Knowledge (XXG)

GhostNet

Source 📝

294:
Researchers have also noted the possibility that GhostNet was an operation run by private citizens in China for profit or for patriotic reasons, or created by intelligence agencies from other countries such as Russia or the United States. The Chinese government has stated that China "strictly forbids
314:
Despite the lack of evidence to pinpoint the Chinese government as responsible for intrusions against Tibetan-related targets, researchers at Cambridge have found actions taken by Chinese government officials that corresponded with the information obtained via computer intrusions. One such incident
327:
and other instant messengers to communicate with Chinese Internet users. In 2008, IWM found that TOM-Skype, the Chinese version of Skype, was logging and storing text messages exchanged between users. It is possible that the Chinese authorities acquired the chat transcripts through these means.
298:
The "Ghostnet Report" documents several unrelated infections at Tibetan-related organizations in addition to the Ghostnet infections. By using the email addresses provided by the IWM report, Scott J. Henderson had managed to trace one of the operators of one of the infections (non-Ghostnet) to
270:
to access the system. This Trojan connects back to a control server, usually located in China, to receive commands. The infected computer will then execute the command specified by the control server. Occasionally, the command specified by the control server will cause the infected computer to
257:
Since its discovery, GhostNet has attacked other government networks, for example Canadian official financial departments in early 2011, forcing them off-line. Governments commonly do not admit such attacks, which must be verified by official but anonymous sources.
335:, China, and have pointed out that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the People's Liberation Army. Furthermore, one of GhostNet's four control servers has been revealed to be a 322:
Another incident involved a Tibetan woman who was interrogated by Chinese intelligence officers and was shown transcripts of her online conversations. However, there are other possible explanations for this event. Drelwa uses
279:. Such a computer can be controlled or inspected by attackers, and the software even has the ability to turn on camera and audio-recording functions of infected computers, enabling attackers to perform surveillance. 1107: 499: 304: 101:'s representative in Geneva suspecting that their computer network had been infiltrated. The IWM is composed of researchers from The SecDev Group and Canadian consultancy and the 992: 126: 1921: 568: 287:
The researchers from the IWM stated they could not conclude that the Chinese government was responsible for the spy network. However, a report from researchers at the
699: 1150: 266:
Emails are sent to target organizations that contain contextually relevant information. These emails contain malicious attachments, that when opened, enable a
1901: 1341: 1176: 475: 122: 1271: 1742: 1229: 825: 910: 542: 362: 860: 106: 352: 247: 761: 989: 1931: 1143: 1123: 1051:"Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments" 508: 133:, where the Tibetan government-in-exile is located. The discovery of the 'GhostNet', and details of its operations, were reported by 640: 1876: 1353: 1281: 884: 783: 674: 600: 442: 331:
IWM researchers have also found that when detected, GhostNet is consistently controlled from IP addresses located on the island of
852: 1613: 1452: 1027: 564: 73:
and GhostNet has infiltrated high-value political, economic and media locations in 103 countries. Computer systems belonging to
1071: 1891: 1115: 40: 965: 1028:
Tracking GhostNet: Investigating a Cyber Espionage Network (Infowar Monitor Report (SecDev and Citize Lab), March 29, 2009)
707: 1181: 1171: 1136: 1099: 32: 1926: 1245: 382: 815: 1886: 291:
says they believe that the Chinese government is behind the intrusions they analyzed at the Office of the Dalai Lama.
199: 58: 1916: 1368: 1348: 942: 347: 66: 1038: 465: 1544: 1618: 1378: 267: 1685: 1644: 1393: 670: 288: 118: 731: 1896: 1711: 1706: 1297: 1276: 69:, or a network actor that spies undetected. Its command and control infrastructure is based mainly in the 315:
involved a diplomat who was pressured by Beijing after receiving an email invitation to a visit with the
139:
on March 29, 2009. Investigators focused initially on allegations of Chinese cyber-espionage against the
1911: 1906: 1701: 1675: 1416: 110: 1737: 1250: 914: 372: 357: 532: 1442: 959:"BREACHING TRUST: An analysis of surveillance and security practices on China's TOM-Skype platform" 470: 1508: 1213: 1000: 135: 1534: 1529: 751: 1566: 1524: 1426: 1336: 1266: 1119: 1111: 1093: 1076: 504: 276: 1039:
Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
1881: 1421: 1302: 703: 387: 251: 1358: 630: 1825: 1487: 1467: 1447: 1437: 996: 946: 856: 408: 316: 98: 94: 78: 877: 793: 663: 1032: 590: 432: 1851: 1794: 1758: 1554: 1373: 849: 635: 403: 239: 143:
community, such as instances where email correspondence and other data were extracted.
1870: 1815: 1597: 1462: 1388: 367: 235: 140: 1050: 1789: 1560: 1477: 1472: 1323: 938: 735: 377: 62: 958: 1799: 1763: 1660: 1482: 1411: 1331: 219: 155: 130: 102: 275:
that allows attackers to gain complete, real-time control of computers running
65:
operation discovered in March 2009. The operation is likely associated with an
1768: 1383: 1308: 1207: 398: 324: 308: 207: 1841: 1820: 788: 537: 272: 215: 159: 93:
GhostNet was discovered and named following a 10-month investigation by the
20: 878:"The snooping dragon: social-malware surveillance of the Tibetan movement" 664:"The snooping dragon: social-malware surveillance of the Tibetan movement" 1846: 1773: 1732: 1680: 1592: 1492: 935: 820: 595: 437: 227: 191: 183: 175: 129:, also contributed to the investigation at one of the three locations in 1665: 1577: 1128: 756: 392: 300: 187: 163: 147: 74: 1716: 1457: 1403: 1043: 332: 303:. He identifies the hacker as a 27-year-old man who had attended the 231: 223: 211: 179: 167: 48: 533:"Chinese hackers 'using ghost network to control embassy computers'" 497:
Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones (2012).
85:
exile centers in India, London and New York City were compromised.
1670: 1623: 171: 151: 82: 70: 1628: 243: 203: 195: 1132: 246:
computer was monitored for half a day and the computers of the
1108:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
500:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
1021: 565:"Tracking GhostNet: Investigating a Cyber Espionage Network" 77:, foreign ministries and other government offices, and the 850:
Tracking GhostNet: Investigating a Cyber Espionage Network
784:"Spying operation by China infiltrated computers: Report" 305:
University of Electronic Science and Technology of China
97:(IWM), carried out after IWM researchers approached the 1016: 700:"Researchers: Cyber spies break into govt computers" 1834: 1808: 1782: 1751: 1725: 1694: 1653: 1637: 1606: 1585: 1576: 1543: 1517: 1501: 1402: 1322: 1290: 1259: 1238: 1222: 1200: 1193: 127:
Institute for Information Infrastructure Protection
752:"Canadians find vast computer spy network: report" 631:"Vast Spy System Loots Computers in 103 Countries" 307:, and currently connected with the Chinese hacker 117:, an affiliated publication. Researchers from the 474:. Vol. 180, no. 16. London. p. 5. 883:. Computer Laboratory, University of Cambridge. 876:Nagaraja, Shishir; Anderson, Ross (March 2009). 242:government offices were infiltrated, although a 1106:Bodmer, Kilger, Carpenter, & Jones (2012). 234:were also targeted. No evidence was found that 1080:. Archived from the original on April 10, 2009 738:, March 30, 2009. Retrieved on March 30, 2009. 662:Shishir Nagaraja, Ross Anderson (March 2009). 113:; the research findings were published in the 1144: 8: 816:"Foreign hackers attack Canadian government" 146:Compromised systems were discovered in the 1582: 1197: 1151: 1137: 1129: 936:U of T team tracks China-based cyber spies 746: 744: 624: 622: 620: 618: 57:) is the name given by researchers at the 1922:Chinese advanced persistent threat groups 1230:Sony BMG copy protection rootkit scandal 1072:"Cyber-skirmish at the top of the world" 871: 869: 194:and the office of the Prime Minister of 1110:. New York: McGraw-Hill Osborne Media. 845: 843: 419: 271:download and install a Trojan known as 1091: 990:Meet the Canadians who busted Ghostnet 828:from the original on February 18, 2011 526: 524: 522: 520: 363:Chinese espionage in the United States 861:Munk Centre for International Studies 727: 725: 466:"China Accused of Global Cyberspying" 427: 425: 423: 7: 353:Chinese intelligence activity abroad 1902:Mass intelligence-gathering systems 971:from the original on March 24, 2012 890:from the original on April 20, 2009 764:from the original on March 29, 2009 680:from the original on April 20, 2009 603:from the original on March 31, 2009 545:from the original on March 30, 2009 445:from the original on March 30, 2009 433:"Major cyber spy network uncovered" 913:. The Dark Visitor. Archived from 909:Henderson, Scott (April 2, 2009). 643:from the original on April 1, 2009 14: 732:China-based spies target Thailand 591:"China denies spying allegations" 571:from the original on July 3, 2017 478:from the original on June 6, 2024 373:Economic and industrial espionage 1049:Kelly, Cathal (March 31, 2009). 792:. March 29, 2009. Archived from 706:. March 29, 2009. Archived from 629:Markoff, John (March 28, 2009). 464:Glaister, Dan (March 30, 2009). 531:Harvey, Mike (March 29, 2009). 53: 44: 36: 1: 911:"Hunting the GhostNet Hacker" 503:. McGraw-Hill Osborne Media. 107:Munk School of Global Affairs 1561:Kaminsky DNS cache poisoning 1305:(findings published in 2010) 1070:Lee, Peter (April 8, 2009). 1024:at the University of Toronto 383:Internet censorship in China 59:Information Warfare Monitor 1948: 1057:. Toronto, Ontario, Canada 348:Advanced persistent threat 319:from his representatives. 71:People's Republic of China 67:advanced persistent threat 18: 1164: 1098:: CS1 maint: unfit URL ( 995:December 9, 2011, at the 19:For the fishing net, see 1877:Open-source intelligence 1035:Mirror of the report PDF 16:Electronic spy operation 1282:US military cyberattack 1272:Cyberattacks on Georgia 1246:Cyberattacks on Estonia 1044:Twitter: InfowarMonitor 945:March 31, 2009, at the 671:University of Cambridge 289:University of Cambridge 262:Technical functionality 119:University of Cambridge 1277:Sarah Palin email hack 855:April 8, 2009, at the 1932:China–India relations 1892:Cyberwarfare by China 1417:Jeanson James Ancheta 1055:Toronto Star (Canada) 824:. February 17, 2011. 111:University of Toronto 1251:Operation: Bot Roast 1159:Hacking in the 2000s 358:Chinese cyberwarfare 254:, were infiltrated. 1927:Cybercrime in India 471:The Guardian Weekly 125:, supported by the 123:Computer Laboratory 41:traditional Chinese 1887:Espionage projects 1214:Operation Firewall 1001:The Globe and Mail 760:. March 28, 2009. 599:. March 30, 2009. 441:. March 29, 2009. 337:government server. 295:any cyber crime." 200:foreign ministries 136:The New York Times 33:simplified Chinese 1917:Cyberattack gangs 1864: 1863: 1860: 1859: 1342:associated events 1318: 1317: 1267:Project Chanology 1188: 1187: 1077:Asia Times Online 710:on March 31, 2009 277:Microsoft Windows 61:to a large-scale 1939: 1583: 1434:str0ke (milw0rm) 1303:Operation Aurora 1198: 1167: 1166: 1153: 1146: 1139: 1130: 1103: 1097: 1089: 1087: 1085: 1066: 1064: 1062: 1017:The SecDev Group 1005: 987: 981: 980: 978: 976: 970: 963: 955: 949: 933: 927: 926: 924: 922: 917:on April 6, 2009 906: 900: 899: 897: 895: 889: 882: 873: 864: 863:. March 29, 2009 847: 838: 837: 835: 833: 812: 806: 805: 803: 801: 796:on April 1, 2009 780: 774: 773: 771: 769: 748: 739: 729: 720: 719: 717: 715: 704:Associated Press 696: 690: 689: 687: 685: 679: 668: 659: 653: 652: 650: 648: 626: 613: 612: 610: 608: 587: 581: 580: 578: 576: 561: 555: 554: 552: 550: 528: 515: 514: 494: 488: 487: 485: 483: 461: 455: 454: 452: 450: 429: 388:Operation Aurora 338: 252:Washington, D.C. 55: 46: 38: 1947: 1946: 1942: 1941: 1940: 1938: 1937: 1936: 1867: 1866: 1865: 1856: 1830: 1804: 1778: 1747: 1721: 1690: 1649: 1633: 1614:Anna Kournikova 1602: 1572: 1547: 1545:Vulnerabilities 1539: 1513: 1497: 1488:Dmitry Sklyarov 1468:Albert Gonzalez 1398: 1314: 1286: 1255: 1234: 1218: 1189: 1160: 1157: 1090: 1083: 1081: 1069: 1060: 1058: 1048: 1013: 1008: 997:Wayback Machine 988: 984: 974: 972: 968: 961: 957: 956: 952: 947:Wayback Machine 941:March 29, 2009 934: 930: 920: 918: 908: 907: 903: 893: 891: 887: 880: 875: 874: 867: 857:Wayback Machine 848: 841: 831: 829: 814: 813: 809: 799: 797: 782: 781: 777: 767: 765: 750: 749: 742: 730: 723: 713: 711: 698: 697: 693: 683: 681: 677: 666: 661: 660: 656: 646: 644: 628: 627: 616: 606: 604: 589: 588: 584: 574: 572: 563: 562: 558: 548: 546: 530: 529: 518: 511: 496: 495: 491: 481: 479: 463: 462: 458: 448: 446: 431: 430: 421: 417: 409:14th Dalai Lama 344: 336: 285: 264: 115:Infowar Monitor 95:Infowar Monitor 91: 24: 17: 12: 11: 5: 1945: 1943: 1935: 1934: 1929: 1924: 1919: 1914: 1909: 1904: 1899: 1894: 1889: 1884: 1879: 1869: 1868: 1862: 1861: 1858: 1857: 1855: 1854: 1849: 1844: 1838: 1836: 1832: 1831: 1829: 1828: 1823: 1818: 1812: 1810: 1806: 1805: 1803: 1802: 1800:Black Energy 1 1797: 1792: 1786: 1784: 1780: 1779: 1777: 1776: 1771: 1766: 1761: 1755: 1753: 1749: 1748: 1746: 1745: 1740: 1735: 1729: 1727: 1723: 1722: 1720: 1719: 1714: 1709: 1704: 1698: 1696: 1692: 1691: 1689: 1688: 1683: 1678: 1673: 1668: 1663: 1657: 1655: 1651: 1650: 1648: 1647: 1641: 1639: 1635: 1634: 1632: 1631: 1626: 1621: 1616: 1610: 1608: 1604: 1603: 1601: 1600: 1595: 1589: 1587: 1580: 1574: 1573: 1571: 1570: 1564: 1558: 1555:Shatter attack 1551: 1549: 1541: 1540: 1538: 1537: 1532: 1527: 1521: 1519: 1518:Hacking forums 1515: 1514: 1512: 1511: 1505: 1503: 1499: 1498: 1496: 1495: 1490: 1485: 1480: 1475: 1470: 1465: 1460: 1455: 1450: 1445: 1440: 1435: 1432: 1429: 1424: 1419: 1414: 1408: 1406: 1400: 1399: 1397: 1396: 1391: 1386: 1381: 1376: 1374:PLA Unit 61398 1371: 1366: 1361: 1356: 1351: 1346: 1345: 1344: 1334: 1328: 1326: 1320: 1319: 1316: 1315: 1313: 1312: 1306: 1300: 1298:Operation Troy 1294: 1292: 1288: 1287: 1285: 1284: 1279: 1274: 1269: 1263: 1261: 1257: 1256: 1254: 1253: 1248: 1242: 1240: 1236: 1235: 1233: 1232: 1226: 1224: 1220: 1219: 1217: 1216: 1211: 1204: 1202: 1195: 1191: 1190: 1186: 1185: 1179: 1174: 1165: 1162: 1161: 1158: 1156: 1155: 1148: 1141: 1133: 1127: 1126: 1124:978-0071772495 1104: 1067: 1046: 1041: 1036: 1030: 1025: 1019: 1012: 1011:External links 1009: 1007: 1006: 1004:March 29, 2009 982: 950: 928: 901: 865: 839: 807: 775: 740: 721: 691: 654: 636:New York Times 614: 582: 556: 516: 510:978-0071772495 509: 489: 456: 418: 416: 413: 412: 411: 406: 404:Shadow Network 401: 396: 390: 385: 380: 375: 370: 365: 360: 355: 350: 343: 340: 284: 281: 263: 260: 248:Indian embassy 90: 87: 15: 13: 10: 9: 6: 4: 3: 2: 1944: 1933: 1930: 1928: 1925: 1923: 1920: 1918: 1915: 1913: 1910: 1908: 1905: 1903: 1900: 1898: 1897:2009 in China 1895: 1893: 1890: 1888: 1885: 1883: 1880: 1878: 1875: 1874: 1872: 1853: 1850: 1848: 1845: 1843: 1840: 1839: 1837: 1833: 1827: 1824: 1822: 1819: 1817: 1814: 1813: 1811: 1807: 1801: 1798: 1796: 1793: 1791: 1788: 1787: 1785: 1781: 1775: 1772: 1770: 1767: 1765: 1762: 1760: 1757: 1756: 1754: 1750: 1744: 1741: 1739: 1736: 1734: 1731: 1730: 1728: 1724: 1718: 1715: 1713: 1710: 1708: 1705: 1703: 1700: 1699: 1697: 1693: 1687: 1684: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1658: 1656: 1652: 1646: 1643: 1642: 1640: 1636: 1630: 1627: 1625: 1622: 1620: 1617: 1615: 1612: 1611: 1609: 1605: 1599: 1596: 1594: 1591: 1590: 1588: 1584: 1581: 1579: 1575: 1568: 1565: 1562: 1559: 1556: 1553: 1552: 1550: 1546: 1542: 1536: 1533: 1531: 1528: 1526: 1523: 1522: 1520: 1516: 1510: 1507: 1506: 1504: 1500: 1494: 1491: 1489: 1486: 1484: 1481: 1479: 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1436: 1433: 1430: 1428: 1425: 1423: 1420: 1418: 1415: 1413: 1410: 1409: 1407: 1405: 1401: 1395: 1392: 1390: 1389:World of Hell 1387: 1385: 1382: 1380: 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1343: 1340: 1339: 1338: 1335: 1333: 1330: 1329: 1327: 1325: 1321: 1310: 1307: 1304: 1301: 1299: 1296: 1295: 1293: 1289: 1283: 1280: 1278: 1275: 1273: 1270: 1268: 1265: 1264: 1262: 1258: 1252: 1249: 1247: 1244: 1243: 1241: 1237: 1231: 1228: 1227: 1225: 1221: 1215: 1212: 1209: 1206: 1205: 1203: 1199: 1196: 1192: 1184: → 1183: 1180: 1178: 1175: 1173: 1170:←  1169: 1168: 1163: 1154: 1149: 1147: 1142: 1140: 1135: 1134: 1131: 1125: 1121: 1117: 1113: 1109: 1105: 1101: 1095: 1079: 1078: 1073: 1068: 1056: 1052: 1047: 1045: 1042: 1040: 1037: 1034: 1031: 1029: 1026: 1023: 1020: 1018: 1015: 1014: 1010: 1003: 1002: 998: 994: 991: 986: 983: 967: 960: 954: 951: 948: 944: 940: 937: 932: 929: 916: 912: 905: 902: 886: 879: 872: 870: 866: 862: 858: 854: 851: 846: 844: 840: 827: 823: 822: 817: 811: 808: 795: 791: 790: 785: 779: 776: 763: 759: 758: 753: 747: 745: 741: 737: 733: 728: 726: 722: 709: 705: 701: 695: 692: 676: 673:. p. 2. 672: 665: 658: 655: 642: 638: 637: 632: 625: 623: 621: 619: 615: 602: 598: 597: 592: 586: 583: 570: 566: 560: 557: 544: 540: 539: 534: 527: 525: 523: 521: 517: 512: 506: 502: 501: 493: 490: 477: 473: 472: 467: 460: 457: 444: 440: 439: 434: 428: 426: 424: 420: 414: 410: 407: 405: 402: 400: 397: 395:(from Turkey) 394: 391: 389: 386: 384: 381: 379: 376: 374: 371: 369: 368:Cyber-warfare 366: 364: 361: 359: 356: 354: 351: 349: 346: 345: 341: 339: 334: 329: 326: 320: 318: 312: 310: 306: 302: 296: 292: 290: 282: 280: 278: 274: 269: 261: 259: 255: 253: 249: 245: 241: 237: 233: 229: 225: 221: 217: 213: 209: 205: 201: 197: 193: 189: 185: 181: 177: 173: 169: 165: 161: 157: 153: 149: 144: 142: 141:Tibetan exile 138: 137: 132: 128: 124: 120: 116: 112: 108: 104: 100: 96: 88: 86: 84: 80: 76: 72: 68: 64: 60: 56: 50: 42: 34: 30: 26: 22: 1912:Cyberwarfare 1907:Cyberattacks 1743:Sony rootkit 1509:Bluehell IRC 1478:Dan Kaminsky 1473:Sven Jaschan 1363: 1082:. Retrieved 1075: 1059:. Retrieved 1054: 999: 985: 973:. Retrieved 953: 939:Toronto Star 931: 919:. Retrieved 915:the original 904: 892:. Retrieved 832:February 17, 830:. Retrieved 819: 810: 798:. Retrieved 794:the original 787: 778: 766:. Retrieved 755: 736:Bangkok Post 712:. Retrieved 708:the original 694: 682:. Retrieved 657: 645:. Retrieved 634: 605:. Retrieved 594: 585: 575:September 9, 573:. Retrieved 559: 547:. Retrieved 536: 498: 492: 480:. Retrieved 469: 459: 447:. Retrieved 436: 378:Honker Union 330: 321: 313: 297: 293: 286: 268:Trojan horse 265: 256: 145: 134: 114: 92: 63:cyber spying 52: 28: 27: 25: 1661:SQL Slammer 1483:Samy Kamkar 1404:Individuals 1369:Level Seven 1332:Ac1db1tch3z 1311:(2008–2010) 1210:(2003–2006) 1022:Citizen Lab 309:underground 220:Philippines 156:South Korea 131:Dharamshala 103:Citizen Lab 54:YōuLíngWǎng 1871:Categories 1548:discovered 1535:darksun.ws 1530:unkn0wn.eu 1438:Lil Hacker 1384:ShadowCrew 1309:WebcamGate 1208:Titan Rain 1116:0071772499 541:. London. 415:References 399:Titan Rain 317:Dalai Lama 208:Bangladesh 99:Dalai Lama 79:Dalai Lama 1842:Conficker 1821:Agent.btz 1349:Avalanche 1337:Anonymous 1194:Incidents 894:March 29, 800:March 29, 789:The Hindu 768:March 29, 714:March 29, 684:March 31, 647:March 29, 607:March 31, 549:March 29, 538:The Times 449:March 29, 273:Gh0st Rat 216:Indonesia 160:Indonesia 148:embassies 89:Discovery 75:embassies 21:Ghost net 1847:Koobface 1826:Mariposa 1774:Stration 1769:Clickbot 1733:PGPCoder 1681:Graybird 1619:Code Red 1593:ILOVEYOU 1567:sslstrip 1525:ryan1918 1502:Darknets 1493:Stakkato 1431:Digerati 1427:Dshocker 1394:Sandworm 1364:GhostNet 1177:Timeline 1094:cite web 1084:April 9, 1061:April 4, 1033:F-Secure 993:Archived 975:June 24, 966:Archived 943:Archived 921:April 2, 885:Archived 853:Archived 826:Archived 821:CBC News 762:Archived 675:Archived 641:Archived 601:Archived 596:BBC News 569:Archived 543:Archived 482:April 7, 476:Archived 443:Archived 438:BBC News 342:See also 228:Barbados 192:Pakistan 184:Portugal 176:Thailand 29:GhostNet 1882:Spyware 1852:Waledac 1759:Rustock 1686:Blaster 1666:Welchia 1598:Pikachu 1578:Malware 1448:camZero 757:Reuters 393:RedHack 301:Chengdu 188:Germany 164:Romania 109:at the 83:Tibetan 1816:Asprox 1717:Mydoom 1712:Sasser 1707:NetSky 1645:Simile 1569:(2009) 1563:(2008) 1557:(2002) 1463:diabl0 1458:Cyxymu 1453:Coolio 1422:SilenZ 1324:Groups 1122:  1114:  507:  333:Hainan 283:Origin 232:Bhutan 224:Brunei 212:Latvia 198:. The 180:Taiwan 168:Cyprus 51:: 49:pinyin 43:: 35:: 1790:Storm 1702:Bagle 1676:Gruel 1671:Sobig 1624:Nimda 1412:AKill 1359:0x1fe 1182:2010s 1172:1990s 969:(PDF) 962:(PDF) 888:(PDF) 881:(PDF) 678:(PDF) 667:(PDF) 172:Malta 152:India 1835:2009 1809:2008 1795:ZeuS 1783:2007 1764:ZLOB 1752:2006 1738:Samy 1726:2005 1695:2004 1654:2003 1638:2002 1629:Klez 1607:2001 1586:2000 1443:BadB 1354:GNAA 1291:2009 1260:2008 1239:2007 1223:2005 1201:2004 1120:ISBN 1112:ISBN 1100:link 1086:2009 1063:2009 977:2009 923:2009 896:2009 834:2011 802:2009 770:2009 716:2009 686:2009 649:2009 609:2009 577:2017 551:2009 505:ISBN 484:2009 451:2009 244:NATO 240:U.K. 236:U.S. 230:and 204:Iran 196:Laos 190:and 1379:RBN 250:in 238:or 202:of 150:of 121:'s 81:'s 45:幽靈網 37:幽灵网 1873:: 1118:, 1096:}} 1092:{{ 1074:. 1053:. 964:. 868:^ 859:. 842:^ 818:. 786:. 754:. 743:^ 734:. 724:^ 702:. 669:. 639:. 633:. 617:^ 593:. 567:. 535:. 519:^ 468:. 435:. 422:^ 325:QQ 311:. 226:, 222:, 218:, 214:, 210:, 206:, 186:, 182:, 178:, 174:, 170:, 166:, 162:, 158:, 154:, 105:, 47:; 39:; 1152:e 1145:t 1138:v 1102:) 1088:. 1065:. 979:. 925:. 898:. 836:. 804:. 772:. 718:. 688:. 651:. 611:. 579:. 553:. 513:. 486:. 453:. 31:( 23:.

Index

Ghost net
simplified Chinese
traditional Chinese
pinyin
Information Warfare Monitor
cyber spying
advanced persistent threat
People's Republic of China
embassies
Dalai Lama
Tibetan
Infowar Monitor
Dalai Lama
Citizen Lab
Munk School of Global Affairs
University of Toronto
University of Cambridge
Computer Laboratory
Institute for Information Infrastructure Protection
Dharamshala
The New York Times
Tibetan exile
embassies
India
South Korea
Indonesia
Romania
Cyprus
Malta
Thailand

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.