text
stringlengths 4
429
|
|---|
12 August 2008
|
By John Markoff
|
Before the Gunfire, Cyberattacks
|
Weeks before bombs started falling on Georgia, a security researcher in
|
suburban Massachusetts was watching an attack against the country in
|
cyberspace.
|
Jose Nazario of Arbor Networks in Lexington noticed a stream of data
|
directed at Georgian government sites containing the message:
|
win+love+in+Rusia.
|
Other Internet experts in the United States said the attacks against Georgia
|
Internet infrastructure began as early as July 20, with coordinated barrages of
|
millions of requests
|
known as distributed denial of service, or D.D.O.S.,
|
attacks
|
that overloaded and effectively shut down Georgian servers.
|
Researchers at Shadowserver, a volunteer group that tracks malicious
|
network activity, reported that the Web site of the Georgian president, Mikheil
|
Saakashvili, had been rendered inoperable for 24 hours by multiple D.D.O.S.
|
attacks. They said the command and control server that directed the attack
|
was based in the United States and had come online several weeks before it
|
began the assault.
|
As it turns out, the July attack may have been a dress rehearsal for an all-out
|
cyberwar once the shooting started between Georgia and Russia. According
|
to Internet technical experts, it was the first time a known cyberattack had
|
coincided with a shooting war.
|
But it will likely not be the last, said Bill Woodcock, the research director of the
|
Packet Clearing House, a nonprofit organization that tracks Internet traffic. He
|
said cyberattacks are so inexpensive and easy to mount, with few fingerprints,
|
they will almost certainly remain a feature of modern warfare.
|
It costs about 4 cents per machine,
|
Mr. Woodcock said.
|
You could fund
|
an entire cyberwarfare campaign for the cost of replacing a tank tread, so
|
you would be foolish not to.
|
Exactly who was behind the cyberattack is not known. The Georgian
|
government blamed Russia for the attacks, but the Russian government said it
|
was not involved. In the end, Georgia, with a population of just 4.6 million and
|
a relative latecomer to the Internet, saw little effect beyond inaccessibility to
|
many of its government Web sites, which limited the government
|
s ability to
|
spread its message online and to connect with sympathizers around the world
|
during the fighting with Russia.
|
It ranks 74th out of 234 nations in terms of Internet addresses, behind Nigeria,
|
Bangladesh, Bolivia and El Salvador, according to Renesys, a Manchester,
|
N.H., firm that provides performance data on the state of Internet.
|
Cyberattacks have far less impact on such a country than they might on a
|
more Internet-dependent nation, like Israel, Estonia or the United States,
|
where vital services like transportation, power and banking are tied to the
|
Internet.
|
In Georgia, media, communications and transportation companies were also
|
attacked, according to security researchers. Shadowserver saw the attack
|
against Georgia spread to computers throughout the government after
|
Russian troops entered the Georgian province of South Ossetia. The National
|
Bank of Georgia
|
s Web site was defaced at one point. Images of 20thcentury dictators as well as an image of Georgia
|
s president, Mr. Saakashvili,
|
were placed on the site.
|
Could this somehow be indirect Russian action?
|
Yes, but considering Russia is past playing nice and uses real bombs, they
|
could have attacked more strategic targets or eliminated the infrastructure
|
kinetically,
|
said Gadi Evron, an Israeli network security expert.
|
The nature of
|
what
|
s going on isn
|
t clear,
|
he said.
|
The phrase
|
a wilderness of mirrors
|
usually describes the murky world
|
surrounding opposing intelligence agencies. It also neatly summarizes the
|
array of conflicting facts and accusations encompassing the cyberwar now
|
taking place in tandem with the Russian fighting in Georgia.
|
In addition to D.D.O.S. attacks that crippled Georgia
|
s limited Internet
|
infrastructure, researchers said there was evidence of redirection of Internet
|
traffic through Russian telecommunications firms beginning last weekend. The
|
attacks continued on Tuesday, controlled by software programs that were
|
located in hosting centers controlled by a Russian telecommunications firms.
|
A Russian-language Web site, stopgeorgia.ru, also continued to operate and
|
offer software for download used for D.D.O.S. attacks.
|
Over the weekend a number of American computer security researchers
|
tracking malicious programs known as botnets, which were blasting streams
|
of useless data at Georgian computers, said they saw clear evidence of a
|
shadowy St. Petersburg-based criminal gang known as the Russian Business
|
Network, or R.B.N.
|
The attackers are using the same tools and the same attack commands that
|
have been used by the R.B.N. and in some cases the attacks are being
|
launched from computers they are known to control,
|
said Don Jackson,
|
director of threat intelligence for SecureWorks, a computer security firm
|
based in Atlanta.
|
He noted that in the run-up to the start of the war over the weekend,
|
computer researchers had watched as botnets were
|
staged
|
in preparation
|
for the attack, and then activated shortly before Russian air strikes began on
|
Saturday.
|
The evidence on R.B.N. and whether it is controlled by, or coordinating with
|
the Russian government remains unclear. The group has been linked to online
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.