Menu
After Attacks, US Government Sending Team to Estonia

After Attacks, US Government Sending Team to Estonia

During the incident, several international organizations helped the tiny country repel the online attacks

Two months after much of Estonia's online infrastructure was targeted by an online attack, the US government is sending cyber investigators to help the Baltic state better understand what happened.

A representative from the US Department of Homeland Security's US-CERT (US Computer Emergency Response Team) division is heading to Estonia to help analyze the large volume of data that was generated by the attacks, said Gregory Garcia, assistant secretary for cyber security and telecommunications with the DHS.

"We are sending someone from our organization ... to help them with forensic analysis and to do some additional training on how to secure their infrastructure," he said.

The data that we have does not speak to who's behind it. There's no smoking gun

Jose Nazario - senior security engineer, Arbor Networks

Additionally, a member of the US Secret Service will be there to help with training on incident response and computer crime investigations, according to a DHS spokesman.

In April 2007, a widespread DDOS (distributed denial of service) attack struck Estonia and affected government and banking Web sites. Early press reports linked the attacks to Russia, exacerbating tensions between the two countries, but investigators now say that it is unclear who exactly was behind the incident.

"The data that we have does not speak to who's behind it. There's no smoking gun," said Jose Nazario, senior security engineer with Arbor Networks, who has studied the attacks.

Unlike other Internet conflicts, the Estonian attacks do not seem to have been backed by a particular hacking group, said Gadi Evron, a security evangelist with Beyond Security Ltd. "They were of immense variety [and came] from the population of the Russian-speaking blogosphere," he said via instant message.

Some attackers ran simple scripts on their PCs, while others trained sophisticated groups of botnet computers at the Estonian systems, Evron said. "Many of the attacks were from fake sources and compromised computers around the world," he added.

During the incident, several international organizations helped the tiny country repel the online attacks, Garcia said.

"This was — at least in the aftermath — a good news story in the sense that Estonia looked to NATO for assistance and together the NATO countries came to the aid of Estonia," Garcia said. "It showed that the relationships we have internationally and across the federal government are paying off so we can respond in real time to attacks that are happening."

Garcia said that members of US-CERT could learn how the US should respond if faced with a similar attack. "It's a little bit more complicated than conventional warfare," he said. "It's a little difficult to trace back where a particular attack is coming from, which makes it more difficult to respond."

Arbor Networks' Nazario agreed that investigators will get a much clearer picture of how the attacks evolved over time. "They can basically learn what ... technologies and what techniques worked under those attacks," he said.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Arbor NetworksBeyond SecurityCERT AustraliaComputer Emergency Response TeamNATOVIA

Show Comments
[]