Russian 'cybermilitia' knocks Kyrgyzstan offline
Same tactics used in '08 attack against Georgia, but hackers getting faster, says researcher
Computerworld - A Russian "cybermilitia" has knocked the central Asian country of Kyrgyzstan off the Internet, a security researcher said today, demonstrating that the hackers are able to respond even faster than last year, when they waged a digital war against another former Soviet republic, Georgia.
Since Jan. 18, the two biggest Internet service providers in Kyrgyzstan have been under a "massive, sustained distributed denial-of-service attack," said Don Jackson, the director of threat intelligence at SecureWorks Inc.
The attacks, which are ongoing, have knocked most of the country offline and disrupted e-mail to and from a U.S. air base there, Jackson said. The public affairs officer at Manas Air Base in Kyrgyzstan was not immediately available to answer questions about whether the attacks have disrupted operations or other activities.
According to Jackson, the distributed denial-of-service (DDoS) attacks -- essentially a flood of requests that overwhelm servers and effectively knock them off the Internet -- can be traced to the same groups of Russian and ethnic Russian hackers who assembled in militia-like fashion last August to launch similar attacks against Georgia.
"The traffic we've collected has all the hallmarks of the tools that were used in the Georgia attacks," said Jackson. "And they're from the same network [of IP addresses] that we associated with the cybermilitia last year." Researchers have also found two groups, led by "two specific players," in common with the 2008 attacks against Georgia, he added.
Speculation about why Kyrgyzstan's Internet infrastructure was attacked center around an investment deal that Russia is negotiating the country. Russia has indicated that it wants Kyrgyzstan to oust foreign air forces, including those of the U.S., before it will agree to loan the country $300 million and invest another $1.7 billion in its energy industry.
Opposition to the current administration in Kyrgyzstan has relied heavily on the Internet, while President Bakiyev's government has ignored the Web, said Jackson. "Any attack by Russians would do no collateral damage to their ally in the area, and would only impact the opposition," he explained.
Beyond the immediate effect on Kyrgyzstan, what's worrisome to Jackson is the speed with which this attack was mounted. "To put some perspective on this, it's been an escalating pattern from Estonia to Georgia to here," he said, referring to the 2007 and 2008 attacks against other former Soviet republics. "The attacks are more closely coinciding with events that are core to the Russian interest, with increasingly fast response and quick mobilization.
"When it once took days or weeks, now we're seeing it within hours," Jackson said.
In fact, the attacks on Kyrgyzstan were mobilized in much the same way that the so-called militia was formed last year to cripple Georgia. "It was the same kind of mobilization, where word is put out by a few and then other [hackers] respond," he said. One difference: The attacks against Kyrgyzstan lacked the kind of wide support that the Georgian DDoS attacks gained. At one point, Russian social network were involved in the latter, something not yet seen in the attacks against Kyrgyzstan.
"We haven't seen a broad base of support by Russian citizens," said Jackson. "It's more the core of the militia group."
Researchers have not found any direct connection between the attacks -- which originate on botnets and servers that send more mundane pharmaceutical spam or conduct phishing campaigns -- and the Russian government. But to Jackson, that hardly matters.
"People who once were in the KGB, or other parts of the government, and who now are in computer security, have in the past said, 'We will rely on this capability because there is no risk for us doing so,'" said Jackson. "Using cybermilitias shelters the Russian government from culpability."
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts