Gh0stnet

Description

(UCAM) Our next observation concerns the malware payloads used. These were packaged as either .doc or .pdf files that installed rootkits on the machines of monks who clicked on them. During our initial network monitoring exercise, we observed sensitive files being transferred out of the Office of His Holiness the Dalai Lama (OHHDL) using a modified HTTP protocol: the malware picked up files from local disks and sent them to three servers which, according to APNIC, were in China’s Sichuan province, using a custom protocol based on HTTP. The malware uses HTTP GET and HTTP POST messages to transfer files out and also appears to verify successful transmission. Sichuan, by the way, is the location of the Chinese intelligence unit specifically tasked with monitoring the OHHDL.

Names

Name
Gh0stnet
Ghostnet
Remosh

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Exfiltration

Information

Malpedia

Other Information

Uuid

1ab15fc8-f2d0-4796-b342-2eb5f4527f86

Last Card Change

2020-05-13