A cyber attack two months ago that targeted much of Estoniaโs online infrastructure has resulted in the U.S. government sending cyber investigators to the Baltic state to assist them in understanding what went wrong.
A representative from the U.S. Department of Homeland Securityโs US-CERT (U.S. Computer Emergency Response Team) division is heading to Estonia this week to help analyze the large volume of data that was generated by the attacks, said Gregory Garcia, assistant secretary for cyber security and telecommunications with the DHS.
โWe are sending someone from our organizationโฆto help them with forensic analysis and to do some additional training on how to secure their infrastructure,โ he said.
Additionally, a member of the U.S. Secret Service will be there to help with training on incident response and computer crime investigations, according to a DHS spokesman.
In April, a widespread DDOS (distributed denial of service) attack struck Estonia and affected government and banking Web sites. Early press reports linked the attacks to Russia, exacerbating tensions between the two countries, but investigators now say that it is unclear who exactly was behind the incident.
โThe data that we have does not speak to whoโs behind it. Thereโs no smoking gun,โ said Jose Nazario, senior security engineer with Arbor Networks Inc., who has studied the attacks.
Unlike other Internet conflicts, the Estonian attacks do not seem to have been backed by a particular hacking group, said Gadi Evron, a security evangelist with Beyond Security Ltd .
โThey were of immense variety [and came] from the population of the Russian-speaking blogosphere,โ he said via instant message.
Some attackers ran simple scripts on their PCs, while others trained sophisticated groups of botnet computers at the Estonian systems, Evron said.
โMany of the attacks were from fake sources and compromised computers around the world,โ he added.
During the incident, several international organizations helped the tiny country repel the online attacks, Garcia said.
โThis was โ at least in the aftermath โ a good news story in the sense that Estonia looked to NATO for assistance and together the NATO countries came to the aid of Estonia,โ Garcia said. โIt showed that the relationships we have internationally and across the federal government are paying off so we can respond in real time to attacks that are happening.โ
Garcia said that members of US-CERT could learn how the U.S. should respond if faced with a similar attack.
โItโs a little bit more complicated than conventional warfare,โ he said. โItโs a little difficult to trace back where a particular attack is coming from, which makes it more difficult to respond.โ
Arbor Networksโ Nazario agreed that investigators will get a much clearer picture of how the attacks evolved over time.
โThey can basically learn whatโฆtechnologies and what techniques worked under those attacks,โ he said.
Related content:
Cyber crisis test sends Feds back to security school
Report says U.S. still open to cyber attack