Irked by cyberspying, Georgia outs Russia-based hacker -- with photos
In an unprecedented move, Georgia reveals startling details of a hacker it says is stealing its confidential information
IDG News Service - In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
In an unprecedented move, the country of Georgia -- irritated by persistent cyber-spying attacks -- has published two photos of a Russia-based hacker who, the Georgians allege, waged a persistent, months-long campaign that stole confidential information from Georgian government ministries, parliament, banks and NGOs.
The photos are contained in a report that alleges the intrusions originated from Russia, which launched a five-day military campaign in August 2008 against Georgia that was preceded by a wave of cyberattacks.
The photos of the hacker were taken after investigators with the Georgian government's Computer Emergency Response Team (Cert.gov.ge) managed to bait him into downloading what he thought was a file containing sensitive information. In fact, it contained its own secret spying program.
The hacker had been tricked and hacked, with his mugshot taken from his own webcam.
Georgia began investigating the cyber spying linked to the hacker in March 2011 after a file on a computer belonging to a government official was flagged as "suspicious" by a Russian antivirus program called Dr. Web.
The investigation uncovered a sophisticated operation that planted malicious software on numerous Georgian news websites, but only on pages with specific articles that would interest the kinds of people that the hacker wanted to target, said Giorgi Gurgenidze, a cyber security specialist with Cert.gov.ge, which handles computer security incidents.
The news stories selected to attract victims had headlines such as "NATO delegation visit in Georgia" and "US-Georgian agreements and meetings," according to the report, jointly published with Georgia's Ministry of Justice and the LEPL Data Exchange Agency, which is part of the ministry.
CERT-Georgia won't say exactly who that first infected computer belonged to. But what followed is best described as an epic electronic battle between Georgia's good guys and a highly skilled hacker -- or likely team of hackers -- based in Russia.
The agency quickly discovered that 300 to 400 computers located in key government agencies were infected and transmitting sensitive documents to drop servers controlled by the hacker. The compromised computers formed a botnet nicknamed "Georbot."
The malicious software was programmed to search for specific keywords -- such as USA, Russia, NATO and CIA -- in Microsoft Word documents and PDFs, and was eventually modified to record audio and take screenshots. The documents were deleted within a few minutes from the drop servers, after the hacker had copied the files to his own PC.
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The cloud: inevitable, but not ubiquitous It's an age old question for those considering cloud: where do I start? But with all the hype surrounding the cloud, that's not...
- Integrating security with HP TippingPoint This white paper discusses the components and configuration requirements to implement an Intrusion Prevention System (IPS) for CloudSystem Enterprise.
- START small, grow tall: Why cloud now Executives and leaders look forward to the day when IT will be delivered as a pure service throughout the organization. But the reality...
- Leveraging the Cloud for Dev/Test This video discusses some of the key considerations that IT organizations should take into account when moving test and development projects to the...
- A Secure Cloud for Development and Testing Environments This video shows the benefits of hosting your development and testing environments in the Enterprise Cloud Services - Virtual Private Cloud. All Cybercrime and Hacking White Papers | Webcasts