Misplaced Pages

Gh0st RAT: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 05:19, 3 November 2015 editFlyer22 Frozen (talk | contribs)365,630 editsm Reverted 1 edit by Kaartic identified as test/vandalism using STiki← Previous edit Revision as of 08:45, 3 November 2015 edit undoFlyer22 Frozen (talk | contribs)365,630 edits Undid revision 688811983 by Flyer22 Reborn (talk) My mistake.Next edit →
Line 15: Line 15:
'''Gh0st RAT''' is a ] for the Windows platform that the operators of ] used to ] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a ] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool". '''Gh0st RAT''' is a ] for the Windows platform that the operators of ] used to ] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a ] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".


The GhostNet system disseminates ] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = ] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the ] (IWM), "GhostNet" infection causes computers to download a ] known as "Ghost Rat" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room. The GhostNet system disseminates ] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = ] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the ] (IWM), "GhostNet" infection causes computers to download a ] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.


== See also == == See also ==

Revision as of 08:45, 3 November 2015

Gh0st RAT
Developer(s)红狼小组
(Hong Lang Xiao Zu)
Preview releaseGh0st RAT Beta 3.6
Written inC++
Operating systemMicrosoft Windows
Available inChinese
TypeTrojan
LicensePublic Domain
Websitehttp://www.15897.com/

Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth. It is a cyber spying computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates malware to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected. According to the Infowar Monitor (IWM), "GhostNet" infection causes computers to download a Trojan known as "Gh0st RAT" that allows attackers to gain complete, real-time control. Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.

See also

References

  1. 此软件无作者,无版权 (This software has no authors and no copyright). Gh0st RAT Beta 2.5 开源-红狼远控
  2. "Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments". Toronto Star (Canada). Toronto, Ontario, Canada. March 31, 2009. Retrieved 2009-04-04.
  3. Markoff, John (March 28, 2009). "Vast Spy System Loots Computers in 103 Countries". New York Times. Retrieved March 29, 2009.
  4. Harvey, Mike (March 29, 2009). "Chinese hackers 'using ghost network to control embassy computers'". London: The Times. Retrieved March 29, 2009.

External links

Categories: