Ghost Rat
Encyclopedia
Ghost Rat is a Trojan horse
for the Windows platform that the operators of GhostNet
used to hack
into some of the most sensitive computer networks on Earth. It is a cyber spying
computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".
The GhostNet system disseminates malware
to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected. According to the Infowar Monitor
(IWM), 'GhostNet' infection causes computers to download a Trojan
known as 'Ghost Rat' that allows attackers to gain complete, real-time control. Such a computer can be controlled or inspected by its hackers, and even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.
Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...
for the Windows platform that the operators of GhostNet
GhostNet
GhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an Advanced Persistent Threat...
used to hack
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...
into some of the most sensitive computer networks on Earth. It is a cyber spying
Cyber spying
Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information , from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on...
computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".
The GhostNet system disseminates malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...
to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected. According to the Infowar Monitor
Infowar Monitor
The Information Warfare Monitor is an advanced research activity tracking the emergence of cyberspace as a strategic domain. It is a public-private venture between two Canadian institutions: The SecDev Group, an operational think tank based in Ottawa , and the Citizen Lab at the Munk School of...
(IWM), 'GhostNet' infection causes computers to download a Trojan
Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...
known as 'Ghost Rat' that allows attackers to gain complete, real-time control. Such a computer can be controlled or inspected by its hackers, and even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.
See also
- Computer surveillanceComputer surveillanceComputer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet....
- Computer insecurityComputer insecurityComputer insecurity refers to the concept that a computer system is always vulnerable to attack, and that this fact creates a constant battle between those looking to improve security, and those looking to circumvent security.-Security and systems design:...
- Cyber-security regulationCyber-security regulationIn the United States government, cyber-security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber-security regulation is to force companies and organizations to protect their...
- Cyber-warfareCyber-warfareCyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.Government security expert...
- Proactive Cyber DefenceProactive Cyber DefenceProactive Cyber Defence means acting in anticipation to oppose an attack against computers and networks. Proactive cyber defence will most often require additional security from internet service providers....
- GhostNetGhostNetGhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an Advanced Persistent Threat...
- SurveillanceSurveillanceSurveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...
- EspionageEspionageEspionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
or Spying