12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SILENCING NOVAYA GAZETA AND OTHER RUSSIAN DISSIDENTS47was able <strong>to</strong> successfully defend them from a DDoS attack, whereas 55% stated that theirInternet connections were shut down instead. It is possible that smaller Internet providers,with a low profit margin, could view independent media and human rights groups as clientswhose political positions potentially lead <strong>to</strong> higher costs than profitable when it comes <strong>to</strong>maintaining their Internet presence.The Harvard researchers also interviewed a dozen of the administra<strong>to</strong>rs of sites that hadexperienced cyber attacks. The interviews show that many assaults take on the form of hybridattacks, in which DDoS is paired with a different form of attack. For example, in the anonymoussurvey results of Zuckerman et al., according <strong>to</strong> one system administra<strong>to</strong>r, a dissident organizationexperienced a DDoS attack followed by an attempted ex<strong>to</strong>rtion in which he was pressed<strong>to</strong> retract a particular s<strong>to</strong>ry (according <strong>to</strong> the system administra<strong>to</strong>r, the organization refused <strong>to</strong>comply). Another interviewee reported the occurrence of not only high-volume multigigabitDDoS assaults but also the harassment of individual users of the site, on which additionallyinflamma<strong>to</strong>ry information was posted in an effort <strong>to</strong> trigger government persecution. Anotheradministra<strong>to</strong>r reported a creative style of denial of service, where the attacker had hacked in<strong>to</strong>the system and modified the Web site <strong>to</strong> display fake antivirus messages <strong>to</strong> the users in anattempt <strong>to</strong> scare them from accessing the site. These fake antivirus messages also containedlinks that initiated the download of malware that conceivably might have comprised Trojansallowing the attacker access <strong>to</strong> the visiting individual’s computer systems as well. 4The interviews by the Harvard researchers also showed that the site administra<strong>to</strong>rs hada strong belief that their national government was ultimately responsible for the attacks.However, none of those interviewed had any clear evidence indicating that this was the case.Despite the lack of evidence, there are some interesting indica<strong>to</strong>rs that their suppositionswere right. For instance, an interviewee from Vietnam pointed out a press report of aVietnamese military official claiming responsibility for the attack. Another Vietnameseadministra<strong>to</strong>r reported that his national government often filtered his site, but lifted thismeasure <strong>to</strong> constrain traffic just in time for a major DDoS attack <strong>to</strong> hit the site. He claimedthat the assault was later attributed <strong>to</strong> a botnet. An Iranian administra<strong>to</strong>r reported that aDDoS attack against his Web site was traced back <strong>to</strong> a site hosting the official governmentnewspaper. It appeared that third-party visi<strong>to</strong>rs of the newspaper Web site inadvertentlytriggered a Javascript (computer code embedded as a part of a Web page) that flooded theopposition group’s Web presence with requests and eventually shut it down. 5The small size of providers catering <strong>to</strong> dissident groups and independent media makethem particularly vulnerable <strong>to</strong> DDoS attacks. A cyber-capable government or its skillful supporterscan easily take a dissident site offline for a week or more at a time. In the remainderof this chapter, we describe specific case studies of cyber attacks targeting dissident groups,particularly in Russia and Iran.SILENCING NOVAYA GAZETA AND OTHER RUSSIAN DISSIDENTSNovaya Gazeta b is a Russian newspaper known for its investigations in<strong>to</strong> official corruption,human rights abuses, and illicit government affairs. 6 One of its most prominent staff membersb An English-language version of the medium is available under http://en.novayagazeta.ru/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!