![]() ![]() The infected emails contained either attachment files or links to web pages, and the content of these emails were normally well-tailored to each recipient to make him or her believe that it was a legitimate e-mail.” “Another common phenomenon is, after the user's PC was compromised, someone would login to his email account, download all messages in the mailbox, and then the Trojan would send infected emails to the contacts from his account. ![]() Once a user’s computer has such a Trojan implanted on it, a lot of information can get leaked out." These Trojans are becoming harder and harder to detect and remove. Many of these Trojans contained key-loggers, which captured every single keystroke that the user made. ![]() "On many of the Trojans we inspected, they opened network connections to some network addresses inside China. She describes the security compromise as follows: a user is tricked to open a document or a web page containing malware, and then some backdoor programs are planted on his computer. Can you imagine: as you sit comfortably in a government office working on a computer-assuming unwisely that it is guarded like your border-someone in China can watch every keystroke including spaces and deletions?Ī system like this has been uncovered recently by researchers in Canada-a system called Ghostnet.ĭaisy is a senior IT consultant who helps clients improve their network security. This means that they can break into most of the electronic doors around the world. But none is as strange as this one.Ĭhinese hackers are reported to have penetrated 103 government offices. (Suman Srinivasan/The Epoch Times)People may have heard of all kinds of cyber-espionage stories. A screenshot of the GhostNet report released by the Information Warfare Monitor group in Canada. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |