Translate

Mar 2, 2019

Queen - Bohemian Rhaspody - BACKAWRDS with Lyrics



the msm is used by covert factions & shady agencies and drug dealers to send covert messages and reports

GhostNet (simplified Chinese: 幽灵网; traditional Chinese: 幽靈網; pinyin: YōuLíngWǎng) is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying[1][2] operation discovered in March 2009. The operation is likely associated with an Advanced Persistent Threat.[3] Its command and control infrastructure is based mainly in the People's Republic of China and has infiltrated high-value political, economic and media locations[4] in 103 countries. Computer systems belonging to embassies, foreign ministries and other government offices, and the Dalai Lama's Tibetan exile centers in India, London and New York City were compromised.


Contents
1Discovery
2Technical functionality
3Origin
4See also
5References
6External links
Discovery[edit]

GhostNet was discovered and named following a 10-month investigation by the Infowar Monitor (IWM), carried out after IWM researchers approached the Dalai Lama's representative in Geneva[5] suspecting that their computer network had been infiltrated.[6] The IWM is composed of researchers from The SecDev Group and Canadian consultancy and the Citizen Lab, Munk Centre for International Studies at the University of Toronto; the research findings were published in the Infowar Monitor, an affiliated publication.[7]Researchers from the University of Cambridge's Computer Laboratory, supported by the Institute for Information Infrastructure Protection,[8] also contributed to the investigation at one of the three locations in Dharamshala, where the Tibetan government-in-exile is located. The discovery of the 'GhostNet', and details of its operations, were reported by The New York Times on March 29, 2009.[7][9] Investigators focused initially on allegations of Chinese cyber-espionage against the Tibetan exile community, such as instances where email correspondence and other data were extracted.[10]

Compromised systems were discovered in the embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan and the office of the Prime Minister of Laos. The foreign ministries of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan were also targeted.[1][11] No evidence was found that U.S. or UK government offices were infiltrated, although a NATO computer was monitored for half a day and the computers of the Indian embassy in Washington, D.C., were infiltrated.[4][11][12]

Since its discovery, GhostNet has attacked other government networks, for example Canadian official financial departments in early 2011, forcing them off-line. Governments commonly do not admit such attacks, which must be verified by official but anonymous sources.[13]
Technical functionality[edit]

Emails are sent to target organizations that contain contextually relevant information. These emails contain malicious attachments, that when opened, drop a Trojan horse on to the system. This Trojan connects back to a control server, usually located in China, to receive commands. The infected computer will then execute the command specified by the control server. Occasionally, the command specified by the control server will cause the infected computer to download and install a Trojan known as Gh0st Rat that allows attackers to gain complete, real-time control of computers running Microsoft Windows.[4] Such a computer can be controlled or inspected by attackers, and the software even has the ability to turn on camera and audio-recording functions of infected computers, enabling monitors to perform surveillance.[7]
Origin[edit]

The researchers from the IWM stated they could not conclude that the Chinese government was responsible for the spy network.[14] However, a report from researchers at the University of Cambridge says they believe that the Chinese government is behind the intrusions they analyzed at the Office of the Dalai Lama.[15]

Researchers have also noted the possibility that GhostNet was an operation run by private citizens in China for profit or for patriotic reasons, or created by intelligence agencies from other countries such as Russia or the United States.[7] The Chinese government has stated that China "strictly forbids any cyber crime."[1][10]

The "Ghostnet Report" documents several unrelated infections at Tibetan-related organizations in addition to the Ghostnet infections. By using the email addresses provided by the IWM report, Scott J. Henderson had managed to trace one of the operators of one of the infections (non-Ghostnet) to Chengdu. He identifies the hacker as a 27-year-old man who had attended the University of Electronic Science and Technology of China, and currently connected with the Chinese hacker underground.[16]

Despite the lack of evidence to pinpoint the Chinese government as responsible for intrusions against Tibetan-related targets, researchers at Cambridge have found actions taken by Chinese government officials that corresponded with the information obtained via computer intrusions. One such incident involved a diplomat who was pressured by Beijing after receiving an email invitation to a visit with the Dalai Lama from his representatives.[15]

Another incident involved a Tibetan woman who was interrogated by Chinese intelligence officers and was shown transcripts of her online conversations.[14][17] However, there are other possible explanations for this event. Drelwa uses QQ and other instant messengers to communicate with Chinese Internet users. In 2008, IWM found that TOM-Skype, the Chinese version of Skype, was logging and storing text messages exchanged between users. It is possible that the Chinese authorities acquired the chat transcripts through these means.[18]

IWM researchers have also found that when detected, GhostNet is consistently controlled from IP addresses located on the island of Hainan, China, and have pointed out that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the People’s Liberation Army.[4] Furthermore, one of GhostNet's four control servers has been revealed to be a government server.[19]
See also[edit]
Advanced Persistent Threat
Chinese intelligence activity in other countries
Cyber-warfare
Economic and Industrial Espionage
Honker Union
Internet censorship in China
Operation Aurora
RedHack (from Turkey)
Titan Rain
Shadow Network
References[edit]

^ Jump up to:a b c "Major cyber spy network uncovered". BBC News. March 29, 2009. Retrieved March 29, 2009.
^ Glaister, Dan (March 30, 2009). "China Accused of Global Cyberspying". The Guardian Weekly. 180 (16). London. p. 5. Retrieved April 7, 2009.
^ Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Osborne Media. ISBN 978-0071772495.
^ Jump up to:a b c d Harvey, Mike (March 29, 2009). "Chinese hackers 'using ghost network to control embassy computers'". The Times. London. Retrieved March 29, 2009.
^ "Tracking GhostNet: Investigating a Cyber Espionage Network".
^ "China denies spying allegations". BBC News. March 30, 2009. Retrieved March 31,2009.
^ Jump up to:a b c d Markoff, John (March 28, 2009). "Vast Spy System Loots Computers in 103 Countries". New York Times. Retrieved March 29, 2009.
^ Shishir Nagaraja, Ross Anderson (March 2009). "The snooping dragon: social-malware surveillance of the Tibetan movement" (PDF). University of Cambridge. p. 2. Retrieved March 31, 2009.
^ "Researchers: Cyber spies break into govt computers". Associated Press. March 29, 2009. Retrieved March 29, 2009.
^ Jump up to:a b China-based spies target Thailand. Bangkok Post, March 30, 2009. Retrieved on March 30, 2009.
^ Jump up to:a b "Canadians find vast computer spy network: report". Reuters. March 28, 2009. Retrieved March 29, 2009.
^ "Spying operation by China infiltrated computers: Report". The Hindu. March 29, 2009. Archived from the original on April 1, 2009. Retrieved March 29, 2009.
^ "Foreign hackers attack Canadian government". CBC News. February 17, 2011. Retrieved February 17, 2011.
^ Jump up to:a b Tracking GhostNet: Investigating a Cyber Espionage Network. Munk Centre for International Studies. March 29, 2009
^ Jump up to:a b Nagaraja, Shishir; Anderson, Ross (March 2009). "The snooping dragon: social-malware surveillance of the Tibetan movement" (PDF). Computer Laboratory, University of Cambridge.
^ Henderson, Scott (April 2, 2009). "Hunting the GhostNet Hacker". The Dark Visitor. Retrieved April 2, 2009.
^ U of T team tracks China-based cyber spies Toronto Star March 29, 2009 Archived March 31, 2009, at the Wayback Machine
^ BREACHING TRUST: An analysis of surveillance and security practices on China’s TOM-Skype platform
^ Meet the Canadians who busted Ghostnet The Globe and MailMarch 29, 2009
External links[edit]
The SecDev Group
Citizen Lab at the University of Toronto
Tracking GhostNet: Investigating a Cyber Espionage Network (Infowar Monitor Report (SecDev and Citize Lab), March 29, 2009)
F-Secure Mirror of the report PDF
Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
Twitter: InfowarMonitor
Kelly, Cathal (March 31, 2009). "Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments". Toronto Star (Canada). Toronto, Ontario, Canada. Retrieved April 4, 2009.
Lee, Peter (April 8, 2009). "Cyber-skirmish at the top of the world". Asia Times Online. Retrieved April 9, 2009.
Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. ISBN 0071772499, ISBN 978-0071772495

Labels

. (5) 4K (1) a (14) ABANDONED (51) Abandoned Medieval Castle (1) Abandoned Mine (2) Advanced Civilization (36) AI Weapons (16) ALIEN EVIDENCE (29) Alien Life (3) Alien Technology (3) Aliens and Robots (4) Almost DIED (4) ancient (31) Ancient Artifacts (9) Ancient Artifacts Pyramids (9) Ancient Ruins (8) Ancient technology using physics and chemistry. Ancient technology (5) Ancient White People. waga (1) antennas (3) Archaix (2) Artifacts (1) Artificial Sun (1) as IAM a420rhbrh. (1) Best Evidence Proving Aliens Exist (7) bravo (1) CABBAGE PATCH (1) Camping (3) catastrophe (31) Caught on Camera (1) censorship (1) CERN (1) change the future (20) chemical engineering (1) Civilization (1) Classified (2) CLONING (1) Conspiracy (1) Corporate (10) Cover-Ups (29) cp freaks waste of skin trash sicko. repent or die! no more (1) creative frequencies (27) Creepiest TikToks (4) Creepy (1) Creepy and Scary (3) CREEPY TikTok (1) Creepy TikTok's (14) Creepy TikToks (6) Creepy videos (2) CRIMINAL (7) Criminal Messaging Network (1) Crusade (3) Cursed UUnlockednlUnlockedocked (2) D Law (1) Dark Corners of the internet (125) DARK MATTER (14) DARK MATTER EXISTS 2022 (VERIFIED BY THE SHADOW THEORY AND LAW PARTICLE) (3) Dark Matter Portals (1) DARK WEB (2) Defy The Laws Of Physics (3) DEMON (5) DEMONIC ENTITIES (5) Demons (3) destructive modern technologies (22) destructive technology (1) Did a (7) did you catch this??? life from the inanimate (1) dielectric fields (1) Disturbing (1) Disturbing Discoveries (1) Documentary (3) drones (1) eclipse (1) electric fields (1) Electricity (1) Electrogravitic (1) energy (1) engineering (1) enhancing water (1) entities (12) Evidence (21) existence (1) exowomb (1) facts (1) fake moon (1) fake sun (2) FBI (1) fermi (1) ffake x (6) food (1) Fractal Toroidal Moment (1) fucked up shit (1) funding help (11) genius (9) ghosts (79) giving back (1) Glitch (64) Graveyard (2) guns (4) Harvesting Human Souls (1) HAUNTED (12) HAUNTED f (50) Haunted House (5) he Amazon Rainforest (1) hemisync (17) HIDDEN . (2) history (17) Hole (1) huanitarian aid (1) Human History (1) human psyche. (5) humanity (9) illegal weapons systems (3) investigations (40) ionosphere. HAARP (5) Jasko (1) Jerusalem (1) Kryptos Code 4 solved (2) law (8) Levitating Statue (1) Lidar (1) Lost Citied (1) Lost Cities (31) Lost Civilization Found (14) Lost Ruins (8) Lost Technology (89) LOVE (16) magnetic fields (1) magnetism (1) Mandela effect (9) Mansion (2) maps (17) Mars (1) Martian (1) matrix (82) Mega Machines (10) Megalithic (4) megaliths (7) Megastructure (3) military (32) Military Lasers and Directed Energy Weapons (8) missing (7) Monoliths (1) moon (21) moon and sun simulator (1) MORONS (1) mpox the facts (2) Mysterious (9) Mysterious Creatures (4) mysterious discoveries (41) Mystery history (1) n (1) nanobubble (1) NASA and the government (17) NASA government (3) NASA LIES (1) nazi Experiments (8) Nazi in plain-sight (1) Nazi in plainsight (1) nazi inplainsight (9) NEWS (54) noaaq (1) non-human entities (16) nvestigations (6) OCCULT (88) Ocean Mysteries (11) on the Moon (2) Paranormal Files Marathon: Mind Boggling Sightings and Abductions (1) PARANORMAL INVESTIGATION (1) Patents (1) Phobos (1) Physics (2) police abuse (1) policy (1) Portal (2) Practical Application (2) Pre-Egyptian Technology (10) Pre-Flood -Civilization (1) Pre-Flood Ruins (10) Project Looking Glass (1) propaganda (16) Propulsion (2) psychological experimen (1) psychological experiment (5) Psychotronics (6) pump (4) Pyramid (9) Pyramids (7) quantum (1) Questions (1) REACTION (1) reaction creepy (11) Reality (9) red vs blue & white triangle (6) relic (4) research (4) Reverse Speech (1) ritual (1) rocket (8) Ruins (1) SCARIEST (1) Secrets (1) sharing is caring (1) shipwrecks (3) SITES LINKED TO THE HIDDEN (6) Skinwalker (1) Sky Trumpets (1) Solomon's Temple (1) solutions (1) Sonic Magic (1) Sound (1) space (16) Space Programs (1) space weather (2) standing waves (1) Strange Case (8) Strange Things Caught On Live TV (1) STRANGE Tik Toks. Realitys. R (2) sun (1) symbology (28) Temple (2) Terrifying Creatures From The Bible (1) Terrifying Experiments (5) the dark side of YouTube. (7) The Hidden (55) The Hidden banner ad (2) The Human Mind (6) The Moon (3) the True Cross. Holy (1) The Unified Master Wave Equation: (1) The Universe (1) The Unknown. (12) Tik Toks (1) Tik Toks. (2) TikTok (1) TikTok. cult (4) TikTok. culy (1) TikToks (1) time (1) Tomb Discovered (1) Treasure (1) Treasure and Artifact's Finds (2) truth (105) Tunnel (29) Tunnels (2) uap (2) ufo (69) UFOs (11) Underground (3) Unexplained (24) Unexplained Mysteries (2) Unknown Civilization (16) Unsolved Mysteries (166) Vampires Immortals (1) VIMANA (1) water (1) weather sat tools (17) Weird videos (1) Where did this COME FROM (1) white triangle (16)