Gh0st RAT: Difference between revisions
Appearance
Content deleted Content added
No edit summary |
Does this really need a separate article? Tag: New redirect |
||
(24 intermediate revisions by 20 users not shown) | |||
Line 1: | Line 1: | ||
⚫ | |||
{{Infobox software |
|||
| logo = |
|||
| screenshot = |
|||
| caption = |
|||
| genre = [[Trojan horse (computing)|Trojan]] |
|||
| developer = 红狼小组<br />(Hong Lang Xiao Zu) |
|||
| latest preview version = Gh0st RAT Beta 3.6 |
|||
| programming language = [[C++]] |
|||
| operating system = [[Microsoft Windows]] |
|||
| license = [[Public Domain]]<ref>此软件无作者,无版权 (This software has no authors and no copyright). [http://www.15897.com/blog/post/Gh0st-RAT-Beta-2.5-open-source.html Gh0st RAT Beta 2.5 开源-红狼远控]</ref> |
|||
| website = [http://www.15897.com/ http://www.15897.com/] |
|||
| language = Chinese |
|||
}} |
|||
'''Gh0st RAT''' is a [[Trojan horse (computing)|Trojan horse]] for the Windows platform that the operators of [[GhostNet]] used to [[Hacker (computer security)|hack]] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=[[Toronto Star]] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a [[cyber spying]] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool". |
|||
The GhostNet system disseminates [[malware]] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = [[New York Times]] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the [[Infowar Monitor]] (IWM), "GhostNet" infection causes computers to download a [[Trojan horse (computing)|Trojan]] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=[[The Times]] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room. |
|||
== See also == |
|||
* [[Computer surveillance]] |
|||
* [[Computer insecurity]] |
|||
* [[Cyber-security regulation]] |
|||
* [[Cyber-warfare]] |
|||
* [[Proactive Cyber Defence]] |
|||
⚫ | |||
* [[Surveillance]] |
|||
* [[Espionage]] |
|||
* [[Phishing]] |
|||
== References == |
|||
{{reflist}} |
|||
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}} |
|||
== External links == |
|||
* [http://infowar-monitor.net/index.php Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)] |
|||
* [http://twitter.com/InfowarMonitor Twitter: InfowarMonitor] |
|||
[[Category:Trojan horses]] |
|||
[[Category:Spyware]] |
|||
[[Category:Web security exploits]] |
|||
[[Category:Social engineering (computer security)]] |
Latest revision as of 17:10, 27 April 2024
Redirect to: