Jump to content

Gh0st RAT: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Does this really need a separate article?
Tag: New redirect
 
(24 intermediate revisions by 20 users not shown)
Line 1: Line 1:
#REDIRECT [[GhostNet]]
{{Infobox software
| logo =
| screenshot =
| caption =
| genre = [[Trojan horse (computing)|Trojan]]
| developer = 红狼小组<br />(Hong Lang Xiao Zu)
| latest preview version = Gh0st RAT Beta 3.6
| programming language = [[C++]]
| operating system = [[Microsoft Windows]]
| license = [[Public Domain]]<ref>此软件无作者,无版权 (This software has no authors and no copyright). [http://www.15897.com/blog/post/Gh0st-RAT-Beta-2.5-open-source.html Gh0st RAT Beta 2.5 开源-红狼远控]</ref>
| website = [http://www.15897.com/ http://www.15897.com/]
| language = Chinese
}}

'''Gh0st RAT''' is a [[Trojan horse (computing)|Trojan horse]] for the Windows platform that the operators of [[GhostNet]] used to [[Hacker (computer security)|hack]] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=[[Toronto Star]] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a [[cyber spying]] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates [[malware]] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = [[New York Times]] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the [[Infowar Monitor]] (IWM), "GhostNet" infection causes computers to download a [[Trojan horse (computing)|Trojan]] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=[[The Times]] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.

== See also ==

* [[Computer surveillance]]
* [[Computer insecurity]]
* [[Cyber-security regulation]]
* [[Cyber-warfare]]
* [[Proactive Cyber Defence]]
* [[GhostNet]]
* [[Surveillance]]
* [[Espionage]]
* [[Phishing]]

== References ==
{{reflist}}
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}}

== External links ==
* [http://infowar-monitor.net/index.php Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)]
* [http://twitter.com/InfowarMonitor Twitter: InfowarMonitor]

[[Category:Trojan horses]]
[[Category:Spyware]]
[[Category:Web security exploits]]
[[Category:Social engineering (computer security)]]

Latest revision as of 17:10, 27 April 2024

Redirect to: