Space Industry and Business News  
Who Cyber Smacked Estonia

DDoS attacks work by getting the networks of slave computers to bombard the systems being attacked with requests for information -- overloading them and causing the Web servers to crash.
by Shaun Waterman
UPI Homeland and National Security Editor
Washington (UPI) June 11, 2007
The recent cyber attacks on Estonian government networks were likely carried out by politically motivated hacker gangs, not Russian security agencies as some early reports suggested, according to assessments conducted by the U.S. government and the private sector.

The attacks were crude so-called distributed denial of service, or DDoS, attacks, utilizing global networks, or botnets, of compromised computers, known as slaves, or zombies, often owned by careless individuals, "including some in the United States," according to a statement from Mike Witt, deputy director of the U.S. Cyber Emergency Response Team.

The team, known by the acronym U.S.-CERT, is the element within the Department of Homeland Security that "coordinates defense against and responses to cyber attacks across the nation," according to its Web site.

"U.S.-CERT became involved after NATO, of which Estonia is a member, contacted the U.S. for computer incident response assistance to a cyber attack," said Witt in the statement. His team "worked with an international group -- the Forum of Incident Response and Security Teams, or FIRST -- to coordinate a global response to the attacks, which were carried out by computers scattered across the globe," he said.

The Witt statement did not address the question of the origin of the attacks, but former senior U.S. cybersecurity official Bruce Brody said analysts in both the private sector and the U.S. government had told him "the prevailing assessment" was that no "state actor" was behind the attacks.

"This was a brute force, crude attack," he told UPI, "without the elegance and precision" characterizing the sophisticated cyber-warfare capabilities of major powers.

Professor James Hendler, former chief scientist at the Pentagon's Defense Advanced Research Projects Agency, described the attacks as "more like a cyber riot than a military attack."

Such politically motivated attacks by organized hacker networks -- known to specialists as "hactivism" -- were also seen against Danish Web sites after the publications of cartoons of the Prophet Mohammed in a magazine there.

"The size of the cyber attack, while it was certainly significant to the Estonian government, from a technical standpoint is not something we would consider significant in scale," said Witt, adding he believed the United States would be able to defend itself easily against attacks on a similar scale.

"While no one is immune to cyber attacks," he said U.S. government networks were "more sophisticated, extensive and diverse," making them "less susceptible to disruptions or attacks."

DDoS attacks work by getting the networks of slave computers to bombard the systems being attacked with requests for information -- overloading them and causing the Web servers to crash.

Hendler told UPI that DDoS attacks "are moving lower and lower down the list of (cyber) threats," but added this was generally because they are poorly targeted.

Like any other weapon, he said, the effectiveness of DDoS attacks could be maximized by careful targeting -- for instance, of a crucial system at a particular time it was likely to be very busy, or vulnerable to overload for some other reason.

"You could do it surgically," he said. "If you did some work, you could probably find information-critical (U.S. government) systems that could be brought down ... with a big enough attack."

On the other hand, he said, "the government is pretty attuned to the possibilities of these types of attacks" and had taken extensive counter-measures.

Witt said a key challenge in countering botnets was identifying the source, "in part because of sophisticated new peer-to-peer type structures now being adopted by hackers."

By employing so-called peer-to-peer technology, "where the network is recruited and organized horizontally, from one compromised computer to another, rather than vertically, with each reaching back to the origin, it is much more difficult to track and source the hackers behind the attacks," he said.

Source: United Press International

Related Links
U.S.-CERT
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


US Intel Budget May Reach 60 Billion Dollars
Washington (UPI) June 11, 2007
The secret budget for U.S. intelligence is much higher than previously thought, perhaps as much as $60 billion, according to the extrapolation of figures inadvertently left buried in a computerized government slideshow.







  • Rockwell Collins And ARINC Sign Agreement For Broadband Offering
  • Academic Group Releases Plan To Share Power Over Internet Root Zone Keys
  • Satellite Enables Mobile Wireless Broadband Services To Conventional Devices
  • Singapore Airlines Selects Rockwell Collins Satellite Communications

  • Delta 2 Launch To Launch COSMO-SkyMed Satellite
  • Russia Launches Four Satellites Into Orbit For Globalstar
  • Proton-M Carrier With US Telecom Satellite To Lift Off In June
  • Arianespace Maintains Launch Campaign Pace As Another Ariane 5 GEO Truck Takes Form

  • Airlines Pledge Emissions Cuts But Warn EU Curbs Could Jeopardise Sector
  • Sandia And Boeing Collaborate To Develop Aircraft Fuel Cell Applications
  • Australia Fears Jet Flight Guilt Could Hit Tourism
  • Nondestructive Testing Keeps Bagram Aircraft Flying

  • Northrop Grumman To Begin Developing New Satellite Communications System For B-2 Bomber
  • Boeing Demonstrates Integrated Voice, Data And Video Services With TSAT Tests
  • Boeing Completes Critical Wideband Global SATCOM Satellite Tests
  • Lockheed Martin Completes Significant System Design Milestone On TMOS Program

  • Tether Origami
  • Scientists Create Fire-Safe, Green Plastic
  • Canon And Toshiba Delay Launch Of New SED Televisions
  • Quasicrystals: Somewhere Between Order And Disorder

  • Hall Appoints Feeney To Top GOP Position On Space And Aeronautics Subcommittee
  • Dodgen Joins Northrop Grumman As Vice President Of Strategy For Missile Systems Business
  • Townsend To Lead Ball Aerospace Exploration Systems In Huntsville
  • NASA Nobel Prize Recipient To Lead Chief Scientist Office

  • Kalam Calls For Development Of Satellite Systems For Entire Humanity
  • Boeing Launches Italian Earth Observation Satellite
  • Envisat Captures First Image Of Sargassum From Space
  • US Experts Predict Nine Atlantic Hurricanes This Season

  • Albertis Seeks Share In Galileo Partner Hispasat As Surrey Welcomes EU Support
  • EU Agrees Galileo Needs Public Bailout
  • EU To Back Galileo Bailout And But Faces Tough Talks On New Funds
  • Latest AeroAstro Asset Tracking Satellite Downlink Decoder Ready For Deployment

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement