Russian Cyber Operations. Scott Jasper

Russian Cyber Operations - Scott Jasper


Скачать книгу
an opposing force the effective use of cyberspace systems and weapons in a conflict.”85

      2008 Georgian Invasion

      Map 2.2. Georgia

      Source: Central Intelligence Agency, “Middle East: Georgia,” The World Factbook, https://www.cia.gov/library/publications/resources/the-world-factbook/geos/gg.html.

      The methods used to deface websites and launch DDoS attacks against numerous public and private targets in Georgia were similar to those used in Estonia the previous year. Lists of Georgian sites vulnerable to remote injections of Structured Query Language, or SQL (an attack technique that takes advantage of poorly secured application coding for databases), which would facilitate automatic defacements, were distributed on Russian-language websites and message boards, in addition to a Microsoft Windows batch script, with instructions to flood sites. The Russian blogs and forums were located in Estonia, the Russian Federation, and elsewhere.98 The websites StopGeorgia.ru and Xakep.ru appeared to coordinate targeting and attacking of Georgian websites.99 They provided DDoS attack tools and identified thirty-six major websites as primary targets. Also, botnets associated with criminals were used in both Estonia and Georgia. The largest DDoS attack against Estonia came from a botnet linked to a Russian cybercrime group operating out of Saint Petersburg, with connections to the Russian Business Network. In the Georgian conflict, the six command-and-control servers that launched the largest DDoS attacks were managed by a cybercrime group. The servers themselves were registered through www.naunet.ru, a known “bulletproof hosting” provider in Russia, and the domains used to launch the attacks were hosted by www.steadyhost.ru, a known front for cybercrime activities.100

      The concerted and sophisticated DDoS campaign constrained the ability of the Georgian government to convey its narrative in the early stages of the conflict to the international community. Therefore, the significance of the disruptions and manipulations should not be understated, for although the domestic impact upon society was not as great as in Estonia, the state’s loss of control of the narrative in Georgia may have led to a delayed international response.101 Overall, the attacks were not particularly complicated since they were facilitated by prefabricated tools and techniques disseminated to willing participants. In addition, the attacks had limited operational or tactical benefit from a conventional military perspective. Yet the use of cyber operations set the conflict apart as the first of its kind in modern warfare. Additionally, the reliance on local proxies of dubious loyalties to carry out both conventional and unconventional tasks signaled a new way of warfare.102 These actors, in the form of peacekeepers, militiamen, and hackers, gave Russia a way to feign plausible deniability and avoid deploying more of its armed forces, including organic cyber assets.

      A report by the US Cyber Consequences Unit, an independent, nonprofit research institute, concluded that “the cyber attacks against Georgian targets were carried out by civilians with little or no direct involvement on the part of the Russian government or military.”103 The forensic evidence fell upon patriotic hackers recruited by social networking forums and on criminal organizations, who contributed Web servers and botnets. However, the timing of the attacks indicates that the organizers had advance notice of Russian military intentions. For instance, the quick start of packet assaults meant the writing of attack scripts, registering of new domains, and hosting of new websites had to have been prepared before the public was aware of the invasion.104 Likewise, cyberattacks were close in time to corresponding military operations. Just before Russian air attacks on the city of Gori, hackers attacked governmental and news websites.105 Nonetheless, the Russian government denied involvement. Yevgeniy Khorishko, a spokesman for the Russian embassy in Washington, said that “it was possible


Скачать книгу