text
stringlengths 4
429
|
---|
4 September 2008 |
Experts call for united global action against cyber attacks |
The world has to unite against the growing menace of cyber terrorism, IT |
experts said Thursday, evoking a recent "cyber war" against Georgia as the |
latest example of the threat. |
"The world has finally woken up and understood that cyber security needs a |
global approach and is a very serious matter," Estonian politician Mart Laar |
told a cyber security forum in the Estonian capital Tallinn. |
Estonia had to deal with attacks on government websites blamed on Russian |
hackers in the spring of 2007. |
Official Georgian websites suffered a similar cyber offensive last month in the |
wake of Russia's military offensive on Georgian soil. Estonia was among |
several states that stepped in to host hacked Georgian websites. |
"The cyber war against Georgia in August demonstrated how it has become |
part of the real war on the ground and we must act," Laar added. |
According to Laar, cyber attacks against the Georgian websites came a day |
ahead of Russia's August 8 military action in the country, a move roundly |
condemned in the West. |
Robert Kramer, vice-president of public policy for CompTIA, the Computing |
Technology Industry Association uniting the world's top IT firms, underscored |
that global cyber security starts at home with the average Internet user. |
"The weakest link in cyber space is the human being behind the computer |
with not enough awareness and skills on IT security matters," Kramer told the |
forum. |
Heli Tiirmaa-Klaar, an IT expert with Estonia's defence ministry, repeated the |
warning. |
"People everywhere need to understand that your unprotected computer at |
home can be used as a tool in cyber-war," she said. |
Tim Boerner, an IT security expert with the US Secret Service, said experts |
noted increased attacks on Georgian web sites weeks before the first bombs |
fell on Georgia. |
"Over one million computers worldwide were used during the cyber attacks |
against Estonia in spring 2007," he added. |
An ex-Soviet republic that broke free from Moscow in 1991, the tiny Baltic Sea |
state of Estonia joined the European Union and NATO in 2004. |
It has become a leader in global IT development and has focused heavily on |
cyber security since suffering the wave of cyber attacks in early 2007. |
WASHINGTON POST (blog) |
16 October 2008 |
By Brian Krebs |
Russian Hacker Forums Fueled Georgia Cyber Attacks |
An exhaustive inquiry into August's cyber attacks on the former Soviet bloc |
nation of Georgia finds no smoking gun in the hands of the Russian |
government. But experts say evidence suggests that Russian officials did little |
to discourage the online assault, which was coordinated through a Russian |
online forum that appeared to have been prepped with target lists and |
details about Georgian Web site vulnerabilities well before the two countries |
engaged in a brief but deadly ground, sea and air war. |
The findings come from an open source investigation launched byProject |
Grey Goose, a volunteer effort by more than 100 security experts from tech |
giants like Microsoft and Oracle, as well as former members of the Defense |
Intelligence Agency, Lexis-Nexis, theDepartment of Homeland Security and |
defense contractor SAIC, among others. |
The group began its inquiry shortly after the cyber war disabled a large |
number of Georgia government Web sites. Starting with the Russian hacker |
forum Xaker.ru (hacker.ru), investigators found a posting encouraging wouldbe cyber militia members to enlist at a private, password-protected online |
forum called StopGeorgia.ru. Grey Goose principal investigator Jeff Carr said |
the administrators of the hacker forum were keenly aware that American |
cyber sleuths were poking around: Within hours after discovering the link to |
the StopGeorgia site, Xaker.ru administrators deleted the link and banned all |
access from U.S.-based Internet addresses. |
At StopGeorgia.ru, project members unearthed a top-down hierarchy of |
expert hackers who doled out target lists of Georgian government Web sites |
to relative novices, complete with instructions on how to exploit vulnerabilities |
in the sites in order to render them inaccessible. Following a July defacement |
of the Georgian president's Web site that was blamed on Russian hackers, the |
Georgian government blocked Russian Internet users from visiting |
government Web sites. |
But Carr said StopGeorgia administrators also equipped recruits with |
directions on evading those digital roadblocks, by routing their attacks |
through Internet addresses in other Eastern European nations. The level of |
advance preparation and reconnaissance strongly suggests that Russian |
hackers were primed for the assault by officials within the Russian government |
and or military, Carr said. |
"The fact that the StopGeorgia.ru site was up and running within hours of the |
ground assault -- with full target lists already vetted and with a large member |
population -- was evidence that this effort did not just spring up out of |
nowhere," said Carr, speaking at a forum in Tysons Corner, Va., sponsored |
by Palantir Technologies, an In-Q-Tel funded company in Palo Alto, Calif., |
whose data analysis software helped Grey Goose investigators track the |
origins and foot soldiers involved in the cyber attack. "If they were planning |
ahead of the invasion, how did they know the invasion was going to occur? |
The only way they could have known that is if they were told." |
Initially, security experts assumed that the sites were felled via "distributed |
denial of service" (DDoS) attacks, a well-known method of assault that uses |
hundreds or thousands of compromised personal computers to flood a |
targeted site with so much junk traffic that it can no longer accommodate |
legitimate visitors. But investigators soon learned that attackers were |
instructed in the ways of a far more simple but equally effective attack |
strategy capable of throttling a targeted Web site using a single computer. |
Security researcher and Grey Goose investigator Billy Rios said attackers |
disabled the sites using a built-in feature of MySQL, a software suite widely |
used by Web sites to manage back-end databases. The "benchmark" feature |
in MySQL allows site administrators to test the efficiency of database queries, |
but last year hackers posted online instructions for exploiting the benchmark |
feature to inject millions of junk queries into a targeted database, such that |
the Web servers behind the site become so tied up with bogus instructions |
that they effectively cease to function. |
"Not only can a small number of users bring down the back end databases, it |
indicates that there was some form of planning, reconnaissance, and some |
Subsets and Splits