GhostNet: Did the Chinese government hack the world?

The Chinese state has been accused of spying on networks around the world, but it could also be cybercriminals – which could turn out to be a very big problem for businesses.

"Just because a Chinese computer is implicated, it doesn't mean China itself is behind the attack."

Because of this, Cluley warns against accusing the Chinese state directly in this case, but also recognised that it would be nave to say that the Chinese wouldn't consider using the internet and malware in this way.

He said: "Countries are spying on each other all across the world for political, commercial and military advantage they would be nuts not to try and exploit the power of the internet to increase their chances of success."

He added: "I'm sure China is using the net to spy on governments and businesses overseas for commercial and possibly military advantage.

Advertisement
Advertisement - Article continues below

"But then I'm sure that the US, Israel, the UK and others are doing it too."

Other researchers who helped in the research of GhostNet weren't so shy about accusing the Chinese state of perpetrating the malware.

Two computer researchers who worked on a report for the University of Cambridge directly accused the Chinese government of compromising the computing infrastructure of the Tibetan government and the Dalai Lama.

Ross Anderson of the University of Cambridge and Shishir Nagaraja of the University of Illinois came to the conclusion that the Chinese state used social phishing (well-written malware with well-designed email lures) to install rootkits on a number of machines to download sensitive data.

Cybercriminal threat

The researchers went further in their research. They said that there was nothing to stop the attacks the Chinese government used from being used by smaller opponents like capable motivated individuals' such as cybercriminals.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019