Once GhostNet gained access to a computer with a Trojan horse, it could monitor emails, search secret files, and even access and record from its microphone and webcam undetected.
一旦 GhostNet 获得了对带有特洛伊木马程序的计算机的访问权限,它就可以监控电子邮件、搜索秘密文件, 甚至可以在不被发现的情况下通过其麦克风和网络摄像头进行访问和记录。