Malware Attacks tut -GhostNet Cyber Espionage Network

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Malware Attacks tut -GhostNet Cyber Espionage Network

Post by DNR »

http://cryptome.org/ghostnet.zip

good read with graphics. Each page has footnotes, links to greater nfo...
You'll spend all day on this following links :wink:

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

haephrati's trojan, a link to ghostnet?

Post by DNR »

ThreatChaos sees a Trojan similarity:

You will notice the similarity between the methodologies described and the techniques used by Private Investigators in Israel back in 2005. They sent emails to their targets, sometimes after engaging them in phone conversations first. They used a customized Trojan horse crafted by Michael Haephrati.

http://www.networkworld.com/community/node/27387

To re-cap: Michael Haephrati, a software developer,s created a clever managed service whereby he would provide custom Trojan software to these private investigators who would then use social engineering techniques to get the targets to install the Trojan on internal systems. For a $2,000 fee Haephrati would host any stolen documents and key stroke logs on servers in Germany and the UK. The police discovered the scheme when Haephrati's first wife took her computer in to them under suspicion of it being infected. Sure enough, it was, and the Israeli police tracked down the hosting servers and discovered thousands of documents from dozens of Israeli companies stored there.

Eventually Haephrati and his current wife were extradited from England and supposedly sentenced to jail terms. But in a phone conversation I had with Michael several weeks after the sentencing he claimed that there was no jail time, and that he was completely free. As a matter of fact he was going to continue to offer his Trojan Horse service but this time he would only work with "law enforcement agencies".

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

China Denies Any Role in 'GhostNet' Computer Hacking

Post by DNR »

http://www.voanews.com/english/2009-03-31-voa12.cfm

Foreign Ministry spokesman Qin Gang rejected allegations of a link between the Chinese government and a vast computer spying network. He said in Beijing on Tuesday that the accusation comes from people outside China who, "are bent on fabricating lies of so-called Chinese computer spies."
When asked if the Chinese government is concerned that computers in the spy ring are in China, Qin said it is more important to track down the people outside of China who were making these accusations.

He says the Dalai Lama and his supporters "always live on lies and twisting facts."

The Canadian report says there are real consequences to the spying. For example, when the Dalai Lama's organization sent an e-mail invitation to a foreign diplomat, the diplomat was contacted by the Chinese government and told not to go through with the meeting.


DNR - Sounds like Government Cover-up as usual...
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Post Reply