internal IP addresses and had different computer names but shared the same |
external IP address. This signifies that there were multiple infected computers sharing Internet |
access. Where possible, we filtered the results by unique computer name, and if no computer name |
was present, we filtered by unique external IP address.48 (See Fig. 12 - p. 41) |
On the surface, the names of the infected computers in the sample are provocative. There are references |
to ministries of foreign affairs, foreign embassies, and other government entities. Some contains names of |
officials or their positions/titles. However, we recognize that a computer name can be anything its owner |
wishes, and may be completely unrelated to the location, function, or owner of that particular computer. |
Therefore, in order to be more confident as to the true identity or purpose of the infected computer, |
we relied on reverse DNS look-ups and each IP address |
record from the Regional Internet Registries. |
Using these two pieces of information we were able to confirm the validity of the identity of several |
infected computers with a high (H) degree of confidence. |
In some cases the computer name associated with the infected computer is actually a domain |
name or an acronym for a recognizable institution or organization. In these cases we classified our |
identification of the target with either a medium (M) or low (L) level of confidence. Medium |
confidence refers to instances where we have otherwise identified a related high confidence target, |
In one case we removed 117 unique IP addresses from Mexico that appeared to belong to the same computer connecting in to the |
control server from a DSL provider. |
JR02-2009 Tracking GhostNet - PART TWO |
Fig. 12 |
The geographic location of infected hosts. |
This graphic illustrates the global reach of the GhostNet. There were 1,295 infected computers that reported to the control server. The |
infections were spread across 103 countries. Taiwan reported the most infections followed by the United States, Vietnam and India. |
JR02-2009 Tracking GhostNet - PART TWO |
but for which we rely on the computer name for identification. Low confidence refers to instances |
in which we rely solely on the computer name for identification. |
Table 2: Selected infections |
Organization |
Confidence |
Location |
Infections |
ASEAN |
ID, MY |
Asian Development Bank |
PH, IN |
Associated Press, UK |
GB, HK |
Bureau of International Trade Relations |
CanTV, Venezuela |
Ceger, Portugal |
Consulate General of Malaysia, Hong Kong |
Deloitte & Touche, New York |
Department of Commerce, Solomon Islands |
Department of Foreign Affairs, Indonesia |
Department of Foreign Affairs, Philippines |
Department of Science and Technology, Philippines |
Embassy of China, US (see footnote 50) |
Embassy of Cyprus, Germany |
Embassy of Germany, Australia |
Embassy of India, Belgium |
Embassy of India, Serbia |
Embassy of India, Germany |
Embassy of India, Italy |
Embassy Of India, Kuwait |
Embassy of India, USA |
Embassy of India, Zimbabwe |
Embassy of Indonesia, China |
Embassy of Malaysia, Cuba |
Embassy of Malaysia, Italy |
Embassy of Malta |
Embassy of Malta, Australia |
Embassy of Malta, Belgium |
Embassy of Malta, Libya |
Embassy of Pakistan, Bahrain |
Embassy of Papua New Guinea, China |
Embassy of Portugal, Finland |
Embassy of Portugal, Germany |
Embassy of The Republic Of China (Taiwan), Swaziland |
Embassy of Romania, Finland |
Embassy of Romania, France |
JR02-2009 Tracking GhostNet - PART TWO |
Table 2: Selected infections (cont |
Organization |
Confidence |
Location |
Infections |
Embassy of Romania, Norway |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.