Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Tracking GhostNet: Investigating a Cyber Espionage NetworkMar 29, 2009 · This study reveals the existence and operational reach of a malware-based cyber espionage network that we call GhostNet. Between June 2008 ...
-
[2]
Tracking GhostNet: Investigating a Cyber Espionage NetworkMar 28, 2009 · Researchers at the Information Warfare Monitor uncovered a suspected cyber espionage network of over 1,295 infected hosts in 103 countries.
-
[3]
Vast Spy System Loots Computers in 103 CountriesMar 28, 2009 · A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world.Missing: key | Show results with:key
-
[4]
China rejects computer spy claims | CBC NewsMar 31, 2009 · China's government on Tuesday dismissed a research report outlining an extensive spy network based mostly in China as "lies" designed to ...Missing: denial counterclaims
-
[5]
China denies it's behind GhostNet - ZDNETMar 31, 2009 · I'm afraid China doesn't have a lot of credibility when it denies any and all Internet spying. We all know all major nations engage in the ...Missing: counterclaims | Show results with:counterclaims
-
[6]
China denies playing a role in 'GhostNet' cyberspy ringChinese officials denied suggestions that their government may be involved in a cyberespionage ring that illicitly gathered data from foreign governments.
-
[7]
Cyber attacks blamed on China - BBC NewsJan 31, 2013 · While they traced Ghostnet mainly to computers in China, the researchers at Information Warfare Monitor, external made no direct link to the ...
-
[8]
[PDF] Shadows in the Cloud: | The Citizen LabApr 6, 2010 · Both the Information. Warfare Monitor and the Shadowserver Foundation aim to understand and accurately report on emerging cyber ... Information ...
-
[9]
Cyber-Spy Probe Sought - Radio Free AsiaApr 8, 2009 · The report said GhostNet had infected multiple Tibetan computers, providing attackers with access to potentially sensitive information such as ...Missing: scope | Show results with:scope
-
[10]
[PDF] CYBER ESPIONAGE AGAINST TIBETANS: - Tibet Action InstituteDec 10, 2024 · This report provides an overview of the past 20 years of information security threats targeting the Tibetan community based on analysis of ...
-
[11]
China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan ...Jul 24, 2025 · The Tibetan community has been targeted by a China-nexus cyber espionage group as part of two campaigns conducted last month ahead of the ...
-
[12]
Chinese Cyberespionage Originating From Tsinghua University ...Aug 16, 2018 · Scope Note: Recorded Future analyzed new malware targeting the Tibetan community, resulting in a detailed analysis of the malware and its ...Missing: investigation details
-
[13]
APT groups and threat actors - Google CloudOverview: APT41 is a prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity ...
-
[14]
Report: Government-linked hackers in China target exiled Tibetan ...Apr 18, 2024 · A new report by a team of Tibet-focused cybersecurity analysts details how hackers with links to the Chinese government are using cyber espionage tactics.