text
stringlengths 4
429
|
---|
a conflict - risk forwarding the responsibility of the attack to each |
and every Russian or Russian supporter that ever attacked |
Georgian sites using publicly obtainable DDoS attack tools in a |
coordinated fashion. |
An example of Russian efforts to shut the mouse of Georgian media is |
the story of the Georgian news agency GHN. The first attack against |
the agency |
s website occurred in August 2008. Another wave of cyber |
attacks started on 8 September. As a result, the GHN news agency |
website had been paralyzed for 2 weeks. Another Georgian media |
website that came under consistent cyber attacks after the end of the |
armed conflict is www.apsny.ge |
website of the Georgia-Online news |
agency. It is interesting to note that Russian efforts to prevent Georgian |
Internet media resources from disseminating information continued |
even after the war. |
4. CYBER BLOCKADE |
The Russian assault on Georgian cyberspace was intensely coordinated and directed out of St. Petersburg, inside the territory of the |
Russian Federation. The primary orchestrator was the Russian Business |
Network (RBN) which conducted the cyber-blockade so that all |
Georgian Internet traffic was going through Russia, denying Georgia its |
internet independence. Computers in Georgia showed that an assault |
was clearly taking place, which is presented here as evidence of |
Russian sponsored cyber-terrorism: |
Two trace routes for the web site mfa.gov.ge, that of the Georgian |
Ministry of Foreign Affairs, were showing: |
(a) From US - Ge = Blocked via TTnet Turkey |
(b) From Ukraine - Ge = available & slow; not accessible, cached |
(forged page) now only via redirect through Bryansk.ru |
Other Georgia government websites such as mod.gov.ge, the |
website of the Georgian Ministry of Defense and the web site |
president.gov.ge, the web site of the Georgian Presidency showed |
(c) From US - Ge = Blocked via TTnet Turkey |
(d) From Ukraine - Ge = Blocked via TTnet Turkey |
By examining Internet routes before and after the beginning of the war, |
it is clear that they were altered either legally or illegally, blocking |
traffic in and out of Georgia. Some of those routers are known to be |
under control of the Russian Business Network (RBN). This can be |
demonstrated via a comparison of route configuration before and |
after the war. |
5. SITES PROVIDING DDOS ATTACK TOOLS |
Here we can provide clear evidence of co-ordination and a full list of |
targets the cyber-terrorists had selected taken from the Russian hosted |
web site stopgeorgia.ru (which also appears as stopgeorgia.info a |
redirected page). This site provided the necessary attack tools for the |
cyber assault against Georgia for hackers. As we can see the screenshot shows that mostly .ge web sites are listed for priority attacks. |
However - also targeted for assault is the US embassy in Tbilisi. This web |
site, as seen before, is an open site to attract future FSB cyber warriors. |
The following evidence below shows how these sites can be traced |
back to the Russian Business Network (RBN) in ST. Petersburg and other |
cybercriminal locations. |
The information site Stopgeorgia.ru which provided information and |
tools for independent hackers to attack Georgian sites was hosted |
by AS36351 Softlayer of Plano Texas. This is a well known location |
that is associated with Atrivo and Intercage malware hosting |
connectivity, which is highly disruptive to online service. |
The information site Stopgeorgia.info was hosted by AS28753 |
NETDIRECT in Frankfurt, Germany as well as in AS12578 APOLLO |
LATTELEKOM APOLLO in Latvia. |
The link back to the Russian Business Network (RBN) was provided by |
the clues left in the registration, which reads as: |
Sponsoring |
Registrar: |
EstDomains, |
Inc. |
Registrant: Domain Manager, Protect Details, Inc, Street1: 29 |
Kompozitorov St., Saint Petersburg, RU, Phone:+7.8129342271 |
In summary, 36 important web sites were identified as targets for |
hackers, including the US and UK Embassies in Tbilisi, Georgian |
Parliament, Georgian Supreme Court, Ministry of Foreign Affairs, various |
news agencies and other media resources, the Central Election |
Commission, and many others. |
Due to efforts of many IT specialists in Internet hosting routing |
companies, normal traffic was mostly resumed after the initial strikes. |
Most critical websites were hosted outside of Georgia. |
6. PART OF THE INFORMATION WAR |
To help to make a final judgment regarding the cyberwar against |
Georgia these two declarations from Russian officials can help us to |
evaluate how Moscow thinks in regard to online warfare. The Russian |
State Duma deputy and member of the Security Committee Deputy |
Nikolai Kuryanovich stated in 2006 within a formal Russian |
parliamentary letter of appreciation to hackers who had taken down |
several Israeli web sites: |
"In the very near future many conflicts will not take place on the |
open field of battle, but rather in spaces on the Internet, fought with |
the aid of information soldiers, that is hackers. This means that a |
small force of hackers is stronger than the multi-thousand force of |
the current armed forces." |
Should we interpret this declaration as a statement of intent, or merely |
a prediction? A few days ago, the Editor of the Russian Online journal |
cybersecurity.ru, made a similar statement that provides insight into the |
Russian war aims: |
Cyber-attacks are part of the information war, making your enemy |
shut up is a potent weapon of modern warfare. |
Clear examples that such thinking is being applied as guiding principles |
of Russian strategy as part of the intense information-war taking place |
can be drawn from the second wave of attacks that showed up from |
Russian Business Network (RBN) server range. This time the weapon was |
a new campaign purporting to come from the BBC that mocked |
Georgia's President and spread as a new virus. |