Feeds

Cyberwarriors on the Eastern Front: In the line of fire packet floods

Former senior Estonian defence official talks cyberwar

High performance access to file storage

Clueless spotters green-lit porn site for cyber carpet bombing

Just one person, an ethnic-Russian Estonian national, has been charged and convicted of the attack. Dmitri Galushkevich, 20, was fined the local equivalent of $1,200 after he was convicted of attacks against the Reform Party of Estonian Prime Minister Andrus Ansip.

"He was not accountable as an organiser but a schoolboy providing targets via chat forums," Almann explained, adding in some instances the attackers were misdirected by their spotters on the ground.

One wave of attacks, for example, took out an adult entertainment (porn) website instead of an Estonian state security site.

Estonia's analysis of the attacks reveals that small-scale ping attacks, used to carry out reconnaissance of targets, preceded the main assaults, which came in phases. "The main phase of the attack involved voluntary political botnets, predominately located in Russia, which Almann described as "easy to block", as well as assaults of growing sophistication from compromised machines around the world.

The attacks against Estonia, the first of their kind on a country-wide level, have been studied intensively by military planners since. In 2008, cyberattacks on Georgian websites and communication facilities accompanied a ground war between Russia and Georgia.

Estonia, along with Poland, stepped in to offer backup hosting of Georgian government website. Almann argues this process needs to be more organised. "We need pan-European backup hosting for critical websites," he said.

Rules of engagement

Almann reckons that rules for the investigation of cyberattacks need to be established by more countries signing up to the Council of Europe Convention on Cybercrime. Russia and China and several other key countries have not signed the treaty while some countries in Europe, including the UK, have signed but not ratified the regulations.

Russia might be encouraged to sign the treaty by making it a condition of World Trade Organisation negotiations, he suggested, adding the issue of cyberconflict ought to be on the agenda of G8 talks that include Russia and the world's seven biggest economies.

Some observers have suggested that a Geneva Convention for cyberwar might be needed, an idea Almann regards as a non-starter even though he's equally adamant that cyberwar is all too real.

"With applications such as Stuxnet attacks are growing more sophisticated," Almann said. "There are really serious capabilities out there."

"However banning the use of cyberweapons is not realistic. Cyberwar is out there and everybody is involved."

Offence is the best form of attack

Plenty of governments talk about boosting the capability of their cyber-defences but very few, at least publicly, talk about cyber-offensive capabilities. Cyber-offensive capabilities might involve attacking a particular botnet of compromised PCs or disrupting the communication channels an enemy is using to co-ordinate attacks. Almann reckons most countries are developing cyber-offensive capabilities. "Sovereign nations need the capability. It's unavoidable," he said.

However establishing rules to govern the use of such weapons is something else, in Almann's opinion.

"A Geneva Convention for cyberwar is not going to work," he said. "I'm a lawyer and I wouldn't know what to write. The field is so fast-developing that you are going to get it wrong.

"This is not burning issue and shouldn't divert attention from dealing with shortcomings of critical national infrastructure systems," he added.

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.