April 9, 2010

           "cyber-espionage" network that penetrated various organisations including the Office of the Dalai Lama, has been uncovered by researchers.The shadow network targeted government, business, and academic computers at the United Nations and the Embassy of Pakistan in the US, among others. It was used to steal at least 1,500 emails from the Office of the Dalai Lama, the researchers said. The attacks were thought to originate in the city of Chengdu in China. Specifically, the researchers, from the Information Warfare Monitor and the Shadowserver Foundation, said they had evidence of "links between the Shadow network and two individuals living in Chengdu". Information Warfare Monitor comprises researchers from Ottawa-based think tank SecDev Group and the University of Toronto's Munk Centre for International Studies.


       In 2009, the team previously exposed GhostNet, a massive network that was found to have infiltrated 1,295 computers in 103 countries. That investigation had started at the request of the Dalai Lama, Tibet's spiritual leader. The new investigation showed that his office had been targeted again, with more than 1,500 letters sent from the Dalai Lama's office between January and November 2009 recovered by the team. The researchers said that they had also recovered a number of documents that were in the possession of the Indian government, including two documents marked "secret", six as "restricted", and five as "confidential". Recovered documents included Canadian visa applications. The team said they had no direct evidence that they had been stolen form Indian Government computers. Instead, they said, the documents may have been stolen after being copied onto personal computers. In addition, the researchers found evidence that the hackers had targeted the United Nations Economic and Social Commission for Asia and the Pacifc (UNESCAP). However the team said the hackers had been largely "indiscriminate in what they took". "The attackers disproportionately took sensitive information but also took financial and personal information," the team said at launch. The team said the investigation is ongoing.

0 comments :

Post a Comment