Space Travel News  
Analysis: Russia-Georgia cyberwar doubted

The StopGeorgia.ru website.
by Shaun Waterman
Washington (UPI) Aug 18, 2008
The hacker networks that attacked Georgian Web sites earlier this month previously had targeted porn and gambling sites, likely as part of an extortion racket, and only launched their assault after fighting with Russia broke out, casting doubt on Tbilisi's claims it was orchestrated as part of Moscow's military offensive.

The first attack started just after 2 p.m. GMT on Aug. 8, according to the Shadowserver Foundation, a volunteer group that monitors hacker activity -- more than 12 hours after Russian tanks rolled through the Roki tunnel into Georgia, and once news reports about the conflict had been circulating for some time.

Within hours of fighting breaking out, Russian hackers had established a site, StopGeorgia.ru, where visitors could view a list of Georgian Web sites being targeted, showing which sites had been successfully brought down, and download a simple program that enabled their own computer to join the attack, according to Kimberly Zenz, a Russia specialist with Internet threat intelligence outfit iDefense.

"My own view is that 90 percent of this is being done by volunteers," she told United Press International, adding that, within a few days of being launched, the attacks had become more intense than those last year against Estonia.

Zenz's view is at odds with the Georgian government's charge that Russia's government and/or military were behind the attack. "It is extremely difficult for us to believe that this was not orchestrated at the highest levels," Patrick Worms, an adviser to the Georgian government, told UPI last week.

But one Israeli security specialist last week said the attacks were more akin to a cyber-riot than cyberwar.

"While Georgia is obviously under DDOS (Distributed Denial of Service) attack and it is political in nature �� it is my opinion this is not warfare but just some �� attacks by Russian hackers and/or some rioting by enthusiastic Russian supporters," wrote Gadi Evron, the former head of Israel's Computer Emergency Response Team.lt;p> Evron acknowledged the attacks could be "indirect Russian (military) action," but pointed out the attackers "could have attacked more strategic targets or eliminated the (Georgian Internet) infrastructure kinetically," i.e., with high explosives.

Indeed, a careful analysis of the attacks shows that the most damaging actions were likely carried out by organized hacker gangs.

The first attacks were launched by botnets -- networks of personal computers that have become, often unbeknownst to their owners, infected with malicious software and are controlled by hackers. Botnets are used to send spam e-mails or to bombard Web sites with fake visits, the technique used against Georgia and known as Distributed Denial of Service attack.

Shadowserver volunteers logged six different botnets involved in the DDOS attacks on Georgian government and news sites, each controlled by a different command server. "We have been tracking these servers for a while now, some for a year or more," Shadowserver volunteer Mike Johnson told United Press International by e-mail.

Johnson said their prior targets were mostly Cyrillic-language sites in the Russian .ru domain and mainly "from the 'seamier' side of the Internet" -- pornographic video, gambling and prostitution sites.

Zenz said that fit the profile of botnets being rented out or otherwise used for extortion. "Those kinds of sites will pay, rather than go to the authorities (to stop a DDOS attack)," she said.

She said Russian hackers were also distributing lists of e-mail addresses for Georgian officials and of Georgian Web sites with security flaws -- encouraging others to get involved in hacking or sending spam or malware.

Georgian hackers appeared to have responded, Zenz said, taking down sites that provided news about the Russian-backed Georgian breakaway province of Ossetia -- and in one case replacing the Web site's own content with a news feed from a pro-Georgian service.

At least two of the three major Georgian Internet service providers appeared to have blocked access to Russian .ru Web sites for their subscribers last week, Zenz added.

Several Georgian officials and others involved in monitoring and responding to the cyberattacks failed to respond to e-mail queries Monday or were unavailable for comment.

Russian officials last week denied Georgian charges they were behind the attacks -- a he-said, she-said scenario that has become familiar in this conflict in which so much is unclear.

"You have charges from both sides," White House spokesman Gordon Johndroe told reporters Monday, referring to Russian allegations and Georgian counter-allegations of ethnic cleansing. "We take these charges seriously and are going to look into them."

Zenz said that, despite the self-organized character of the cyberattacks, they were very sophisticated. For instance, the Russian attackers appeared to have tried to forestall any cyber-retaliation by taking down the two highest-profile Georgian hacker sites, hacker.ge and warez.ge, in their initial assault.

Moreover, the fact that news sites were among the first targets showed an awareness that this was a battle about perception as much as reality.

"This is all about trying to shape the message -- on both sides," she said, adding, "Georgian hackers are not as numerous or as good, and they don't have those botnets at their fingertips."

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


US subway card hackers targeted with lawsuit
Las Vegas, Nevada (AFP) Aug 9, 2008
Operators of a US city transit system were in court Saturday trying to stop hackers from showing thousands of their peers how to get free rides by cracking its fare "smart cards."







  • NASA And ATK To Launch Suborbital Hypersonic Experiments
  • Andrews Awarded Aerojet Contract To Build Hardware For Sundancer
  • Iranian missile with dummy satellite failed: US defense official
  • Iran says rocket can carry low-orbit satellite

  • Successful Launch For Third Inmarsat-4 Satellite
  • Russian Rocket To Launch US Commercial Satellite August 19
  • Ariane 5 - Fifth Launch Of 2008
  • GeoEye's Next-Gen Satellite Launch Moves To September 4

  • NASA Keeps Atlantis Target Launch Date
  • LockMart External Tank Is Pacing Item For Hubble Space Telescope Launch
  • LockMart Announces Workforce Reductions On Shuttle External Tank Program
  • External Tank ET-128 Sets New Standard During Recent Shuttle Mission

  • ISS Orbit Adjustment Complete
  • ISS Crew Inspired By Vision And Dreams Of Jules Verne
  • Space Station A Test-Bed For Future Space Exploration
  • Space chiefs ponder ISS transport problem, post-2015 future

  • NASA Engineers Complete Engine Test Series For Ares I Rocket
  • Hermes Spacecraft - Space Travel For The Masses
  • Ohio A Cornerstone Of Space Exploration
  • NASA To Take Corrective Action In Spacesuit Contract Protest

  • China to launch Venezuela's first satellite: Chavez
  • China's Space Ambitions
  • Rocket For China's Manned Space Mission At Launch Center
  • China To Release 700 Hours Of Chang'e-1 Data

  • Japanese Researchers Eye e-Skin For Robots
  • Robots may enhance disabled people's lives
  • Robo-relationships are virtually assured: British experts
  • Europe And Japan Join Forces To Map Out Future Of Intelligent Robots

  • Martian Clays Tell Story Of A Wet Past
  • Spirit Waiting Out The Winter
  • Phoenix Camera Sees Morning Frost At The Landing Site
  • Phoenix Microscope Takes First Image Of Martian Dust Particle

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement