Misplaced Pages

Gh0st RAT: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 01:11, 3 March 2024 editSohom Datta (talk | contribs)Edit filter managers, Autopatrolled, Interface administrators, Administrators8,118 edits removed Category:Web security exploits using HotCat again why are we putting this in web security exploits, these are social engineering malware attacks← Previous edit Latest revision as of 17:10, 27 April 2024 edit undoPppery (talk | contribs)Interface administrators, Administrators100,521 edits Does this really need a separate article?Tag: New redirect 
Line 1: Line 1:
#REDIRECT ]
{{Short description|Trojan horse for the Windows platform}}
{{Infobox software
| logo =
| screenshot =
| caption =
| genre = ]
| developer = C.Rufus Security Team <br/> 红狼小组<br />(Hong Lang Xiao Zu)
| latest preview version = Gh0st RAT Beta 3.6
| programming language = ]
| operating system = ]
| license = ]<ref>此软件无作者,无版权 (This software has no authors and no copyright). </ref>
| website =
| language = Chinese
}}

'''Gh0st RAT''' is a ] for the Windows platform that the operators of ] used to ] into many sensitive computer networks.<ref>{{Cite news|url=https://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost RAT program used to target governments|periodical=Toronto Star (Canada)|date=March 31, 2009|accessdate=2009-04-04|location=Toronto, Ontario, Canada}}</ref> It is a ] computer program. The "RAT" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates ] to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.<ref>{{cite news| title=Vast Spy System Loots Computers in 103 Countries | url=https://www.nytimes.com/2009/03/29/technology/29spy.html | work = ] | date=March 28, 2009 | accessdate=March 29, 2009 | first=John | last=Markoff}}</ref> According to the ] (IWM), "GhostNet" infection causes computers to download a ] known as "Gh0st RAT" that allows attackers to gain complete, real-time control.<ref>{{cite news| title=Chinese hackers 'using ghost network to control embassy computers' | url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece | work=] | date=March 29, 2009 | accessdate=March 29, 2009 | location=London | first=Mike | last=Harvey}}</ref> Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room. A lesser known variant of Gh0st RAT is Gh0stBins, which possesses the same set of malicious tools, including keylogging and the ability to perform a system reboot.

== See also ==

* ]
* ]
* ]
* ]
* ]
* ]
* ]
* ]

== References ==
{{reflist|1}}
* {{Cite web|last=Walton|first=Gregory|date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher=World Association of Newspapers|accessdate=2009-04-01|archive-url=https://web.archive.org/web/20090811031100/http://www.beijing2008conference.com/articles.php?id=101|archive-date=2009-08-11|url-status=dead}}

== External links ==
*

]
]
]
]

Latest revision as of 17:10, 27 April 2024

Redirect to: