SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Russia vs Estonia. First Cyber War (2007)
Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Russia vs Estonia.
First Cyber War (2007)
INTRODUCTION
The "virtual" conflict between Russia and Estonia (2007), conducted exclusively
in the field of Cyberspace, can be characterized as "the first cyber war-1st CW" in which
for the first time in the global history of operations, cyber capabilities were used for a
coordinated attack on a state's infrastructure.
HISTORY
The main cause of the conflict was the strained relations between the two states
(due to different geostrategic approaches), as Estonia after the dissolution of the
Soviet Union followed a pro-Western approach.
The cause that triggered the conflict was the ratification by the Estonian
parliament (February 2007) of the "Forbidden Structures Law", which referred to the
de-Sovietization of the country through the removal of those monuments that
demonstrated the 50 years of Soviet "occupation". Based on this bill, the Estonian
government would move the bronze statue called "Soldier of the Red Army", which
Russia vs Estonia. First Cyber War (2007)
Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
had been placed by the Soviets in the center of the Estonian capital, after the end of
World War II.
This specific move caused intense reactions both from the side of the Russians
living in Estonia and the Russian government, which culminated in the period from 26-
27 April 2007 when there were fierce clashes in the center of Tallinn, between different
nationalist groups and the police.
ANALYSIS OF THE ATTACKS
The cyber-attacks were carried out in two distinct time phases, with different
levels of intensity and technological specialization.
1. The first phase (April 27-29) was evaluated as «emotionally charged», since
the attacks that supported the social outcry that followed the removal of the statue
were relatively simple and poorly coordinated, targeting government websites and
digital media using technical denial of service (DDoS) attacks, which were relatively
easily το dealt with.
2. The second Phase (April 30-May 18, 2007) involved better coordinated and
more specialized attacks, carried out in four waves:
a. 1st Wave (May 4th)
b. 2nd Wave (May 8-11)
c. 3rd Wave (May 15th)
d. 4th Wave (May 18th)
In particular, a clear correlation was observed between politically significant
dates and the intensification of attacks.
The main methods used by the attackers were:
1. Denial of service or saturation attacks against Estonian servers (DDoS attacks).
2. Unauthorized alteration of web page content (web defacement).
3. Directing network users to unwanted areas (DNS Server attack).
4. Email spamming.
OBJECTIVES OF THE ATTACKS
The main targets of the cyberattacks were governmental and private sector’s
communication and information distribution channels, as well as business sector
websites (mainly banking).
More generally, servers of institutions responsible for the Estonian Internet
infrastructure, government and political targets, services provided by the private
sector, personal and random targets as well as the emergency number (112) were
mainly targeted and affected.
Russia vs Estonia. First Cyber War (2007)
Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Among the governmental and political targets of the attacks were the websites
of the Government, the Prime Minister, the President, the Parliament, the State
Accounting Office. Almost all ministries were attacked, except the Estonian Ministry of
Culture, state agencies (e.g. the Estonian Police Board) and the Reform Party.
It should be noted that traditional critical infrastructure systems, such as IT
systems that support transportation and energy systems, were not targeted.
ORIGIN OF ATTACKS
According to CERT-EE, the attacks came almost exclusively from sources outside
of Estonia. A large part of the attackers were get carried away by nationalistic/political
feelings and carried out the attacks according to the instructions they received on
specific online media (forums and websites), in the context of what is called patriotic
hacking. Although several of the e-mail addresses from which the attacks originated
were located in Russia, the official government in Moscow denied any state support,
noting that the attackers were ordinary citizens who simply reacted on their own
responsibility to the events in Estonia.
RESULTS OF ATTACKS
Cyber-attacks found common ground in Estonia as the country was digitally
advanced and several sectors (economy, trade, industry, etc.) of state operation and
commerce relied on information infrastructure and digital channels for daily
communication and operation.
Cyber-attacks have had a significant impact on:
1. Economy: The attack on digital infrastructures (network servers of major
providers and e-mail, etc.) did not only affect large entities such as banks, media and
government institutions, but also small and medium enterprises whose daily activities
were serious weakened.
2. Society: The country's digital reforms have reduced non-electronic
government communication channels and changed the habits of users who now look
for information mainly online. Due to the unavailability of government websites and
excessive spamming of official e-mail addresses, normal communication with the
government weakened for citizens, although due to the temporary blocking of
government websites, there were no significant daily problems for the population.
3. Communication: The attacks affected Estonia's information flow to the
outside world. Major international media organizations did not have their own stations
or correspondents in Estonia, and the Estonian government relied on online media to
distribute information, making them prime targets for attacks.
FINDINGS FROM THE ATTACKS
Russia vs Estonia. First Cyber War (2007)
Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
The organization and intensity of the cyber-attacks were of an unprecedented
scale, and the conclusions of the investigations brought to light important facts:
1. The attacks had a significant impact on the economic and social functioning
of the country, since in order to deal with the cyber-attacks it had to be disconnected
from the internet, an action which place the country, which widely used the internet
not only for public and private transactions (eGovernance, banking system,
communication-media, etc.) but also for providing information at home and abroad,
in a very difficult situation. It is estimated that losses from the cost of outage of an
Estonian bank's website amounted to 1 million dollars.
2. The Estonian legal framework was outdated in dealing with cyber-attacks with
many procedural problems of law enforcement and overlapping jurisdictions.
Internationally, the Estonian government attempted to classify cyber-attacks as a
military activity invoking NATO Article 5, which was not accepted, resulting in cyber-
attacks being treated as Cyber Crimes.
3. There were significant attribution problems, as although for the attacks
and their coordination were used computers located in 178 countries appeared to
come from Russian territory, there was no tangible evidence to incriminate the Russian
government which denied any involvement in the cyber-attacks, claiming they were
due to nationalist groups, with which it had no connection.
EPILOGUE
The cyberattack in Estonia demonstrated for the first time worldwide that, under
certain conditions, it is possible in a conflict between states to use cyber capabilities,
instead of the traditional pillars of state power (political, economic, diplomatic, military,
etc.) with scope as Clausewitz said: the enforcement of policy and will by other means.
In this sense, geostrategic and military conflicts acquire a new dimension: the
cyber dimension, whose size, potential and impact are difficult to predict.
The virtual conflict in Estonia effectively highlighted the ability of cyber
operations to cause consequences of strategic magnitude that are immediately visible
to the entire population of a country and effectively established cyber defense as a key
pillar of national security.
REFERENCES
1 CCD COE (2010)
Eneken Tikk & others
International Cyber Incidents-Legal Considerations
2 CCD COE
Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective
3 International Centre for Defence Studies (ICDS) (2007)
Russia vs Estonia. First Cyber War (2007)
Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Moscow’s Hand in the Tallinn Riots.
A Quick Overview by the International Centre for Defence Studies on 7th of May
4 Ottis, R. (2007)
Analysis of the Attacker Profiles in the 2007 Cyber Attacks Against Estonia.
Unpublished MSc dissertation, Tallinn Technical University, Tallinn
5 Wu, C. (2004)
”An Overview of the Research and Development of Information Warfare in China.” In
Edward Halpin et al (eds.) (2006) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave
MacMillan, Hampshire, pp 173-195.
6 Mishra, S. (2003)
“Network Centric Warfare in the Context of Operation Iraqi Freedom,” Strategic Analysis 27(4) 546-562.
INTERNET
1 Konstantin Kosachev (6 Mar 2007)
“An insult to our war dead”
https://www.theguardian.com/commentisfree/2007/mar/06/comment.secondworldwar
2 Peter Finn-Washington Post, (19 May 2007)
“Cyber Assaults on Estonia Typify a New Battle Tactic”
https://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html
3 Clover, Charles - Financial Times, 11 March 2009
“Kremlin-backed group behind Estonia cyber blitz”. http://www.ft.com/cms/s/0/57536d5a-0ddc-11de-
8ea3-0000779fd2ac.html?nclick_check=1.
4 IT Pro
Rene Millman-1 Jun 2007
https://www.itpro.co.uk/114570/ddos-attacks-on-estonia-not-from-kremlin

Weitere ähnliche Inhalte

Ähnlich wie Russia vs Estonia_First Cyber War (2007)

Master Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMaster Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMarco Lisi
 
Cyber Warfare and Cyber Terror.pdf
Cyber Warfare and Cyber Terror.pdfCyber Warfare and Cyber Terror.pdf
Cyber Warfare and Cyber Terror.pdfBikrambehera23
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Jill Baldwin
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismblogzilla
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
SEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - CyberterrorismSEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - CyberterrorismAntonio Sanz Alcober
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrainblogzilla
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Information or cyber warfare is computer related attacks which a.docx
Information or cyber warfare is computer related attacks which a.docxInformation or cyber warfare is computer related attacks which a.docx
Information or cyber warfare is computer related attacks which a.docxannettsparrow
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trendsijtsrd
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxfestockton
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 

Ähnlich wie Russia vs Estonia_First Cyber War (2007) (20)

Master Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMaster Homeland Security 2014 Lisi
Master Homeland Security 2014 Lisi
 
Cyber Warfare and Cyber Terror.pdf
Cyber Warfare and Cyber Terror.pdfCyber Warfare and Cyber Terror.pdf
Cyber Warfare and Cyber Terror.pdf
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
SEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - CyberterrorismSEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - Cyberterrorism
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrain
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Information or cyber warfare is computer related attacks which a.docx
Information or cyber warfare is computer related attacks which a.docxInformation or cyber warfare is computer related attacks which a.docx
Information or cyber warfare is computer related attacks which a.docx
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docxArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
ArticleInvisible Digital FrontCan Cyber Attacks Shape.docx
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD (20)

Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdfRussia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
 
Mitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdfMitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdf
 
CYBER KILL CHAIN Table
CYBER KILL CHAIN TableCYBER KILL CHAIN Table
CYBER KILL CHAIN Table
 
Logismika Parakolouthisis.docx
Logismika Parakolouthisis.docxLogismika Parakolouthisis.docx
Logismika Parakolouthisis.docx
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
 
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
 
Cyber War
Cyber WarCyber War
Cyber War
 
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεωνΚυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
 
Cyberspace_New Operational Domain
Cyberspace_New Operational DomainCyberspace_New Operational Domain
Cyberspace_New Operational Domain
 
Πληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information WarfareΠληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information Warfare
 
Corporate Cyber Security
Corporate Cyber SecurityCorporate Cyber Security
Corporate Cyber Security
 
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, CyberwarfareRussia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
 
Cyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations TimeCyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations Time
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber WarfareΚυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
 
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing GuideΟδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
 
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security GuideΟδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Russia vs Estonia_First Cyber War (2007)

  • 1. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Russia vs Estonia. First Cyber War (2007) INTRODUCTION The "virtual" conflict between Russia and Estonia (2007), conducted exclusively in the field of Cyberspace, can be characterized as "the first cyber war-1st CW" in which for the first time in the global history of operations, cyber capabilities were used for a coordinated attack on a state's infrastructure. HISTORY The main cause of the conflict was the strained relations between the two states (due to different geostrategic approaches), as Estonia after the dissolution of the Soviet Union followed a pro-Western approach. The cause that triggered the conflict was the ratification by the Estonian parliament (February 2007) of the "Forbidden Structures Law", which referred to the de-Sovietization of the country through the removal of those monuments that demonstrated the 50 years of Soviet "occupation". Based on this bill, the Estonian government would move the bronze statue called "Soldier of the Red Army", which
  • 2. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant had been placed by the Soviets in the center of the Estonian capital, after the end of World War II. This specific move caused intense reactions both from the side of the Russians living in Estonia and the Russian government, which culminated in the period from 26- 27 April 2007 when there were fierce clashes in the center of Tallinn, between different nationalist groups and the police. ANALYSIS OF THE ATTACKS The cyber-attacks were carried out in two distinct time phases, with different levels of intensity and technological specialization. 1. The first phase (April 27-29) was evaluated as «emotionally charged», since the attacks that supported the social outcry that followed the removal of the statue were relatively simple and poorly coordinated, targeting government websites and digital media using technical denial of service (DDoS) attacks, which were relatively easily το dealt with. 2. The second Phase (April 30-May 18, 2007) involved better coordinated and more specialized attacks, carried out in four waves: a. 1st Wave (May 4th) b. 2nd Wave (May 8-11) c. 3rd Wave (May 15th) d. 4th Wave (May 18th) In particular, a clear correlation was observed between politically significant dates and the intensification of attacks. The main methods used by the attackers were: 1. Denial of service or saturation attacks against Estonian servers (DDoS attacks). 2. Unauthorized alteration of web page content (web defacement). 3. Directing network users to unwanted areas (DNS Server attack). 4. Email spamming. OBJECTIVES OF THE ATTACKS The main targets of the cyberattacks were governmental and private sector’s communication and information distribution channels, as well as business sector websites (mainly banking). More generally, servers of institutions responsible for the Estonian Internet infrastructure, government and political targets, services provided by the private sector, personal and random targets as well as the emergency number (112) were mainly targeted and affected.
  • 3. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Among the governmental and political targets of the attacks were the websites of the Government, the Prime Minister, the President, the Parliament, the State Accounting Office. Almost all ministries were attacked, except the Estonian Ministry of Culture, state agencies (e.g. the Estonian Police Board) and the Reform Party. It should be noted that traditional critical infrastructure systems, such as IT systems that support transportation and energy systems, were not targeted. ORIGIN OF ATTACKS According to CERT-EE, the attacks came almost exclusively from sources outside of Estonia. A large part of the attackers were get carried away by nationalistic/political feelings and carried out the attacks according to the instructions they received on specific online media (forums and websites), in the context of what is called patriotic hacking. Although several of the e-mail addresses from which the attacks originated were located in Russia, the official government in Moscow denied any state support, noting that the attackers were ordinary citizens who simply reacted on their own responsibility to the events in Estonia. RESULTS OF ATTACKS Cyber-attacks found common ground in Estonia as the country was digitally advanced and several sectors (economy, trade, industry, etc.) of state operation and commerce relied on information infrastructure and digital channels for daily communication and operation. Cyber-attacks have had a significant impact on: 1. Economy: The attack on digital infrastructures (network servers of major providers and e-mail, etc.) did not only affect large entities such as banks, media and government institutions, but also small and medium enterprises whose daily activities were serious weakened. 2. Society: The country's digital reforms have reduced non-electronic government communication channels and changed the habits of users who now look for information mainly online. Due to the unavailability of government websites and excessive spamming of official e-mail addresses, normal communication with the government weakened for citizens, although due to the temporary blocking of government websites, there were no significant daily problems for the population. 3. Communication: The attacks affected Estonia's information flow to the outside world. Major international media organizations did not have their own stations or correspondents in Estonia, and the Estonian government relied on online media to distribute information, making them prime targets for attacks. FINDINGS FROM THE ATTACKS
  • 4. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant The organization and intensity of the cyber-attacks were of an unprecedented scale, and the conclusions of the investigations brought to light important facts: 1. The attacks had a significant impact on the economic and social functioning of the country, since in order to deal with the cyber-attacks it had to be disconnected from the internet, an action which place the country, which widely used the internet not only for public and private transactions (eGovernance, banking system, communication-media, etc.) but also for providing information at home and abroad, in a very difficult situation. It is estimated that losses from the cost of outage of an Estonian bank's website amounted to 1 million dollars. 2. The Estonian legal framework was outdated in dealing with cyber-attacks with many procedural problems of law enforcement and overlapping jurisdictions. Internationally, the Estonian government attempted to classify cyber-attacks as a military activity invoking NATO Article 5, which was not accepted, resulting in cyber- attacks being treated as Cyber Crimes. 3. There were significant attribution problems, as although for the attacks and their coordination were used computers located in 178 countries appeared to come from Russian territory, there was no tangible evidence to incriminate the Russian government which denied any involvement in the cyber-attacks, claiming they were due to nationalist groups, with which it had no connection. EPILOGUE The cyberattack in Estonia demonstrated for the first time worldwide that, under certain conditions, it is possible in a conflict between states to use cyber capabilities, instead of the traditional pillars of state power (political, economic, diplomatic, military, etc.) with scope as Clausewitz said: the enforcement of policy and will by other means. In this sense, geostrategic and military conflicts acquire a new dimension: the cyber dimension, whose size, potential and impact are difficult to predict. The virtual conflict in Estonia effectively highlighted the ability of cyber operations to cause consequences of strategic magnitude that are immediately visible to the entire population of a country and effectively established cyber defense as a key pillar of national security. REFERENCES 1 CCD COE (2010) Eneken Tikk & others International Cyber Incidents-Legal Considerations 2 CCD COE Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective 3 International Centre for Defence Studies (ICDS) (2007)
  • 5. Russia vs Estonia. First Cyber War (2007) Παπαδάκης Κωνσταντίνος, Αναλυτής Επιχειρήσεων Κυβερνοχώρου-Σύμβουλος Κυβεροάμυνας-Κυβερνοασφάλειας Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Moscow’s Hand in the Tallinn Riots. A Quick Overview by the International Centre for Defence Studies on 7th of May 4 Ottis, R. (2007) Analysis of the Attacker Profiles in the 2007 Cyber Attacks Against Estonia. Unpublished MSc dissertation, Tallinn Technical University, Tallinn 5 Wu, C. (2004) ”An Overview of the Research and Development of Information Warfare in China.” In Edward Halpin et al (eds.) (2006) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave MacMillan, Hampshire, pp 173-195. 6 Mishra, S. (2003) “Network Centric Warfare in the Context of Operation Iraqi Freedom,” Strategic Analysis 27(4) 546-562. INTERNET 1 Konstantin Kosachev (6 Mar 2007) “An insult to our war dead” https://www.theguardian.com/commentisfree/2007/mar/06/comment.secondworldwar 2 Peter Finn-Washington Post, (19 May 2007) “Cyber Assaults on Estonia Typify a New Battle Tactic” https://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html 3 Clover, Charles - Financial Times, 11 March 2009 “Kremlin-backed group behind Estonia cyber blitz”. http://www.ft.com/cms/s/0/57536d5a-0ddc-11de- 8ea3-0000779fd2ac.html?nclick_check=1. 4 IT Pro Rene Millman-1 Jun 2007 https://www.itpro.co.uk/114570/ddos-attacks-on-estonia-not-from-kremlin