[nsp-sec] [stratfor] Cyberwarfare 101: Case Study of a Textbook Attack

Jose Nazario jose at arbor.net
Fri Apr 18 10:00:14 EDT 2008


this just landed in my inbox ... i have not heard the podcast.

-- jose


Strategic Forecasting, Inc.
---------------------------

CYBERWARFARE 101: CASE STUDY OF A TEXTBOOK ATTACK

Summary
One of the most mature instances of a cyberwarfare attack was an assault on 
Internet networks in Estonia in late April and early May of 2007. The Russian 
government was suspected of participating in -- if not instigating -- the 
attack, which featured some of the key characteristics of cyberwarfare, 
including decentralization and anonymity.

Analysis


MEMBERS-ONLY PODCAST

Interactive Cyberwarfare Timeline

Editor's note: This is part of a series of analyses on the emergence of 
cyberspace as battlespace.

During the night of April 26-27, 2007, in downtown Tallinn, Estonia, government 
workers took down and moved a Soviet-era monument commemorating World War II 
called the Bronze Soldier, despite the protests of some 500 ethnic Russian 
Estonians. For the Kremlin -- and Russians in general -- such a move in a 
former Soviet republic was blasphemy.

It was also just the kind emotional flash point that could spark a 
"nationalistic" or "rally-around-the-flag" movement in cyberspace. By 10 p.m. 
local time on April 26, 2007, digital intruders began probing Estonian Internet 
networks, looking for weak points and marshaling resources for an all-out 
assault. Bursts of data were sent to important nodes and servers to determine 
their maximum capacity -- a capacity that the attackers would later exceed with 
floods of data, crashing servers and clogging connections.

A concerted cyberwarfare attack on Estonia was under way, one that would 
eventually bring the functioning of government, banks, media and other 
institutions to a virtual standstill and ultimately involve more than a million 
computers from some 75 countries (including some of Estonia's NATO allies). 
Estonia was a uniquely vulnerable target. Extremely wired, despite its recent 
status as a Soviet republic, Estonian society had grown dependent on the 
Internet for virtually all the administrative workings of everyday life -- 
communications, financial transactions, news, shopping, restaurant 
reservations, theater tickets and bill paying. Even parliamentary votes were 
conducted online. When Estonia's independence from the Soviet Union was 
restored in 1991, not even telephone connections were reliable or widely 
available. Today, more than 60 percent of the population owns a cell phone, and 
Internet usage is already on par with Western European nations. In 2000, 
Estonia's parliament declared Internet access a basic human right.

Some of the first targets of the attack were the Estonian parliament's e-mail 
servers and networks. A flood of junk e-mails, messages and data caused the 
servers to crash, along with several important Web sites. After disabling this 
primary line of communications among Estonian politicians, some of the hackers 
hijacked Web sites of the Reform Party, along with sites belonging to several 
other political groups. Once they gained control of the sites, hackers posted a 
fake letter from Estonian Prime Minister Andrus Ansip apologizing for ordering 
the removal of the World War II monument.

By April 29, 2007, massive data surges were pressing the networks and rapidly 
approaching the limits of routers and switches across the country. Even though 
not all individual servers were taken completely offline, the entire Internet 
system in Estonia became so preoccupied with protecting itself that it could 
scarcely function.

During the first wave of the assault, network security specialists attempted to 
erect barriers and firewalls to protect primary targets. As the attacks 
increased in frequency and force, these barriers began to crumble.

Seeking reinforcements, Hillar Aarelaid, chief security officer for Estonia's 
Computer Emergency Response Team, began calling on contacts from Finland, 
Germany, Slovenia and other countries to assemble a team of hackers and 
computer experts to defend the country. Over the next several days, many 
government ministry and political party Web sites were attacked, resulting 
either in misinformation being spread or the sites being made partially or 
completely inaccessible.

After hitting the government and political infrastructure, hackers took aim at 
other critical institutions. Several denial-of-service attacks forced two major 
banks to suspend operations and resulted in the loss of millions of dollars (90 
percent of all banking transactions in Estonia occur via the Internet). To 
amplify the disruption caused by the initial operation, hackers turned toward 
media outlets and began denying reader and viewer access to roughly half the 
major news organizations in the country. This not only complicated life for 
Estonians but also denied information to the rest of the world about the 
ongoing cyberwar. By now, Aarelaid and his team had gradually managed to block 
access to many of the hackers' targets and restored a degree of stability 
within the networks.

Then on May 9, the day Russia celebrates victory over Nazi Germany, the 
cyberwar on Estonia intensified. Many times the size of the previous days' 
incursions, the attacks may have involved newly recruited cybermercenaries and 
their bot armies. More than 50 Web sites and servers may have been disabled at 
once, with a data stream crippling many other parts of the system. This 
continued until late in the evening of May 10, perhaps when the rented time on 
the botnets and cybermercenaries' contracts expired. After May 10, the attacks 
slowly decreased as Aarelaid managed to take the botnets offline by working 
with phone companies and Internet service providers to trace back the IP 
addresses of attacking computers and shut down their Internet service 
connections.

During the defense of Estonia's Internet system, many of the computers used in 
the attacks were traced back to computers in Russian government offices. What 
could not be determined was whether these computers were simply "zombies" 
hijacked by bots and were not under the control of the Russian government or 
whether they were actively being used by government personnel.

Although Estonia was uniquely vulnerable to a cyberwarfare attack, the campaign 
in April and May of 2007 should be understood more as a sign of things to come 
in the broader developed world. The lessons learned were significant and 
universal. Any country that relies on the Internet to support many critical, as 
well as mundane day-to-day, functions can be severely disrupted by a 
well-orchestrated attack. Estonia, for one, is unlikely ever to reduce its 
reliance on the Internet, but it will undoubtedly try to develop safeguards to 
better protect itself (such as filters that restrict internal traffic in a 
crisis and deny anyone in another country access to domestic servers). 
Meanwhile, the hacker community will work diligently to figure out a way around 
the safeguards.

One thing is certain: Cyberattacks like the 2007 assault on Estonia will become 
more common in an increasingly networked world, which will have to learn -- no 
doubt the hard way -- how to reduce vulnerability and more effectively respond 
to such attacks. Perhaps most significant is the reminder Estonia provides that 
cyberspace definitely favors offensive operations.

Copyright 2008 Strategic Forecasting, Inc.



More information about the nsp-security mailing list