Misplaced Pages

Gh0st RAT: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 01:06, 10 December 2015 edit187.250.49.223 (talk)No edit summary← Previous edit Latest revision as of 17:10, 27 April 2024 edit undoPppery (talk | contribs)Interface administrators, Administrators100,202 edits Does this really need a separate article?Tag: New redirect 
(21 intermediate revisions by 18 users not shown)
Line 1: Line 1:
#REDIRECT ]
{{Infobox software
| logo =
| screenshot =
| caption =
| genre = ]
| developer = C.Rufus Security Team <br/> 红狼小组<br />(Hong Lang Xiao Zu)
| latest preview version = Gh0st RAT Beta 3.6
| programming language = ]
| operating system = ]
| license = ]<ref>此软件无作者,无版权 (This software has no authors and no copyright). </ref>
| website =
| language = Chinese
}}

'''Gh0st RAT''' is a ] for the Windows platform that the operators of ] used to ] into some of the most sensitive computer networks on Earth.<ref>{{Cite news|url=http://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=] (Canada)|date=March 31, 2009|accessdate=2009-04-04|publication-place=Toronto, Ontario, Canada}}</ref> It is a ] computer program. The "Rat" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates ] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=http://www.nytimes.com/2009/03/29/technology/29spy.html | publisher = ] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the ] (IWM), "GhostNet" infection causes computers to download a ] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers ‘using ghost network to control embassy computers’ | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | publisher=] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room.

== See also ==

* ]
* ]
* ]
* ]
* ]
* ]
* ]
* ]
* ]

== References ==
{{reflist}}
* {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}}

== External links ==
*
*

]
]
]
]

Latest revision as of 17:10, 27 April 2024

Redirect to: