294:
Researchers have also noted the possibility that GhostNet was an operation run by private citizens in China for profit or for patriotic reasons, or created by intelligence agencies from other countries such as Russia or the United States. The
Chinese government has stated that China "strictly forbids
314:
Despite the lack of evidence to pinpoint the
Chinese government as responsible for intrusions against Tibetan-related targets, researchers at Cambridge have found actions taken by Chinese government officials that corresponded with the information obtained via computer intrusions. One such incident
327:
and other instant messengers to communicate with
Chinese Internet users. In 2008, IWM found that TOM-Skype, the Chinese version of Skype, was logging and storing text messages exchanged between users. It is possible that the Chinese authorities acquired the chat transcripts through these means.
298:
The "Ghostnet Report" documents several unrelated infections at
Tibetan-related organizations in addition to the Ghostnet infections. By using the email addresses provided by the IWM report, Scott J. Henderson had managed to trace one of the operators of one of the infections (non-Ghostnet) to
270:
to access the system. This Trojan connects back to a control server, usually located in China, to receive commands. The infected computer will then execute the command specified by the control server. Occasionally, the command specified by the control server will cause the infected computer to
257:
Since its discovery, GhostNet has attacked other government networks, for example
Canadian official financial departments in early 2011, forcing them off-line. Governments commonly do not admit such attacks, which must be verified by official but anonymous sources.
335:, China, and have pointed out that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the People's Liberation Army. Furthermore, one of GhostNet's four control servers has been revealed to be a
322:
Another incident involved a
Tibetan woman who was interrogated by Chinese intelligence officers and was shown transcripts of her online conversations. However, there are other possible explanations for this event. Drelwa uses
279:. Such a computer can be controlled or inspected by attackers, and the software even has the ability to turn on camera and audio-recording functions of infected computers, enabling attackers to perform surveillance.
1107:
499:
304:
101:'s representative in Geneva suspecting that their computer network had been infiltrated. The IWM is composed of researchers from The SecDev Group and Canadian consultancy and the
992:
126:
1921:
568:
287:
The researchers from the IWM stated they could not conclude that the
Chinese government was responsible for the spy network. However, a report from researchers at the
699:
1150:
266:
Emails are sent to target organizations that contain contextually relevant information. These emails contain malicious attachments, that when opened, enable a
1901:
1341:
1176:
475:
122:
1271:
1742:
1229:
825:
910:
542:
362:
860:
106:
352:
247:
761:
989:
1931:
1143:
1123:
1051:"Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments"
508:
133:, where the Tibetan government-in-exile is located. The discovery of the 'GhostNet', and details of its operations, were reported by
640:
1876:
1353:
1281:
884:
783:
674:
600:
442:
331:
IWM researchers have also found that when detected, GhostNet is consistently controlled from IP addresses located on the island of
852:
1613:
1452:
1027:
564:
73:
and GhostNet has infiltrated high-value political, economic and media locations in 103 countries. Computer systems belonging to
1071:
1891:
1115:
40:
965:
1028:
Tracking GhostNet: Investigating a Cyber
Espionage Network (Infowar Monitor Report (SecDev and Citize Lab), March 29, 2009)
707:
1181:
1171:
1136:
1099:
32:
1926:
1245:
382:
815:
1886:
291:
says they believe that the
Chinese government is behind the intrusions they analyzed at the Office of the Dalai Lama.
199:
58:
1916:
1368:
1348:
942:
347:
66:
1038:
465:
1544:
1618:
1378:
267:
1685:
1644:
1393:
670:
288:
118:
731:
1896:
1711:
1706:
1297:
1276:
69:, or a network actor that spies undetected. Its command and control infrastructure is based mainly in the
315:
involved a diplomat who was pressured by
Beijing after receiving an email invitation to a visit with the
139:
on March 29, 2009. Investigators focused initially on allegations of Chinese cyber-espionage against the
1911:
1906:
1701:
1675:
1416:
110:
1737:
1250:
914:
372:
357:
532:
1442:
959:"BREACHING TRUST: An analysis of surveillance and security practices on China's TOM-Skype platform"
470:
1508:
1213:
1000:
135:
1534:
1529:
751:
1566:
1524:
1426:
1336:
1266:
1119:
1111:
1093:
1076:
504:
276:
1039:
Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
1881:
1421:
1302:
703:
387:
251:
1358:
630:
1825:
1487:
1467:
1447:
1437:
996:
946:
856:
408:
316:
98:
94:
78:
877:
793:
663:
1032:
590:
432:
1851:
1794:
1758:
1554:
1373:
849:
635:
403:
239:
143:
community, such as instances where email correspondence and other data were extracted.
1870:
1815:
1597:
1462:
1388:
367:
235:
140:
1050:
1789:
1560:
1477:
1472:
1323:
938:
735:
377:
62:
958:
1799:
1763:
1660:
1482:
1411:
1331:
219:
155:
130:
102:
275:
that allows attackers to gain complete, real-time control of computers running
65:
operation discovered in March 2009. The operation is likely associated with an
1768:
1383:
1308:
1207:
398:
324:
308:
207:
1841:
1820:
788:
537:
272:
215:
159:
93:
GhostNet was discovered and named following a 10-month investigation by the
20:
878:"The snooping dragon: social-malware surveillance of the Tibetan movement"
664:"The snooping dragon: social-malware surveillance of the Tibetan movement"
1846:
1773:
1732:
1680:
1592:
1492:
935:
820:
595:
437:
227:
191:
183:
175:
129:, also contributed to the investigation at one of the three locations in
1665:
1577:
1128:
756:
392:
300:
187:
163:
147:
74:
1716:
1457:
1403:
1043:
332:
303:. He identifies the hacker as a 27-year-old man who had attended the
231:
223:
211:
179:
167:
48:
533:"Chinese hackers 'using ghost network to control embassy computers'"
497:
Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones (2012).
85:
exile centers in India, London and New York City were compromised.
1670:
1623:
171:
151:
82:
70:
1628:
243:
203:
195:
1132:
246:
computer was monitored for half a day and the computers of the
1108:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
500:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
1021:
565:"Tracking GhostNet: Investigating a Cyber Espionage Network"
77:, foreign ministries and other government offices, and the
850:
Tracking GhostNet: Investigating a Cyber Espionage Network
784:"Spying operation by China infiltrated computers: Report"
305:
University of Electronic Science and Technology of China
97:(IWM), carried out after IWM researchers approached the
1016:
700:"Researchers: Cyber spies break into govt computers"
1834:
1808:
1782:
1751:
1725:
1694:
1653:
1637:
1606:
1585:
1576:
1543:
1517:
1501:
1402:
1322:
1290:
1259:
1238:
1222:
1200:
1193:
127:
Institute for Information Infrastructure Protection
752:"Canadians find vast computer spy network: report"
631:"Vast Spy System Loots Computers in 103 Countries"
307:, and currently connected with the Chinese hacker
117:, an affiliated publication. Researchers from the
474:. Vol. 180, no. 16. London. p. 5.
883:. Computer Laboratory, University of Cambridge.
876:Nagaraja, Shishir; Anderson, Ross (March 2009).
242:government offices were infiltrated, although a
1106:Bodmer, Kilger, Carpenter, & Jones (2012).
234:were also targeted. No evidence was found that
1080:. Archived from the original on April 10, 2009
738:, March 30, 2009. Retrieved on March 30, 2009.
662:Shishir Nagaraja, Ross Anderson (March 2009).
113:; the research findings were published in the
1144:
8:
816:"Foreign hackers attack Canadian government"
146:Compromised systems were discovered in the
1582:
1197:
1151:
1137:
1129:
936:U of T team tracks China-based cyber spies
746:
744:
624:
622:
620:
618:
57:) is the name given by researchers at the
1922:Chinese advanced persistent threat groups
1230:Sony BMG copy protection rootkit scandal
1072:"Cyber-skirmish at the top of the world"
871:
869:
194:and the office of the Prime Minister of
1110:. New York: McGraw-Hill Osborne Media.
845:
843:
419:
271:download and install a Trojan known as
1091:
990:Meet the Canadians who busted Ghostnet
828:from the original on February 18, 2011
526:
524:
522:
520:
363:Chinese espionage in the United States
861:Munk Centre for International Studies
727:
725:
466:"China Accused of Global Cyberspying"
427:
425:
423:
7:
353:Chinese intelligence activity abroad
1902:Mass intelligence-gathering systems
971:from the original on March 24, 2012
890:from the original on April 20, 2009
764:from the original on March 29, 2009
680:from the original on April 20, 2009
603:from the original on March 31, 2009
545:from the original on March 30, 2009
445:from the original on March 30, 2009
433:"Major cyber spy network uncovered"
913:. The Dark Visitor. Archived from
909:Henderson, Scott (April 2, 2009).
643:from the original on April 1, 2009
14:
732:China-based spies target Thailand
591:"China denies spying allegations"
571:from the original on July 3, 2017
478:from the original on June 6, 2024
373:Economic and industrial espionage
1049:Kelly, Cathal (March 31, 2009).
792:. March 29, 2009. Archived from
706:. March 29, 2009. Archived from
629:Markoff, John (March 28, 2009).
464:Glaister, Dan (March 30, 2009).
531:Harvey, Mike (March 29, 2009).
53:
44:
36:
1:
911:"Hunting the GhostNet Hacker"
503:. McGraw-Hill Osborne Media.
107:Munk School of Global Affairs
1561:Kaminsky DNS cache poisoning
1305:(findings published in 2010)
1070:Lee, Peter (April 8, 2009).
1024:at the University of Toronto
383:Internet censorship in China
59:Information Warfare Monitor
1948:
1057:. Toronto, Ontario, Canada
348:Advanced persistent threat
319:from his representatives.
71:People's Republic of China
67:advanced persistent threat
18:
1164:
1098:: CS1 maint: unfit URL (
995:December 9, 2011, at the
19:For the fishing net, see
1877:Open-source intelligence
1035:Mirror of the report PDF
16:Electronic spy operation
1282:US military cyberattack
1272:Cyberattacks on Georgia
1246:Cyberattacks on Estonia
1044:Twitter: InfowarMonitor
945:March 31, 2009, at the
671:University of Cambridge
289:University of Cambridge
262:Technical functionality
119:University of Cambridge
1277:Sarah Palin email hack
855:April 8, 2009, at the
1932:China–India relations
1892:Cyberwarfare by China
1417:Jeanson James Ancheta
1055:Toronto Star (Canada)
824:. February 17, 2011.
111:University of Toronto
1251:Operation: Bot Roast
1159:Hacking in the 2000s
358:Chinese cyberwarfare
254:, were infiltrated.
1927:Cybercrime in India
471:The Guardian Weekly
125:, supported by the
123:Computer Laboratory
41:traditional Chinese
1887:Espionage projects
1214:Operation Firewall
1001:The Globe and Mail
760:. March 28, 2009.
599:. March 30, 2009.
441:. March 29, 2009.
337:government server.
295:any cyber crime."
200:foreign ministries
136:The New York Times
33:simplified Chinese
1917:Cyberattack gangs
1864:
1863:
1860:
1859:
1342:associated events
1318:
1317:
1267:Project Chanology
1188:
1187:
1077:Asia Times Online
710:on March 31, 2009
277:Microsoft Windows
61:to a large-scale
1939:
1583:
1434:str0ke (milw0rm)
1303:Operation Aurora
1198:
1167:
1166:
1153:
1146:
1139:
1130:
1103:
1097:
1089:
1087:
1085:
1066:
1064:
1062:
1017:The SecDev Group
1005:
987:
981:
980:
978:
976:
970:
963:
955:
949:
933:
927:
926:
924:
922:
917:on April 6, 2009
906:
900:
899:
897:
895:
889:
882:
873:
864:
863:. March 29, 2009
847:
838:
837:
835:
833:
812:
806:
805:
803:
801:
796:on April 1, 2009
780:
774:
773:
771:
769:
748:
739:
729:
720:
719:
717:
715:
704:Associated Press
696:
690:
689:
687:
685:
679:
668:
659:
653:
652:
650:
648:
626:
613:
612:
610:
608:
587:
581:
580:
578:
576:
561:
555:
554:
552:
550:
528:
515:
514:
494:
488:
487:
485:
483:
461:
455:
454:
452:
450:
429:
388:Operation Aurora
338:
252:Washington, D.C.
55:
46:
38:
1947:
1946:
1942:
1941:
1940:
1938:
1937:
1936:
1867:
1866:
1865:
1856:
1830:
1804:
1778:
1747:
1721:
1690:
1649:
1633:
1614:Anna Kournikova
1602:
1572:
1547:
1545:Vulnerabilities
1539:
1513:
1497:
1488:Dmitry Sklyarov
1468:Albert Gonzalez
1398:
1314:
1286:
1255:
1234:
1218:
1189:
1160:
1157:
1090:
1083:
1081:
1069:
1060:
1058:
1048:
1013:
1008:
997:Wayback Machine
988:
984:
974:
972:
968:
961:
957:
956:
952:
947:Wayback Machine
941:March 29, 2009
934:
930:
920:
918:
908:
907:
903:
893:
891:
887:
880:
875:
874:
867:
857:Wayback Machine
848:
841:
831:
829:
814:
813:
809:
799:
797:
782:
781:
777:
767:
765:
750:
749:
742:
730:
723:
713:
711:
698:
697:
693:
683:
681:
677:
666:
661:
660:
656:
646:
644:
628:
627:
616:
606:
604:
589:
588:
584:
574:
572:
563:
562:
558:
548:
546:
530:
529:
518:
511:
496:
495:
491:
481:
479:
463:
462:
458:
448:
446:
431:
430:
421:
417:
409:14th Dalai Lama
344:
336:
285:
264:
115:Infowar Monitor
95:Infowar Monitor
91:
24:
17:
12:
11:
5:
1945:
1943:
1935:
1934:
1929:
1924:
1919:
1914:
1909:
1904:
1899:
1894:
1889:
1884:
1879:
1869:
1868:
1862:
1861:
1858:
1857:
1855:
1854:
1849:
1844:
1838:
1836:
1832:
1831:
1829:
1828:
1823:
1818:
1812:
1810:
1806:
1805:
1803:
1802:
1800:Black Energy 1
1797:
1792:
1786:
1784:
1780:
1779:
1777:
1776:
1771:
1766:
1761:
1755:
1753:
1749:
1748:
1746:
1745:
1740:
1735:
1729:
1727:
1723:
1722:
1720:
1719:
1714:
1709:
1704:
1698:
1696:
1692:
1691:
1689:
1688:
1683:
1678:
1673:
1668:
1663:
1657:
1655:
1651:
1650:
1648:
1647:
1641:
1639:
1635:
1634:
1632:
1631:
1626:
1621:
1616:
1610:
1608:
1604:
1603:
1601:
1600:
1595:
1589:
1587:
1580:
1574:
1573:
1571:
1570:
1564:
1558:
1555:Shatter attack
1551:
1549:
1541:
1540:
1538:
1537:
1532:
1527:
1521:
1519:
1518:Hacking forums
1515:
1514:
1512:
1511:
1505:
1503:
1499:
1498:
1496:
1495:
1490:
1485:
1480:
1475:
1470:
1465:
1460:
1455:
1450:
1445:
1440:
1435:
1432:
1429:
1424:
1419:
1414:
1408:
1406:
1400:
1399:
1397:
1396:
1391:
1386:
1381:
1376:
1374:PLA Unit 61398
1371:
1366:
1361:
1356:
1351:
1346:
1345:
1344:
1334:
1328:
1326:
1320:
1319:
1316:
1315:
1313:
1312:
1306:
1300:
1298:Operation Troy
1294:
1292:
1288:
1287:
1285:
1284:
1279:
1274:
1269:
1263:
1261:
1257:
1256:
1254:
1253:
1248:
1242:
1240:
1236:
1235:
1233:
1232:
1226:
1224:
1220:
1219:
1217:
1216:
1211:
1204:
1202:
1195:
1191:
1190:
1186:
1185:
1179:
1174:
1165:
1162:
1161:
1158:
1156:
1155:
1148:
1141:
1133:
1127:
1126:
1124:978-0071772495
1104:
1067:
1046:
1041:
1036:
1030:
1025:
1019:
1012:
1011:External links
1009:
1007:
1006:
1004:March 29, 2009
982:
950:
928:
901:
865:
839:
807:
775:
740:
721:
691:
654:
636:New York Times
614:
582:
556:
516:
510:978-0071772495
509:
489:
456:
418:
416:
413:
412:
411:
406:
404:Shadow Network
401:
396:
390:
385:
380:
375:
370:
365:
360:
355:
350:
343:
340:
284:
281:
263:
260:
248:Indian embassy
90:
87:
15:
13:
10:
9:
6:
4:
3:
2:
1944:
1933:
1930:
1928:
1925:
1923:
1920:
1918:
1915:
1913:
1910:
1908:
1905:
1903:
1900:
1898:
1897:2009 in China
1895:
1893:
1890:
1888:
1885:
1883:
1880:
1878:
1875:
1874:
1872:
1853:
1850:
1848:
1845:
1843:
1840:
1839:
1837:
1833:
1827:
1824:
1822:
1819:
1817:
1814:
1813:
1811:
1807:
1801:
1798:
1796:
1793:
1791:
1788:
1787:
1785:
1781:
1775:
1772:
1770:
1767:
1765:
1762:
1760:
1757:
1756:
1754:
1750:
1744:
1741:
1739:
1736:
1734:
1731:
1730:
1728:
1724:
1718:
1715:
1713:
1710:
1708:
1705:
1703:
1700:
1699:
1697:
1693:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1659:
1658:
1656:
1652:
1646:
1643:
1642:
1640:
1636:
1630:
1627:
1625:
1622:
1620:
1617:
1615:
1612:
1611:
1609:
1605:
1599:
1596:
1594:
1591:
1590:
1588:
1584:
1581:
1579:
1575:
1568:
1565:
1562:
1559:
1556:
1553:
1552:
1550:
1546:
1542:
1536:
1533:
1531:
1528:
1526:
1523:
1522:
1520:
1516:
1510:
1507:
1506:
1504:
1500:
1494:
1491:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1433:
1430:
1428:
1425:
1423:
1420:
1418:
1415:
1413:
1410:
1409:
1407:
1405:
1401:
1395:
1392:
1390:
1389:World of Hell
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1343:
1340:
1339:
1338:
1335:
1333:
1330:
1329:
1327:
1325:
1321:
1310:
1307:
1304:
1301:
1299:
1296:
1295:
1293:
1289:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1264:
1262:
1258:
1252:
1249:
1247:
1244:
1243:
1241:
1237:
1231:
1228:
1227:
1225:
1221:
1215:
1212:
1209:
1206:
1205:
1203:
1199:
1196:
1192:
1184: →
1183:
1180:
1178:
1175:
1173:
1170:←
1169:
1168:
1163:
1154:
1149:
1147:
1142:
1140:
1135:
1134:
1131:
1125:
1121:
1117:
1113:
1109:
1105:
1101:
1095:
1079:
1078:
1073:
1068:
1056:
1052:
1047:
1045:
1042:
1040:
1037:
1034:
1031:
1029:
1026:
1023:
1020:
1018:
1015:
1014:
1010:
1003:
1002:
998:
994:
991:
986:
983:
967:
960:
954:
951:
948:
944:
940:
937:
932:
929:
916:
912:
905:
902:
886:
879:
872:
870:
866:
862:
858:
854:
851:
846:
844:
840:
827:
823:
822:
817:
811:
808:
795:
791:
790:
785:
779:
776:
763:
759:
758:
753:
747:
745:
741:
737:
733:
728:
726:
722:
709:
705:
701:
695:
692:
676:
673:. p. 2.
672:
665:
658:
655:
642:
638:
637:
632:
625:
623:
621:
619:
615:
602:
598:
597:
592:
586:
583:
570:
566:
560:
557:
544:
540:
539:
534:
527:
525:
523:
521:
517:
512:
506:
502:
501:
493:
490:
477:
473:
472:
467:
460:
457:
444:
440:
439:
434:
428:
426:
424:
420:
414:
410:
407:
405:
402:
400:
397:
395:(from Turkey)
394:
391:
389:
386:
384:
381:
379:
376:
374:
371:
369:
368:Cyber-warfare
366:
364:
361:
359:
356:
354:
351:
349:
346:
345:
341:
339:
334:
329:
326:
320:
318:
312:
310:
306:
302:
296:
292:
290:
282:
280:
278:
274:
269:
261:
259:
255:
253:
249:
245:
241:
237:
233:
229:
225:
221:
217:
213:
209:
205:
201:
197:
193:
189:
185:
181:
177:
173:
169:
165:
161:
157:
153:
149:
144:
142:
141:Tibetan exile
138:
137:
132:
128:
124:
120:
116:
112:
108:
104:
100:
96:
88:
86:
84:
80:
76:
72:
68:
64:
60:
56:
50:
42:
34:
30:
26:
22:
1912:Cyberwarfare
1907:Cyberattacks
1743:Sony rootkit
1509:Bluehell IRC
1478:Dan Kaminsky
1473:Sven Jaschan
1363:
1082:. Retrieved
1075:
1059:. Retrieved
1054:
999:
985:
973:. Retrieved
953:
939:Toronto Star
931:
919:. Retrieved
915:the original
904:
892:. Retrieved
832:February 17,
830:. Retrieved
819:
810:
798:. Retrieved
794:the original
787:
778:
766:. Retrieved
755:
736:Bangkok Post
712:. Retrieved
708:the original
694:
682:. Retrieved
657:
645:. Retrieved
634:
605:. Retrieved
594:
585:
575:September 9,
573:. Retrieved
559:
547:. Retrieved
536:
498:
492:
480:. Retrieved
469:
459:
447:. Retrieved
436:
378:Honker Union
330:
321:
313:
297:
293:
286:
268:Trojan horse
265:
256:
145:
134:
114:
92:
63:cyber spying
52:
28:
27:
25:
1661:SQL Slammer
1483:Samy Kamkar
1404:Individuals
1369:Level Seven
1332:Ac1db1tch3z
1311:(2008–2010)
1210:(2003–2006)
1022:Citizen Lab
309:underground
220:Philippines
156:South Korea
131:Dharamshala
103:Citizen Lab
54:YōuLíngWǎng
1871:Categories
1548:discovered
1535:darksun.ws
1530:unkn0wn.eu
1438:Lil Hacker
1384:ShadowCrew
1309:WebcamGate
1208:Titan Rain
1116:0071772499
541:. London.
415:References
399:Titan Rain
317:Dalai Lama
208:Bangladesh
99:Dalai Lama
79:Dalai Lama
1842:Conficker
1821:Agent.btz
1349:Avalanche
1337:Anonymous
1194:Incidents
894:March 29,
800:March 29,
789:The Hindu
768:March 29,
714:March 29,
684:March 31,
647:March 29,
607:March 31,
549:March 29,
538:The Times
449:March 29,
273:Gh0st Rat
216:Indonesia
160:Indonesia
148:embassies
89:Discovery
75:embassies
21:Ghost net
1847:Koobface
1826:Mariposa
1774:Stration
1769:Clickbot
1733:PGPCoder
1681:Graybird
1619:Code Red
1593:ILOVEYOU
1567:sslstrip
1525:ryan1918
1502:Darknets
1493:Stakkato
1431:Digerati
1427:Dshocker
1394:Sandworm
1364:GhostNet
1177:Timeline
1094:cite web
1084:April 9,
1061:April 4,
1033:F-Secure
993:Archived
975:June 24,
966:Archived
943:Archived
921:April 2,
885:Archived
853:Archived
826:Archived
821:CBC News
762:Archived
675:Archived
641:Archived
601:Archived
596:BBC News
569:Archived
543:Archived
482:April 7,
476:Archived
443:Archived
438:BBC News
342:See also
228:Barbados
192:Pakistan
184:Portugal
176:Thailand
29:GhostNet
1882:Spyware
1852:Waledac
1759:Rustock
1686:Blaster
1666:Welchia
1598:Pikachu
1578:Malware
1448:camZero
757:Reuters
393:RedHack
301:Chengdu
188:Germany
164:Romania
109:at the
83:Tibetan
1816:Asprox
1717:Mydoom
1712:Sasser
1707:NetSky
1645:Simile
1569:(2009)
1563:(2008)
1557:(2002)
1463:diabl0
1458:Cyxymu
1453:Coolio
1422:SilenZ
1324:Groups
1122:
1114:
507:
333:Hainan
283:Origin
232:Bhutan
224:Brunei
212:Latvia
198:. The
180:Taiwan
168:Cyprus
51::
49:pinyin
43::
35::
1790:Storm
1702:Bagle
1676:Gruel
1671:Sobig
1624:Nimda
1412:AKill
1359:0x1fe
1182:2010s
1172:1990s
969:(PDF)
962:(PDF)
888:(PDF)
881:(PDF)
678:(PDF)
667:(PDF)
172:Malta
152:India
1835:2009
1809:2008
1795:ZeuS
1783:2007
1764:ZLOB
1752:2006
1738:Samy
1726:2005
1695:2004
1654:2003
1638:2002
1629:Klez
1607:2001
1586:2000
1443:BadB
1354:GNAA
1291:2009
1260:2008
1239:2007
1223:2005
1201:2004
1120:ISBN
1112:ISBN
1100:link
1086:2009
1063:2009
977:2009
923:2009
896:2009
834:2011
802:2009
770:2009
716:2009
686:2009
649:2009
609:2009
577:2017
551:2009
505:ISBN
484:2009
451:2009
244:NATO
240:U.K.
236:U.S.
230:and
204:Iran
196:Laos
190:and
1379:RBN
250:in
238:or
202:of
150:of
121:'s
81:'s
45:幽靈網
37:幽灵网
1873::
1118:,
1096:}}
1092:{{
1074:.
1053:.
964:.
868:^
859:.
842:^
818:.
786:.
754:.
743:^
734:.
724:^
702:.
669:.
639:.
633:.
617:^
593:.
567:.
535:.
519:^
468:.
435:.
422:^
325:QQ
311:.
226:,
222:,
218:,
214:,
210:,
206:,
186:,
182:,
178:,
174:,
170:,
166:,
162:,
158:,
154:,
105:,
47:;
39:;
1152:e
1145:t
1138:v
1102:)
1088:.
1065:.
979:.
925:.
898:.
836:.
804:.
772:.
718:.
688:.
651:.
611:.
579:.
553:.
513:.
486:.
453:.
31:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.