Revision as of 01:06, 10 December 2015 edit187.250.49.223 (talk)No edit summary← Previous edit | Latest revision as of 17:10, 27 April 2024 edit undoPppery (talk | contribs)Interface administrators, Administrators100,202 edits Does this really need a separate article?Tag: New redirect | ||
(21 intermediate revisions by 18 users not shown) | |||
Line 1: | Line 1: | ||
⚫ | #REDIRECT ] | ||
{{Infobox software | |||
| logo = | |||
| screenshot = | |||
| caption = | |||
| genre = ] | |||
| developer = C.Rufus Security Team <br/> 红狼小组<br />(Hong Lang Xiao Zu) | |||
| latest preview version = Gh0st RAT Beta 3.6 | |||
| programming language = ] | |||
| operating system = ] | |||
| license = ]<ref>此软件无作者,无版权 (This software has no authors and no copyright). </ref> | |||
| website = | |||
| language = Chinese | |||
}} | |||
'''Gh0st RAT''' is a ] for the Windows platform that the operators of ] used to ] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a ] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool". | |||
The GhostNet system disseminates ] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = ] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the ] (IWM), "GhostNet" infection causes computers to download a ] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room. | |||
== See also == | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
⚫ | |||
* ] | |||
* ] | |||
* ] | |||
== References == | |||
{{reflist}} | |||
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}} | |||
== External links == | |||
* | |||
* | |||
] | |||
] | |||
] | |||
] |
Latest revision as of 17:10, 27 April 2024
Redirect to: