"They identified compromised systems by location and IP address,
and made a nice pie chart showing the distribution by country. They
identified high, medium, and low-value targets. They witnessed
machines being profiled and sensitive documents stolen. They
witnessed keystroke loggers, and Webcams and microphones activated
on the sneak. They learned that the malware that fuels the Ghost
Net is spread via Web sites and email attachments. The
investigation took 10 months and covered 103 countries.
"After all that, I am puzzled why they would omit such basic
information as what software was vulnerable on the infected hosts.
It sure looks like a growing trend to not name names, doesn't it.
Except when they're blaming end users. Though in this report it
appears to be as much political as technological."