http://cryptome.org/ghostnet.zip
good read with graphics. Each page has footnotes, links to greater nfo...
You'll spend all day on this following links
DNR
Malware Attacks tut -GhostNet Cyber Espionage Network
Malware Attacks tut -GhostNet Cyber Espionage Network
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
haephrati's trojan, a link to ghostnet?
ThreatChaos sees a Trojan similarity:
You will notice the similarity between the methodologies described and the techniques used by Private Investigators in Israel back in 2005. They sent emails to their targets, sometimes after engaging them in phone conversations first. They used a customized Trojan horse crafted by Michael Haephrati.
http://www.networkworld.com/community/node/27387
To re-cap: Michael Haephrati, a software developer,s created a clever managed service whereby he would provide custom Trojan software to these private investigators who would then use social engineering techniques to get the targets to install the Trojan on internal systems. For a $2,000 fee Haephrati would host any stolen documents and key stroke logs on servers in Germany and the UK. The police discovered the scheme when Haephrati's first wife took her computer in to them under suspicion of it being infected. Sure enough, it was, and the Israeli police tracked down the hosting servers and discovered thousands of documents from dozens of Israeli companies stored there.
Eventually Haephrati and his current wife were extradited from England and supposedly sentenced to jail terms. But in a phone conversation I had with Michael several weeks after the sentencing he claimed that there was no jail time, and that he was completely free. As a matter of fact he was going to continue to offer his Trojan Horse service but this time he would only work with "law enforcement agencies".
DNR
You will notice the similarity between the methodologies described and the techniques used by Private Investigators in Israel back in 2005. They sent emails to their targets, sometimes after engaging them in phone conversations first. They used a customized Trojan horse crafted by Michael Haephrati.
http://www.networkworld.com/community/node/27387
To re-cap: Michael Haephrati, a software developer,s created a clever managed service whereby he would provide custom Trojan software to these private investigators who would then use social engineering techniques to get the targets to install the Trojan on internal systems. For a $2,000 fee Haephrati would host any stolen documents and key stroke logs on servers in Germany and the UK. The police discovered the scheme when Haephrati's first wife took her computer in to them under suspicion of it being infected. Sure enough, it was, and the Israeli police tracked down the hosting servers and discovered thousands of documents from dozens of Israeli companies stored there.
Eventually Haephrati and his current wife were extradited from England and supposedly sentenced to jail terms. But in a phone conversation I had with Michael several weeks after the sentencing he claimed that there was no jail time, and that he was completely free. As a matter of fact he was going to continue to offer his Trojan Horse service but this time he would only work with "law enforcement agencies".
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
China Denies Any Role in 'GhostNet' Computer Hacking
http://www.voanews.com/english/2009-03-31-voa12.cfm
Foreign Ministry spokesman Qin Gang rejected allegations of a link between the Chinese government and a vast computer spying network. He said in Beijing on Tuesday that the accusation comes from people outside China who, "are bent on fabricating lies of so-called Chinese computer spies."
When asked if the Chinese government is concerned that computers in the spy ring are in China, Qin said it is more important to track down the people outside of China who were making these accusations.
He says the Dalai Lama and his supporters "always live on lies and twisting facts."
The Canadian report says there are real consequences to the spying. For example, when the Dalai Lama's organization sent an e-mail invitation to a foreign diplomat, the diplomat was contacted by the Chinese government and told not to go through with the meeting.
DNR - Sounds like Government Cover-up as usual...
Foreign Ministry spokesman Qin Gang rejected allegations of a link between the Chinese government and a vast computer spying network. He said in Beijing on Tuesday that the accusation comes from people outside China who, "are bent on fabricating lies of so-called Chinese computer spies."
When asked if the Chinese government is concerned that computers in the spy ring are in China, Qin said it is more important to track down the people outside of China who were making these accusations.
He says the Dalai Lama and his supporters "always live on lies and twisting facts."
The Canadian report says there are real consequences to the spying. For example, when the Dalai Lama's organization sent an e-mail invitation to a foreign diplomat, the diplomat was contacted by the Chinese government and told not to go through with the meeting.
DNR - Sounds like Government Cover-up as usual...
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.