Anzeige
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
Anzeige
Russia vs Estonia_First Cyber War (2007)
Nächste SlideShare
Estonia After the 2007 Cyber Attacks Legal, Strategic and OEstonia After the 2007 Cyber Attacks Legal, Strategic and O
Wird geladen in ... 3
1 von 5
Anzeige

Más contenido relacionado

Más de Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD(20)

Anzeige

Russia vs Estonia_First Cyber War (2007)

  1. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Russia vs Estonia. First Cyber War (2007) INTRODUCTION The "virtual" conflict between Russia and Estonia (2007), conducted exclusively in the field of Cyberspace, can be characterized as "the first cyber war-1st CW" in which for the first time in the global history of operations, cyber capabilities were used for a coordinated attack on a state's infrastructure. HISTORY The main cause of the conflict was the strained relations between the two states (due to different geostrategic approaches), as Estonia after the dissolution of the Soviet Union followed a pro-Western approach. The cause that triggered the conflict was the ratification by the Estonian parliament (February 2007) of the "Forbidden Structures Law", which referred to the de-Sovietization of the country through the removal of those monuments that demonstrated the 50 years of Soviet "occupation". Based on this bill, the Estonian government would move the bronze statue called "Soldier of the Red Army", which
  2. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant had been placed by the Soviets in the center of the Estonian capital, after the end of World War II. This specific move caused intense reactions both from the side of the Russians living in Estonia and the Russian government, which culminated in the period from 26- 27 April 2007 when there were fierce clashes in the center of Tallinn, between different nationalist groups and the police. ANALYSIS OF THE ATTACKS The cyber-attacks were carried out in two distinct time phases, with different levels of intensity and technological specialization. 1. The first phase (April 27-29) was evaluated as «emotionally charged», since the attacks that supported the social outcry that followed the removal of the statue were relatively simple and poorly coordinated, targeting government websites and digital media using technical denial of service (DDoS) attacks, which were relatively easily το dealt with. 2. The second Phase (April 30-May 18, 2007) involved better coordinated and more specialized attacks, carried out in four waves: a. 1st Wave (May 4th) b. 2nd Wave (May 8-11) c. 3rd Wave (May 15th) d. 4th Wave (May 18th) In particular, a clear correlation was observed between politically significant dates and the intensification of attacks. The main methods used by the attackers were: 1. Denial of service or saturation attacks against Estonian servers (DDoS attacks). 2. Unauthorized alteration of web page content (web defacement). 3. Directing network users to unwanted areas (DNS Server attack). 4. Email spamming. OBJECTIVES OF THE ATTACKS The main targets of the cyberattacks were governmental and private sector’s communication and information distribution channels, as well as business sector websites (mainly banking). More generally, servers of institutions responsible for the Estonian Internet infrastructure, government and political targets, services provided by the private sector, personal and random targets as well as the emergency number (112) were mainly targeted and affected.
  3. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Among the governmental and political targets of the attacks were the websites of the Government, the Prime Minister, the President, the Parliament, the State Accounting Office. Almost all ministries were attacked, except the Estonian Ministry of Culture, state agencies (e.g. the Estonian Police Board) and the Reform Party. It should be noted that traditional critical infrastructure systems, such as IT systems that support transportation and energy systems, were not targeted. ORIGIN OF ATTACKS According to CERT-EE, the attacks came almost exclusively from sources outside of Estonia. A large part of the attackers were get carried away by nationalistic/political feelings and carried out the attacks according to the instructions they received on specific online media (forums and websites), in the context of what is called patriotic hacking. Although several of the e-mail addresses from which the attacks originated were located in Russia, the official government in Moscow denied any state support, noting that the attackers were ordinary citizens who simply reacted on their own responsibility to the events in Estonia. RESULTS OF ATTACKS Cyber-attacks found common ground in Estonia as the country was digitally advanced and several sectors (economy, trade, industry, etc.) of state operation and commerce relied on information infrastructure and digital channels for daily communication and operation. Cyber-attacks have had a significant impact on: 1. Economy: The attack on digital infrastructures (network servers of major providers and e-mail, etc.) did not only affect large entities such as banks, media and government institutions, but also small and medium enterprises whose daily activities were serious weakened. 2. Society: The country's digital reforms have reduced non-electronic government communication channels and changed the habits of users who now look for information mainly online. Due to the unavailability of government websites and excessive spamming of official e-mail addresses, normal communication with the government weakened for citizens, although due to the temporary blocking of government websites, there were no significant daily problems for the population. 3. Communication: The attacks affected Estonia's information flow to the outside world. Major international media organizations did not have their own stations or correspondents in Estonia, and the Estonian government relied on online media to distribute information, making them prime targets for attacks. FINDINGS FROM THE ATTACKS
  4. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant The organization and intensity of the cyber-attacks were of an unprecedented scale, and the conclusions of the investigations brought to light important facts: 1. The attacks had a significant impact on the economic and social functioning of the country, since in order to deal with the cyber-attacks it had to be disconnected from the internet, an action which place the country, which widely used the internet not only for public and private transactions (eGovernance, banking system, communication-media, etc.) but also for providing information at home and abroad, in a very difficult situation. It is estimated that losses from the cost of outage of an Estonian bank's website amounted to 1 million dollars. 2. The Estonian legal framework was outdated in dealing with cyber-attacks with many procedural problems of law enforcement and overlapping jurisdictions. Internationally, the Estonian government attempted to classify cyber-attacks as a military activity invoking NATO Article 5, which was not accepted, resulting in cyber- attacks being treated as Cyber Crimes. 3. There were significant attribution problems, as although for the attacks and their coordination were used computers located in 178 countries appeared to come from Russian territory, there was no tangible evidence to incriminate the Russian government which denied any involvement in the cyber-attacks, claiming they were due to nationalist groups, with which it had no connection. EPILOGUE The cyberattack in Estonia demonstrated for the first time worldwide that, under certain conditions, it is possible in a conflict between states to use cyber capabilities, instead of the traditional pillars of state power (political, economic, diplomatic, military, etc.) with scope as Clausewitz said: the enforcement of policy and will by other means. In this sense, geostrategic and military conflicts acquire a new dimension: the cyber dimension, whose size, potential and impact are difficult to predict. The virtual conflict in Estonia effectively highlighted the ability of cyber operations to cause consequences of strategic magnitude that are immediately visible to the entire population of a country and effectively established cyber defense as a key pillar of national security. REFERENCES 1 CCD COE (2010) Eneken Tikk & others International Cyber Incidents-Legal Considerations 2 CCD COE Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective 3 International Centre for Defence Studies (ICDS) (2007)
  5. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Moscow’s Hand in the Tallinn Riots. A Quick Overview by the International Centre for Defence Studies on 7th of May 4 Ottis, R. (2007) Analysis of the Attacker Profiles in the 2007 Cyber Attacks Against Estonia. Unpublished MSc dissertation, Tallinn Technical University, Tallinn 5 Wu, C. (2004) ”An Overview of the Research and Development of Information Warfare in China.” In Edward Halpin et al (eds.) (2006) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave MacMillan, Hampshire, pp 173-195. 6 Mishra, S. (2003) “Network Centric Warfare in the Context of Operation Iraqi Freedom,” Strategic Analysis 27(4) 546-562. INTERNET 1 Konstantin Kosachev (6 Mar 2007) “An insult to our war dead” https://www.theguardian.com/commentisfree/2007/mar/06/comment.secondworldwar 2 Peter Finn-Washington Post, (19 May 2007) “Cyber Assaults on Estonia Typify a New Battle Tactic” https://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html 3 Clover, Charles - Financial Times, 11 March 2009 “Kremlin-backed group behind Estonia cyber blitz”. http://www.ft.com/cms/s/0/57536d5a-0ddc-11de- 8ea3-0000779fd2ac.html?nclick_check=1. 4 IT Pro Rene Millman-1 Jun 2007 https://www.itpro.co.uk/114570/ddos-attacks-on-estonia-not-from-kremlin
Anzeige