text
stringlengths 4
429
|
---|
Embassy of Romania, PRC |
Embassy of Thailand, Philippines |
Embassy of the Republic of Korea, China |
Government Integrated Telecommunication Network, Malaysia |
High Commission of India, Cyprus |
High Commission Of India, United Kingdom |
Institute for Information Industry, Taiwan |
International Campaign for Tibet |
International Chamber of Shipping, United Kingdom |
Lanka Education and Research Network, Sri Lanka |
Malta External Trade Corporation Ltd. |
Maritime Police, Solomon Islands |
Ministry of Communications, Brunei |
Ministry of Education, Solomon Islands |
Ministry of Foreign Affairs, Bangladesh |
Ministry of Foreign Affairs, Barbados |
Ministry of Foreign Affairs, Bhutan |
Ministry of Foreign Affairs, Brunei |
Ministry Of Foreign Affairs, Iran |
Ministry of Foreign Affairs, Latvia |
Ministry of Industry and Trade, Vietnam |
Ministry of Labour and Human Resources, Bhutan |
National Informatics Centre, India |
NATO, (SHAPE HQ) |
Net Trade, Taiwan |
New Tang Dynasty Television, United States |
Office of the Dalai Lama, India |
Pakistan Mission to The United Nations |
US, JP |
Permanent Delegation of Cyprus to the European Union |
Permanent Mission of Cuba to the United Nations |
PetroVietnam |
Prime Minister |
s Office, Laos |
Public Service Division, Solomon Islands |
Russian Federal University Network, Russian Federation |
Software Technology Parks of India, India |
South Asian Association for Regional Cooperation |
BD, US |
Students for a Free Tibet, United States |
TAITRA, Taiwan |
TW, NG |
JR02-2009 Tracking GhostNet - PART TWO |
Table 2: Selected infections (cont |
Organization |
Confidence |
Location |
Infections |
Taiwan Government Service Network, Taiwan |
Tibetan Government in Exile, India |
IN, US |
Trade and Industry Department, Government of Hong Kong |
Infection timeline |
The earliest infected computer called home to the control server on May 22, 2007. The most recent |
entry in our sample is March 12, 2009. On average, the amount of time that a host was actively |
infected was 145 days.49 While 90 infected computers were only infected for one day, 145 were |
infected for over 400 days. The longest infection span was 660 days. In total, 422 hosts checked in |
March 1-12, 2009; 373 of these computers were infected in 2008. The data indicates that despite a |
reduction in new infections, the network continues to be operational. (See Fig. 13 - p. 45) |
There are significant spikes in infection rates in December 2007 and August 2008. |
There were 320 infections in December 2007 spread across 56 countries. However, 113 were located |
within Taiwan and the majority of these infections occurred within a single organization: the |
Taiwan External Trade Development Council. During this same period, computers at the Embassies |
of India in Belgium and Zimbabwe were infected as were the Embassies of Indonesia and the |
Republic of Korea in the People |
s Republic of China. In addition, computers at the Ministry of |
Foreign Affairs in Iran were infected as were several computers at the Tibetan Government-in-Exile. |
The spike in August 2008 totalled 258 infections spread across 46 countries. The OHHDL computer |
was infected during one of these spikes in August 2008 (It last checked in to the control server |
in September 2008). This spike included the Chinese Embassy in the United States,50 3 computers |
at the Embassy of India in the Unites States, and the High Commission of India in the United |
Kingdom and in Cyprus. It also included the Embassy of Cyprus in Germany, the Embassy of |
Malaysia in Cuba, the Embassy of Thailand in the Philippines and the Ministry of Industry in |
Vietnam. Several companies were also compromised, including Net Trade in Taiwan, the New York |
Office of Deloitte & Touche, and PetroVietnam, the government-owned oil and gas Company. |
The average number of days from the initial infection to the last time an infected computer |
checked in |
with a control server. |
It is unclear whether the affected embassy is the Republic of China (Taiwan) or People |
s Republic of China. |
JR02-2009 Tracking GhostNet - PART TWO |
Fig. 13 |
GhostNet infection timeline. |
This screen capture of a timeline generated with Palantir illustrates when and how many computers were infected by the GhostNet. |
It shows that there are significant spikes in infection rates in December 2007 and August 2008. |
PART THREE: |
Investigating GhostNet: Conclusions |
JR02-2009 Tracking GhostNet - PART THREE |
The evidence presented in this report |
through a combination of field investigations, |
interviews, technical scouting, data analysis, mining and visualization |
paints a |
disturbing picture. |
GhostNet represents a network of compromised computers resident in high-value political, |
economic, and media locations spread across numerous countries worldwide. At the time of writing, |
these organizations are almost certainly oblivious to the compromised situation in which they find |
themselves. The computers of diplomats, military attach |
s, private assistants, secretaries to Prime |
Ministers, journalists and others are under the concealed control of unknown assailant(s). |
In Dharamsala and elsewhere, we have witnessed machines being profiled and sensitive documents |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.