Register for an account


Enter your name and email address below.

Your email address is used to log in and will not be shared or sold. Read our privacy policy.


Website access code

Enter your access code into the form field below.

If you are a Zinio, Nook, Kindle, Apple, or Google Play subscriber, you can enter your website access code to gain subscriber access. Your website access code is located in the upper right corner of the Table of Contents page of your digital edition.


#48: Cyber Attacks May Be Connected With Real War

As tensions with Russia mounted, Georgia got slammed by hackers.

By Noah ShachtmanDecember 13, 2008 6:00 AM
iStockphoto | NULL


Sign up for our email newsletter for the latest science news

Almost three weeks before the shooting war between Russia and Georgia began last August, online attackers started assaulting Georgia’s Web sites. Months after the cease-fire, the attackers’ identities remain a mystery. What is known suggests widespread vulnerability to such elusive attackers.

In July the foreign ministry’s Web site was defaced with a slide show comparing Georgia’s president to Hitler. In August hundreds of thousands of computers were taken over and linked into “botnets” that overloaded Georgian servers with junk traffic, hampering the nation’s efforts to communicate.

Georgian officials blamed the Russian government, but online attacks are notoriously hard to pinpoint. Hackers take circuitous paths to their targets, masking their origins.

Then the Russian Business Network, a shadowy Moscow cyber- criminal group, came under suspicion in media reports. The group disbanded more than a year ago, but cyber-security watchdogs claim that many of the same people, under a different name, were involved in these attacks. Finally, a journalist reporting in Slate discovered for himself how easy it was to wreak cyber-havoc. Simple, downloadable scripts allowed anyone to join the online pile-on.

Bill Woodcock, research director with the Internet infrastructure group Packet Clearing House, is cautious about assigning blame. “You’ll never be able to establish who was sitting in front of a computer from which an attack originates,” he says.

3 Free Articles Left

Want it all? Get unlimited access when you subscribe.


Already a subscriber? Register or Log In

Want unlimited access?

Subscribe today and save 70%


Already a subscriber? Register or Log In