Americas

  • United States

Asia

patrick_thibodeau
Senior Editor

Russia’s cyber blockade of Georgia worked. Could it happen here?

feature
Apr 27, 20095 mins
CybercrimeGovernment ITMalware

Lesson learned: DDoS attacks, as well as the response to them, can cripple a country

The Russian and Georgia war last August began in cyberspace with sporadic denial-of-service attacks, targeted primarily at news and government Web sites weeks before the shooting started. And at first, says Eka Tkeshelashvili, secretary of the National Security Council of Georgia, the government wasn’t certain what to make of it.

Georgian officials believed it was an effort by Russia to apply psychological pressure on the country and cause some disruption, “but not to the extent that the whole banking system would have been shut off, crippling the economy,” says Tkeshelashvili.

But that’s exactly what happened. As armed hostilities began, the distributed denial-of-service (DDoS) attacks increased in severity, making news and government Web sites impossible to reach. Banks shut down servers to protect themselves from the theft of data, but a flood of false information and erroneous IP packets presumably originated in Russia triggered an automated response from international banks to sever connections to the country.

By itself, the DDoS attack was shutting down Georgia’s ability to reach the world, but the problem was compounded by the reaction to the attack from financial institutions. Combined, these actions had one result: The Russians had succeeded in isolating Georgia.

Cyber blockade

In taking Georgia offline, the Russians had the Internet, in a sense, to themselves. In the initial days of the fighting, the Russian news media could present its version of the war while the Georgians dealt with what amounted to a cyber blockade.

“There is no way that Georgia could do anything at all to stop or reverse the military defeat that was staring it in the face,” says Patrick Worms, a communications adviser to the Georgian government at the time of the war. “The only thing it could do was generate global condemnation of this Russian move and global sympathy for its plight, he says. For that, it needed Internet access.

But this attack was intended “to make sure that the outside world couldn’t see into Georgia and make sure Georgia couldn’t get in touch with the outside world,” says Tom Merilo, a retired information systems auditor from Canada’s largest telecom, Bell, who was in Georgia after the war to help with technical efforts to improve the networks.

The main paths for network access into Georgia are through Russia and Turkey, Merilo says. Routers in Russia or otherwise outside Georgian control were hijacked and traffic rerouted, making even connecting to Internet-based e-mail accounts, such as Gmail, difficult to impossible.

Volunteers, many from outside Georgia, helped to set up mirror sites by redirecting domains to new hosting providers in other countries. For a time, Georgia’s foreign ministry Web site was hosted on Google’s Blogspot service. It was a “whatever works” approach, and within a few days of the initial attack, Georgia began regaining some ability to communicate, via the Internet, with the outside.

Hard lessons

Worms believes the lessons from the attack are “extraordinarily significant.” A DoS attack “is so easy to set up, it’s so easy to activate and it is so potentially effective that any country is at potential risk of serious disruption from these tools,” he says.

Stephen Spoonamore, a security expert and partner at Global Strategic Partners LLC in Washington, argues that the “echo” effects of attack, which in the case of Georgia was the shutdown of the financial settlement system, can be just as destructive, if not more, than the attack itself.

He says the use of cyberattacks by nation states will only grow. “I think you are going to see it on a regular basis now because it works,” he says.

Meanwhile, in Georgia, “We have to be prepared for everything,” says Tkeshelashvili. The country is working now to “integrate all the measures” available so it can better protect itself from future cyberattacks, she says.

Georgia is a small country without a sophisticated cyberdefense capability, but NATO is taking the incident seriously. The Russians are believed to have been behind a similar cyberattack in Estonia in 2007, and following that event NATO created a Cooperative Cyber Defense Centre of Excellence in Tallinn. “The need for a cyberdefense center to be opened today is compelling,” said General James Mattis, NATO’s Supreme Allied Commander Transformation, at the opening of the center last year.

Could something similar happen in the U.S.? One IT manager, a Georgian native who works here and didn’t want his name used, says it’s entirely possible that a foreign government today has hundreds of servers in various commercial hosting sites in the U.S. at the ready for just such a thing.