Russian hacker 'militia' mobilizes to attack Georgia

Volunteers, botnet owners join forces to knock sites offline, say researchers

Security researchers Tuesday disputed claims that a well-known Russian hacker hosting network is responsible for cyberattacks against sites belonging to Georgia, the former Soviet republic that has been battling Russian military forces since Friday.

Rather than blame the notorious Russian Business Network (RBN) -- as researcher Jart Armin did over the weekend -- other researchers said Tuesday that it appears the attacks originated from a "hacker militia" of Russian botnet herders and volunteers.

"They mobilize themselves without a need for a central location to do so, distribute the targets, discuss the attack approaches, come up with a plan on the coordination, and you have everyone participating," Bulgarian security researcher Dancho Danchev said in an instant messaging interview early Tuesday.

Danchev and others have found evidence that points to a self-starting militia composed of volunteer hackers and cyber criminals who control large-scale bots, or collections of previously-compromised computers, as behind the escalating attacks that have knocked Georgian sites offline.

"A lot of it started with posting on blogs," said Kimberly Zenz, a senior threat analyst with VeriSign's iDefense. "A bunch of youth groups posted something that was almost a manifesto that called on supporter to 'wage an information war' against Georgia."

That call to arms was only one of many, said Zenz and Danchev, both whom noted similarities to the attacks against several hundred Lithuanian Web sites early last month.

But while the forces assembled only appear to be uncoordinated to the untrained eye, they are in fact very coordinated, both researchers argued. In a lengthy blog post, Danchev spelled out the coordinated steps that someone -- or some group -- took to rally the hacker troops and turn them against specific targets.

"In the ongoing Russian versus Georgia cyberwar, we have an indication of lists [of Georgian governmental sites] actively distributed across Russian web forums," said Danchev in the blog entry. He also said there were signs that hackers had been provided simple distributed-denial-of-service (DDoS) tools, and that lists of Georgian sites vulnerable to SQL injection attacks had been circulating.

"Someone is coordinating activities," said Zenz, "by posting on blogs and forums instructions that essentially say 'This is what we're going to do.' But we don't know who's behind that."

That coordination, said Danchev, was sophisticated enough to launch DDoS attacks against one of the most popular hacker forums in Georgia as a preemptive strike. But the attacks weren't entirely successful, since limited retaliations against Russian sites have succeeded. "Georgian hackers, or pro-Georgian hackers, [launched] distributed-denial-of-service [attacks against] RIA Novosti," he said via IM. RIA Novosti is a Moscow-based news service.

The campaign against Georgia is just a sample of what the world should expect when there's armed conflict, said Zenz. "This is what happens," she said, "especially in Russia. Every time something happens, there are attacks. Name any crisis there in the past year, and I can point to a spike in attack traffic."

Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.

More about: Google, iDefense, Tuesday Morning, VeriSign, VIA
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Whitepapers
All whitepapers

Optus must allow customers misled by ad to cancel service

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia