text
stringlengths 4
429
|
---|
being removed. At our Laboratory, we have analysed our own infected |
honey pot |
computer |
and discovered that the capabilities of GhostNet are potent and wide ranging. Almost certainly, |
documents are being removed without the targets |
knowledge, keystrokes logged, web cameras are |
being silently triggered, and audio inputs surreptitiously activated. |
This raises the question, how many sensitive activities have been preemptively anticipated by |
intelligence gathered through this network? How many illegal transactions have been facilitated by |
information harvested through GhostNet? Worst of all, how many people may have been put at risk? |
While these questions are compelling, it would be imprudent to read these findings as an indictment, |
or to attribute to the owners of GhostNet motivations and intentions for which there is no evidence. |
Alternative explanations |
The list of computers controlled by the GhostNet is significant, and certainly atypical for a cybercrime |
network. The size of the network is small, and the concentration of high-value systems is significant. |
At the same time, penetrations of this type are not uncommon. Recently, several large-scale spy |
nets have been discovered, including ones containing lists of affected computers of a magnitude |
higher than that harvested by GhostNet. |
This trend is predictable, converging with accumulating incidents of cyber-attacks facilitated by |
lower entry-thresholds for computer exploitation methods and technologies. The tools we profile in |
our investigation, though apparently amassed in a complex way to achieve a definite purpose, are |
not restricted to an exclusive guild of experts with specialized and confidential knowledge. |
Today, pirated cyber-crime kits circulate extensively on the Internet and can be downloaded by |
anyone about as easily as the latest pirated DVD.51 Cyberspace has empowered individuals and small |
groups of non-state actors to do many things, including executing sophisticated computer network |
operations that were previously only the domain of state intelligence agencies. We have entered |
the era of do-it-yourself (DIY) signals intelligence. |
http://ddanchev.blogspot.com/2008/11/zeus-crimeware-kit-gets-carding-layout.html |
JR02-2009 Tracking GhostNet - PART THREE |
Attribution |
Who is ultimately in control of the GhostNet system? While our analysis reveals that numerous |
politically sensitive and high-value computer systems were compromised, we do not know the |
motivation or the identity of the attacker(s) or how to accurately characterize this network of |
infections as a whole. We have not been able to ascertain the type of data that has been obtained |
by the attacker(s), apart from the basic system information and file listings of the documents |
located on the target computers. Without this data we are unable to deduce with any certainty |
what kind of data the attacker(s) were after. There are thus several possibilities for attribution. |
The most obvious explanation, and certainly the one in which the circumstantial evidence tilts the |
strongest, would be that this set of high profile targets has been exploited by the Chinese state for |
military and strategic-intelligence purposes. Indeed, as described above, many of the high confidence, |
high-value targets that we identified are clearly linked to Chinese foreign and defence policy, |
particularly in South and South East Asia. Like radar sweeping around the southern border of China, |
there is an arc of infected nodes from India, Bhutan, Bangladesh and Vietnam, through Laos, Brunei, |
Philippines, Hong Kong, and Taiwan. Many of the high profile targets reflect some of China |
s most |
vexing foreign and security policy issues, including Tibet and Taiwan. Moreover, the attacker(s) |
addresses examined here trace back in at least several instances to Hainan Island, home of the Lingshui |
signals intelligence facility and the Third Technical Department of the People |
s Liberation Army.52 |
However, we must be cautious to rush to judgement in spite of circumstantial and other evidence, |
as alternative explanations are certainly possible and charges against a government of this nature |
are gravely serious. On the other end of the spectrum is the explanation that this is a random set |
of infected computers that just happens to include high profile targets of strategic significance |
to China, collected by an individual or group with no political agenda per se. Similarly one can |
postulate that the targets gathered together happened less by concerted effort than by sheer |
coincidence. Given the groupings of various entities in the infected computer list (by country |
and organization), internal email communications and sloppy security practices could have led to |
cross-infection and subsequent listing on the control servers. |
Another possible explanation is that there is a single individual or set of individuals (criminal networks, |
for example) who are targeting these high-value targets for profit. This can be in the form of stealing |
financial information or critical data that can be sold to clients, be they states or private entities. There |
are countless examples of large-scale fraud and data theft worldwide and numerous apparent instances |
of outsourcing to third parties of cyber-attacks and espionage, some of which the Information Warfare |
Monitor and its related research project, the OpenNet Initiative, have documented. GhostNet could very |
well be a for-profit, non-state venture. Even |
patriotic hackers |
could be acting on their own volition, |
or with the tacit approval of their government, as operators of the GhostNet. |
Finally, it is not inconceivable that this network of infected computers could have been targeted |
by a state other than China, but operated physically within China (and at least one node in |
http://www.globalsecurity.org/military/world/china/lingshui.htm |
JR02-2009 Tracking GhostNet - PART THREE |
the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for |
example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead |
observers as to the true operator(s) and purpose of the GhostNet system. |
The Significance of GhostNet |
GhostNet is significant, as it does not appear to be a typical cybercrime network. The potential |
political fallout is enormous. But ultimately, the question of who is behind the GhostNet may |
matter less than the strategic significance of the collection of affected targets. What this study |
discovered is serious evidence that information security is an item requiring urgent attention at |
the highest levels. It demonstrates that the subterranean layers of cyberspace, about which most |
users are unaware, are domains of active reconnaissance, surveillance, and exploitation. |
Regardless of who or what is ultimately in control of GhostNet, its capabilities of exploitation and |
the strategic intelligence that can be harvested from it matter most. Indeed, although the Achilles |
heel of the GhostNet system allowed us to monitor and document its far-reaching network of |
infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind. |
PART FOUR: |
About Information Warfare Monitor |
About the Information Warfare Monitor |
http://infowar-monitor.net/ |
The Information Warfare Monitor is an advanced research activity tracking the emergence of cyberspace |
as a strategic domain. We are an independent research effort. Our mission is to build and broaden the |
evidence base available to scholars, policymakers, and others. We aim to educate and inform. |
The Information Warfare Monitor is a public-private venture between two Canadian institutions: The |
SecDev Group, an operational think tank based in Ottawa (Canada), and the Citizen Lab at the Munk |
Centre for International Studies, University of Toronto. The Principal Investigators and |
co-founders of the Information Warfare Monitor are Rafal Rohozinski (The SecDev Group) and |
Ronald Deibert (Citizen Lab). |
The Information Warfare Monitor is supported by The SecDev Group which conducts field-based |
investigations and data gathering. Our advanced research and analysis facilities are located at the |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.