Space Industry and Business News  
Analysis: Russia behind Georgia cyberwar?

The Web site of President Mikheil Saakashvili of Georgia.
by Shaun Waterman
Washington (UPI) Jul 25, 2008
The Web site of President Mikheil Saakashvili of Georgia was brought down this week by hackers apparently based in Russia, the latest in a string of cyberattacks directed against neighboring countries experiencing friction with the newly resurgent bear.

The attack was monitored by several U.S. Internet watch operations, including the center run by the Department of Homeland Security known as U.S.-CERT, for Computer Emergency Response Team.

A person at U.S.-CERT, authorized to speak to the media but not to give his name, said the center was "not involved in any response" but had passed information about the incident, called a Distributed Denial of Service attack, to DHS intelligence analysts.

The person said the attack did not look like a prelude to, or opening salvo in, any wider assault. "We don't think it is part of anything larger," he said.

In Lithuania, 300 Web sites were defaced earlier this month after a law was promulgated banning the public display of Soviet symbols. Estonian government Web sites were pounded by a massive series of DDOS attacks in April and May 2007, after a decision to move a monument honoring Soviet World War II soldiers. The attacks were part of a series of protests from Russia and ethnic Russians in Estonia.

DDOS attacks work by bombarding the server where the site is based with bogus messages and requests from huge networks of computers that, often unbeknownst to their owners, have been infected by malicious software and taken over by hackers.

Such bot-nets, short for robot-networks, can be rented from the hackers that run them, known as bot herders, and have been used before in cyberwar attacks like the one on Estonia last year.

The flood of messages makes the server unable to deal with legitimate Web traffic, so those trying to visit the site will experience abnormal delays and may not be able to reach it at all.

Security analysts who tracked the attack on Saakashvili's Web site say it, and other unrelated sites hosted on the same server, were unreachable or cripplingly slow for up to 24 hours.

A spokesman for the president told local news outlets nothing had happened.

"It's not true; the Web site didn't stop even for a minute over the weekend," spokesman Vano Noniashvili told the Georgian Messenger.

"It happened," said Marcus Sachs of the SANS Institute, a non-profit computer security research outfit that runs a 24-hour watch operation known as the Internet Storm Center.

Sachs said incident handlers at the center saw the first reports of the attack posted by a volunteer security monitoring operation called ShadowServer, but then independently confirmed the attack was in progress.

"We can see the commands being issued to the bot-net by its command and control server," Steven Adair of ShadowServer told UPI.

"This was the first and (so far) only attack command we have seen issued," Adair said, adding the group had been "monitoring that bot-net for some time."

"We didn't expect it to be so interesting," he said.

Adair and Jose Nazario, senior security researcher at Arbor Networks, both conformed to UPI that the president's site, www.president.gov.ge, had been unreachable or cripplingly slow for up to 24 hours.

Nazario said that although the company providing Internet service to the U.S.-based command and control server had taken it offline shortly after the attack began, it was too late by then, because the slave computers in the bot-net already had received their attack instructions.

"That didn't stop the attack," he said. "The attack stopped when it was over."

Neither Noniashvili nor his deputy responded within 24 hours to an e-mail request for clarification. Officials at the Georgian Embassy in Washington said the press spokesman was out of the country and no one could add anything to the spokesman's denial.

One reason officials are sometimes reluctant to talk about such incidents is that, because bot-nets can be rented anonymously, there is often no way to tell who is really behind a cyberattack.

Nazario noted that the bot-net commands contained the phrase "Win love in Russia," which he said was "a not very subtle way to leave no doubt about where they came from."

Adair said the registration information for the Internet domain controlled by the command server gave a Russian contact address. "The WHOIS contact information was in Russia," he said, referring to the massive database that lists the occupant of every piece of Internet real estate.

But Adair acknowledged it is more than easy to provide bogus information in the database, and that cybercriminals often do so.

And one Internet security analyst, who was in Russia at the time, told UPI that Russian network specialists were of the opinion that Ukraine was behind the attack and was trying to pin the blame on Russia.

"Attribution is always a problem," said Nazario.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Analysis: Md. police spied on protests
Washington (UPI) Jul 17, 2008
Documents released Thursday show that undercover Maryland state police officers infiltrated three local peace and anti-death-penalty groups, attending organizing meetings and sending reports on their activities to U.S. intelligence and military agencies.







  • Google profit up 35 percent at 1.25 billion dollars
  • Microsoft posts sharp profit rise, cautious guidance
  • Google-Viacom lawsuit deal cloaks YouTube user identities
  • Brazilians first to unlock new iPhone: reports

  • IBEX Spacecraft Takes Major Step Toward Launch
  • Success Of The 1734th launch Of Soyuz
  • South Korea's First Rocket Launch Might Be Put Off
  • Soyuz-ST To Be Launched From French Guiana In First Half Of 2009

  • Russia And China May Co-Design New Passenger Plane
  • China Southern Airlines managers take paycut due to oil prices
  • British PM blasts polluting 'ghost' flights
  • Air China says it is to buy 45 Boeing aircraft

  • Boeing To Team With Raytheon On EP-X Aircraft Program
  • Chile buys French-made satellite for 72 million dollars
  • Russia launches military satellite: report
  • GD Completes Milestone In MUOS Defense Satellite Communications System

  • RT Logic Awarded South Pole TDRSS Relay II Project
  • Big Space Junk
  • APL-Operated Midcourse Space Experiment Ends
  • Tree Branching Key To Efficient Flow In Nature And Novel Materials

  • NASA Names Strain New Goddard Space Flight Center Director
  • Raytheon IDS Names Del Checcolo Vice President, Engineering
  • John B. Higginbotham Appointed CEO Of Integral Systems
  • Sea Launch Transitions To New Leadership

  • GOCE Prepares For Shipment To Russia
  • NASA Works To Improve Short-Term Weather Forecasts
  • ESA To Consult The Science Community On Earth Explorer Selection
  • NASA's Deep Impact Films Earth As An Alien World

  • New Trusted Everywhere Duracell Commercial Focuses On Child Safety
  • Garmin Introduces Ruggedised Multi-Mode nuvi 500
  • AT And T Navigator Goes Global
  • Exploring The Moon With GPS

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement