China based cyber spy ring 'GhostNet' exposed

An international cyber spy operation that targeted government computers has been exposed by a Canadian security research group.

An international cyber spy operation that targeted government computers has been exposed by a Canadian security research group.

The China-based operation, dubbed GhostNet, infiltrated over 1,000 computers in more than 100 countries, according to the BBC.

The spy operation targeted politicians, diplomats and journalists using spyware installed on computers to gain access to sensitive information since 2007.

The operation continues to invade and monitor more than a dozen new computers a week, according to the New York Times.

Targets in the UK included the Indian High Commission, Associated Press news agency and International Chamber of Shipping, according to other media reports.

High profile targets included Tibetan spiritual leader, the Dalai Lama, whose office asked Canada's Information Warfare Monitor (IWM) research group to check their computer systems.

The IWM has linked to operation to locations in China, but said there is no conclusive evidence that the Chinese government is involved. Beijing authorities have also denied involvement.

The IWM researchers said the spying operation exposed basic shortcomings in the legal structure of cyberspace.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close