Ghostnet

Summary
Trojan horse programmes and other associated malware are often cited as vectors for conducting sophisticated computer-based espionage. Allegations of cyber espionage (computer network exploitation) are increasingly common, but there are few case studies in the unclassified realm that expose the inner workings of such networks.

This study reveals the existence and operational reach of a malware-based cyber espionage network that we call GhostNet.

Published by The SecDev Group.

Share