Jump to content

Gh0st RAT: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverted edits by 208.100.185.154 (talk) to last version by DumbBOT
mNo edit summary
Line 1: Line 1:
'''Ghost Rat''' (or '''Gh0st RAT''') is a [[Trojan horse (computing)|Trojan horse]] for the Windows platform that the operators of [[GhostNet]] used to [[Hacker (computer security)|hack]] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=[[Toronto Star]] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada | work=The Star}}</ref> It is a [[cyber spying]] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".
'''Ghost Rat''' (or '''Gh0st RAT''') is a [[Trojan horse (computing)|Trojan horse]] for the Windows platform that the operators of [[GhostNet]] used to [[Hacker (computer security)|hack]] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=[[Toronto Star]] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada | work=The Star}}</ref> It is a [[cyber spying]] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".


The GhostNet system disseminates [[malware]] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = [[New York Times]] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the [[Infowar Monitor]] (IWM), 'GhostNet' infection causes computers to download a [[Trojan horse (computing)|Trojan]] known as 'Ghost Rat' that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=[[The Times]] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.
The GhostNet system disseminates [[malware]] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = [[New York Times]] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the [[Infowar Monitor]] (IWM), "GhostNet" infection causes computers to download a [[Trojan horse (computing)|Trojan]] known as "Ghost Rat" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=[[The Times]] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.


==See also==
== See also ==


* [[Computer surveillance]]
* [[Computer surveillance]]
Line 15: Line 15:
* [[Phishing]]
* [[Phishing]]


==References==
== References ==
{{reflist}}
{{reflist}}
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}}
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}}


==External links==
== External links ==
* [http://infowar-monitor.net/index.php Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)]
* [http://infowar-monitor.net/index.php Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)]
* [http://twitter.com/InfowarMonitor Twitter: InfowarMonitor]
* [http://twitter.com/InfowarMonitor Twitter: InfowarMonitor]

Revision as of 19:32, 8 April 2013

Ghost Rat (or Gh0st RAT) is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth.[1] It is a cyber spying computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates malware to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.[2] According to the Infowar Monitor (IWM), "GhostNet" infection causes computers to download a Trojan known as "Ghost Rat" that allows attackers to gain complete, real-time control.[3] Such a computer can be controlled or inspected by its hackers, and even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.

See also

References

  1. ^ "Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments". Toronto Star (Canada). Toronto, Ontario, Canada. March 31, 2009. Retrieved 2009-04-04. {{cite news}}: More than one of |work= and |periodical= specified (help)
  2. ^ Markoff, John (March 28, 2009). "Vast Spy System Loots Computers in 103 Countries". New York Times. Retrieved March 29, 2009.
  3. ^ Harvey, Mike (March 29, 2009). "Chinese hackers 'using ghost network to control embassy computers'". London: The Times. Retrieved March 29, 2009.