Russian News  
Analysis: Russia behind Georgia cyberwar?

The Web site of President Mikheil Saakashvili of Georgia.
by Shaun Waterman
Washington (UPI) Jul 25, 2008
The Web site of President Mikheil Saakashvili of Georgia was brought down this week by hackers apparently based in Russia, the latest in a string of cyberattacks directed against neighboring countries experiencing friction with the newly resurgent bear.

The attack was monitored by several U.S. Internet watch operations, including the center run by the Department of Homeland Security known as U.S.-CERT, for Computer Emergency Response Team.

A person at U.S.-CERT, authorized to speak to the media but not to give his name, said the center was "not involved in any response" but had passed information about the incident, called a Distributed Denial of Service attack, to DHS intelligence analysts.

The person said the attack did not look like a prelude to, or opening salvo in, any wider assault. "We don't think it is part of anything larger," he said.

In Lithuania, 300 Web sites were defaced earlier this month after a law was promulgated banning the public display of Soviet symbols. Estonian government Web sites were pounded by a massive series of DDOS attacks in April and May 2007, after a decision to move a monument honoring Soviet World War II soldiers. The attacks were part of a series of protests from Russia and ethnic Russians in Estonia.

DDOS attacks work by bombarding the server where the site is based with bogus messages and requests from huge networks of computers that, often unbeknownst to their owners, have been infected by malicious software and taken over by hackers.

Such bot-nets, short for robot-networks, can be rented from the hackers that run them, known as bot herders, and have been used before in cyberwar attacks like the one on Estonia last year.

The flood of messages makes the server unable to deal with legitimate Web traffic, so those trying to visit the site will experience abnormal delays and may not be able to reach it at all.

Security analysts who tracked the attack on Saakashvili's Web site say it, and other unrelated sites hosted on the same server, were unreachable or cripplingly slow for up to 24 hours.

A spokesman for the president told local news outlets nothing had happened.

"It's not true; the Web site didn't stop even for a minute over the weekend," spokesman Vano Noniashvili told the Georgian Messenger.

"It happened," said Marcus Sachs of the SANS Institute, a non-profit computer security research outfit that runs a 24-hour watch operation known as the Internet Storm Center.

Sachs said incident handlers at the center saw the first reports of the attack posted by a volunteer security monitoring operation called ShadowServer, but then independently confirmed the attack was in progress.

"We can see the commands being issued to the bot-net by its command and control server," Steven Adair of ShadowServer told UPI.

"This was the first and (so far) only attack command we have seen issued," Adair said, adding the group had been "monitoring that bot-net for some time."

"We didn't expect it to be so interesting," he said.

Adair and Jose Nazario, senior security researcher at Arbor Networks, both conformed to UPI that the president's site, www.president.gov.ge, had been unreachable or cripplingly slow for up to 24 hours.

Nazario said that although the company providing Internet service to the U.S.-based command and control server had taken it offline shortly after the attack began, it was too late by then, because the slave computers in the bot-net already had received their attack instructions.

"That didn't stop the attack," he said. "The attack stopped when it was over."

Neither Noniashvili nor his deputy responded within 24 hours to an e-mail request for clarification. Officials at the Georgian Embassy in Washington said the press spokesman was out of the country and no one could add anything to the spokesman's denial.

One reason officials are sometimes reluctant to talk about such incidents is that, because bot-nets can be rented anonymously, there is often no way to tell who is really behind a cyberattack.

Nazario noted that the bot-net commands contained the phrase "Win love in Russia," which he said was "a not very subtle way to leave no doubt about where they came from."

Adair said the registration information for the Internet domain controlled by the command server gave a Russian contact address. "The WHOIS contact information was in Russia," he said, referring to the massive database that lists the occupant of every piece of Internet real estate.

But Adair acknowledged it is more than easy to provide bogus information in the database, and that cybercriminals often do so.

And one Internet security analyst, who was in Russia at the time, told UPI that Russian network specialists were of the opinion that Ukraine was behind the attack and was trying to pin the blame on Russia.

"Attribution is always a problem," said Nazario.

Community
Email This Article
Comment On This Article

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Analysis: Md. police spied on protests
Washington (UPI) Jul 17, 2008
Documents released Thursday show that undercover Maryland state police officers infiltrated three local peace and anti-death-penalty groups, attending organizing meetings and sending reports on their activities to U.S. intelligence and military agencies.







  • Ukraine drafts law for Russian fleet to leave: report
  • Russia mulls regular bomber flights to Cuba: report
  • China, Russia finally fix long-disputed border
  • Russia Defense Watch: Flexing arctic power

  • The Indian Nuclear Tango Part Two
  • Iran has up to 6,000 enrichment centrifuges: Ahmadinejad
  • Sandia Sends Sensors Into Space To Detect Nuclear Blasts Globally
  • Missile crew falls asleep with nuclear code device: air force

  • Analysis: Revolt in India rebel group ULFA
  • Analysis: India mulls new probe agency
  • Analysis: India eyes fake currency flow
  • Process On For Establishing Aerospace Command

  • Tiananmen massacre photo slips into China paper
  • China's mobile users top 600 million: govt
  • China says deadly bus blasts, Olympics not linked
  • China's political elite to meet on economic policy: report

  • China's largest oil and gas producer cuts jobs: state media
  • Workers struggle to clean up oil spill on Mississippi
  • Scientists work on garbage for gas
  • Arctic holds 90 billion barrels of oil, mostly offshore: report

  • ISS Crew Inspired By Vision And Dreams Of Jules Verne
  • Space Station A Test-Bed For Future Space Exploration
  • Space chiefs ponder ISS transport problem, post-2015 future
  • Two Russian cosmonauts begin new space walk

  • Boeing To Team With Raytheon On EP-X Aircraft Program
  • Russia launches military satellite: report
  • Chile buys French-made satellite for 72 million dollars
  • Successful Demonstration Of High Power Electric Propulsion System For TSAT

  • India to train US 'Green Berets' in jungle warfare
  • "Dinosaur eel" points to body armour of the future
  • B-52: Lifespan Of A Raven
  • Russian Navy Aircraft Test New Weapons In Arctic

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement