You are on page 1of 3

CYBERWAR

Cyberwar in Estonia
and the Middle East
Aviram Jenik, chief executive officer, Beyond Security
Aviram Jenik
Recent cyber attacks in the Middle East and particularly Estonia, where the
country was practically brought to a standstill, have illustrated that cyber- overwhelmed, blacking out internet
warfare has now moved firmly from the realms of possibility to reality. access for significant portions of the
Government and military bodies worldwide will doubtless have learned valuable population.
lessons from these recent incidents, but the possibility still exists for major
disruption. In essence, IT-based attacks may have become the weapon of choice
“The attack centred mainly on
for any nation seeking to cause disruption to another and yet maintain a level of
plausible deniability.
small websites which were easy
to knock out, but nevertheless
was devastatingly effective”
Did a member of your family help mandate, the move sparked the worst
launch a cyber attack that brought riots the country had ever seen – and While the Estonian government was
an entire nation to its knees? No, a startling cyber attack from Russia. expecting there to be an online backlash
seriously, don’t laugh. In April 2007, On April 27, as two days of rioting to its decision to move the statue, it
communications in the Baltic state shook the country and the Estonian was completely unprepared for the scale
of Estonia were crippled through a embassy in Moscow found itself under of the cyber attack. Estonia’s defence
coordinated attack that relied on the siege, a massive distributed denial-of- minister went on record to declare the
computers of millions of innocent users service (DDoS) attack overwhelmed attack “a national security situation”,
around the world, just like you and most of Estonia’s internet infrastructure, adding “it can effectively be compared to
your kin. The strike was notable in bringing online activity almost to a when your ports are shut to the sea.”1
fully demonstrating how cyber war had standstill. The targets were not military Once it became clear that most of the
moved from idea to reality. And it all websites but civilian sites belonging to country’s online business infrastructure
started with the movements of a single organisations such as banks, newspapers, was being affected, the Computer
soldier. internet service providers (ISPs), and Emergency Response Team for Estonia
even home users. Much of the onslaught (CERT-EE) issued a plea for help
“Bank websites became came from hackers using ISP addresses from IT security specialists worldwide
unreachable, paralysing most of in Russia, but the most devastating and an ad-hoc digital rescue team was
Estonia’s financial activity” element in the attack was a botnet which assembled, which included people
co-opted millions of previously virus- from my own firm, Beyond Security.
infected computers around the globe to It took us a few days to get to the
The Bronze Soldier is a two-metre pummel the Estonian infrastructure. bottom of the threat and begin setting
statue which formerly stood in a up frontline defences, which mainly
small square in Tallinn, the Estonian Anatomy of a cyber involved implementing BCP 38 network
capital, above the burial site of Soviet ingress filtering techniques across
soldiers lost in the Second World attack affected routers to prevent source address
War. The memorial has long divided The botnet fooled Estonian network spoofing of internet traffic.
the population of the country, with routers into continuously resending The attack waned quickly once we
native Estonians considering it a useless packets of information to started taking defensive measures. But in
symbol of Soviet (and formerly Nazi) one another, rapidly flooding the the days it took to fight off the attack,
occupation and a large minority infrastructure used to conduct all online it is likely that the country lost billions
population (around 25% of the total) business in the country. The attack of euros in reduced productivity and
of ethnic Russian immigrants seeing centred mainly on small websites which business downtime.
it as an emblem of Soviet victory over were easy to knock out, but nevertheless
the Nazis and Russian claims over was devastatingly effective. Bank websites Cyber war in the Middle
Estonia. When the country’s newly became unreachable, paralysing most
appointed Ansip government initiated of Estonia’s financial activity. Press sites East
plans to relocate the statue and the also came under attack, in an attempt The Estonian incident will go down in
remains as part of a 2007 electoral to disable news sources. And ISPs were history as the first major (and hopefully

4
Network Security April 2009
CYBERWAR
FEATURE

biggest ever) example of full-blown cyber thought to have had links to criminal is a reality and the former, in particular,
warfare. However, there is one place on activity in the past, and probably the demonstrates its devastating potential.
earth where cyber war has become part only thing preventing widespread In fairness, Estonia was in some ways
of the day-to-day online landscape – and disruption in this instance was the fact the perfect target for a cyber strike.
it is still ongoing. that Kyrgyzstan’s online services, unlike Emerging from Russian sovereignty
In the Middle East, the Arab- those in Estonia, are poor at the best in the early 1990s with little legacy
Israeli conflict has a significant online of times. It was apparently not the first communications infrastructure,
element, with thousands of attacks and such attack in the country, either.3 It is the nation was able to leapfrog the
counter-attacks a year. This has been claimed there was a politically-motivated developments of western European
the situation since the collapse of peace DDoS in the country’s 2005 presidential countries and establish an economy
talks in the region and was preceded elections, allegedly attributed to a firmly based on online services, such as
by a spontaneous wide-scale cyber war Kyrgyz journalist sympathising with the banking, commerce and e-government.
between Arab and Israeli hackers in opposition party. At the same time, the small size of the
1999 and 2000. Arab sympathisers from country – it is one of the least populous
many nations are involved. A group of “The strike appeared to have in the European Union – meant that
Moroccan hackers have been defacing originated from Russian most of its web sites were similarly
Israeli web sites for the last six years or networks which are thought minor and could be easily overwhelmed
so, and recently Israel’s military radio to have had links to criminal in the event of an attack. Last but
station was infiltrated by an Iraqi hacker. activity in the past” not least, at the time of the Estonian
Unlike the blitzkrieg-like strike in incident, nothing on a similar scale had
Estonia, this protracted warfare is not China has also engaged in cyber been experienced before.
intended to paralyse critical enemy warfare in recent years, albeit on a It is safe to say that other nations will
functions but more to sap morale, drain smaller scale. Hackers from within the now not be caught out so easily. In fact,
resources and hamper the economy. The country are said to have penetrated if anything, what happened in Estonia
targets are typically low-hanging fruit the laptop of the US defence secretary, will have demonstrated to the rest of the
in internet terms: small transactional, sensitive French networks, US and world that cyber weapons can be highly
informational and even homespun German government computers, New effective, and so should be considered
web sites whose security can easily be Zealand networks and Taiwan’s police, a priority for military and defence
compromised. Taking over and defacing defence, election and central bank planning.
these sites is a way of intimidating the computer systems.
opposition – creating a feeling of ‘if In a similar fashion, in 2003 cyber “A 21 000-machine botnet can
they are here, where else might they be?’ pests hacked into the UK Labour Party’s be acquired for ‘just a few
– and leads to significant loss of data, official website and posted up a picture thousand dollars’, a fraction
profits and trust for the site owners. of then US President George Bush of the cost of a conventional
carrying his dog – with the head of Tony weapon”
Cyber war spreads Blair, the Prime Minister of the UK
at the time, superimposed on it.4 The What might make cyber warfare the
If the Estonia and Middle East examples incident drew attention to government tactic of choice for a belligerent state?
were our only experiences of cyber sites’ lax approach to security although There are at least five good reasons. The
warfare then it might be tempting to in this particular event it was reported first is that it is ‘clean’. It can knock
put them down to local factors and that hackers had exploited the fact that out a target nation’s entire economy
therefore not of concern to the wider monitoring equipment used by the site without damaging any of the underlying
security community. Sadly, however, hosting company had not been working infrastructure.
these instances are simply part of a much properly. And as long ago as 2001, The second is that it is an almost
larger trend towards causing disruption animal rights activists were resorting completely painless form of engagement
on digital communications platforms. to hacking as a way of protesting for the aggressor: an attack can be
In January this year, for example, two against the fur trade, defacing luxury launched at the press of a button
of Kyrgyzstan’s four ISPs were knocked brand Chanel’s website with images of without the need to commit a single
out by a major DDoS hit whose authors slaughtered animals.5 soldier.
remain unknown.2 Although details The third reason is cost-effectiveness.
are sketchy, the attack is said to have The case for the defence A 21 000-machine botnet can be
disabled as much as 80% of all internet acquired for ‘just a few thousand dollars’,
traffic between the former Soviet Union What do all these incidents mean a fraction of the cost of a conventional
republic and the west. for policy makers worldwide? Both weapon, and yet can cause damage and
The strike appeared to have originated the Estonian and Middle Eastern disruption easily worth hundreds of
from Russian networks which are experiences show clearly that cyber war times that.6

5
April 2009 Network Security
CYBERWAR

The fourth is that it is particularly issues faced by Estonia and the kinds would be enough to prevent another
difficult for national administrations to of hacker attacks still going on in the Estonia incident. Or would they?
police and protect their online borders. Middle East. There is, unfortunately, another type
A DDoS attack may be prevented simply For DDoS strike avoidance, there are of cyber war strike which we have yet
by installing better firewalls around a four types of defence: to see and which could be several times
web site (for example), but no nation more devastating that what happened
currently has the power to tell its ISPs, s "LOCKING39.FLOODS WHICHARECAUSED in Estonia. Rather than trying to hack
telecommunications companies and when the attacker (for example) spoofs into web sites just to deface them – a
other online businesses that they should the return address of a client machine time-consuming effort with relatively
do this, which leaves the country wide so that a server receiving a connection little payback – this tactic would involve
open to cyber strikes. message from it is left hanging when placing ‘time bombs’ in the web systems
The last but by no means least reason it attempts to acknowledge receipt. concerned. These could be set to lay
is plausible deniability. In none of the s )MPLEMENTING "#0  NETWORK dormant until triggered by a specific
cyber war attacks seen so far has it ingress filtering techniques to guard time and date or a particular event, such
been possible to link the strike with a against forged information packets, as as a given headline in the national news
government authority, and in fact it employed successfully in Estonia. feed. They would then activate and shut
would be almost impossible to do so. In s :OMBIE:APPERS WHICHAREFREE OPEN down their host web site, either using an
the case of the Chinese hack attacks, for source tools that can tell a device (or internal DoS or some other mechanism.
instance, the authorities have provided ‘zombie’) which is flooding a system The code bombs could lay dormant
a defence which amounts to saying: to stop doing so. for long enough for a malicious agency to
‘There are probably a billion hackers on s ,OW BANDWIDTH WEB SITES WHICH crack and infect most or all of the major
our soil and if it was us we would have prevent primitive DDoS attacks web sites of a country. And in today’s
to be stupid to do it from a Chinese IP simply by not having enough capacity networked world, this is no longer about
address.’ to help propagate the flood. simply causing inconvenience. Think of
A similar logic potentially provides the number of essential services, from
absolution to the Russian administration For hacker attacks such as those seen in telephone networks to healthcare systems,
in the case of Estonia: if it is so cheap the Middle East, meanwhile, there are which now rely on internet platforms.
and easy to get a botnet to mount a three main types of defence: Knocking all these out in one go could
DDoS attack, why would the Russians have a truly overwhelming impact on a
bother mounting hack attacks from their s 3CANNINGFORKNOWNVULNERABILITIESIN From page 6
own ISPs? And in the Kyrgyz attack, the system. nation’s defensive capabilities, without
although the source of the DDoS clearly s #HECKINGFORWEBAPPLICATIONHOLES the need for an aggressor to send a single
points to a Russian hand, the motives s 4ESTING THE ENTIRE NETWORK TO DETECT soldier into combat.
for Russia’s involvement remain hazy, the weakest link and plug any potential The means to create such an attack
leading to a suggestion that it may entry points. definitely exist. So do the means to defeat
have been caused by Kyrgyzstan’s own it. What has happened in Estonia and
incumbent party, acting with hired cyber A doomsday scenario? the Middle East shows we now need to
criminals from Russia. consider cyber warfare as a very real threat.
All the above are useful defensive tactics, What could happen if we fail to guard
Tactics for protection but what about strategic actions? First against it really does not bear thinking
and foremost, the Estonian experience about.
With all these advantages, it is unlikely showed that it is important for the local
that any military power worth its CERT to have priority in the event of an
References
salt is by this stage still ignoring the attack, in order to ensure that things can
potential of cyber warfare. In fact, since return to normal as soon as possible. 1. Mark Landler and John Markoff:
the Estonia incident it is even possible Authorities can also as far as possible ‘Digital fears emerge after data siege
that the incidence of cyber warfare check national infrastructures for DoS in Estonia’. New York Times, 29 May
has increased, and we are simply not and DDoS weaknesses,, and finally, 2007.
aware of the fact because the defensive national CERTs can scan all the 2. Danny Bradbury: ‘The fog of cyberwar’.
capabilities of the sparring nations have networks they are responsible for – The Guardian, 5 February 2009.
increased. After all, another important something the Belgian CERT has already 3. Ibid.
lesson from Estonia is that it is possible started doing. Given the openness of the 4. ‘Labour website hacked’. BBC News,
to mount a defence against cyber attacks. internet and the differing challenges and 16 June 2003.
There is no single solution, no silver interests of those operating on it, these 5. ‘The fur flies’. Wired, 23 January 2001.
bullet, but a range of measures can be measures will of course only provide 6. Spencer Kelly: ‘Buying a botnet’. BBC
taken to deal with the kinds of DDoS partial protection. But it is hoped they World News, 12 March 2009.

6
Network Security April 2009

You might also like