Skip to Content

Vast Web Espionage Network Discovered

By using botnets, politically motivated attackers can enjoy relative impunity.
March 30, 2009

More than 1,200 computers worldwide have reportedly been infected by what appears to be a politically motivated spy system. Researchers from the Munk Centre for International Studies at the University of Toronto discovered the sprawling “Ghostnet” after being asked to analyze computers belonging to the office of the Dalai Lama. According to Nart Villeneuve, a PhD student and one of the researchers involved:

Close to 30 [percent] of the infected hosts are considered high-value and include computers located at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The investigation was able to conclude that Tibetan computer systems were compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information, including documents from the private office of the Dalai Lama.

Although some have attributed the spying to the Chinese government, the Toronto researchers say they can’t definitely pin the system to any particular group, even if it seems likely that it’s being run by people based in China.

That sort of uncertainty is the way of the future. In a recent story about politically motivated denial of service attacks, I wrote:

A big problem with these politically motivated attacks, according to Jose Nazario, manager of security research for Arbor Networks, is that it’s particularly hard to pinpoint who is really responsible. While it’s easy to determine which botnet is the source of an attack, it’s far harder to determine who might be paying for the attack. This is a big worry for governments looking for redress or retaliation.

The Internet–amazing, distributed technology that it is–offers plausible deniability for those who would take advantage of its darker side. The University of Toronto researchers noted that lack of clarity surrounding international law also makes it hard to pursue the investigation to a satisfying conclusion. Whether used for denial-of-service attacks or spying, the relative legal immunity these botnets enjoy will make them a tempting tool for unscrupulous organizations for a long time to come. Villeneuve concludes:

Regardless of who or what is ultimately in control of GhostNet, it is the capabilities of exploitation, and the strategic intelligence that can be harvested from it, which matters most. Indeed, although the Achilles’ heel of the GhostNet system allowed us to monitor and document its far-reaching network of infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind.

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.