Georgia-Russia conflict (2008)

From International cyber law: interactive toolkit
Revision as of 23:58, 25 March 2019 by Exeter951 (talk | contribs) (editing real world examples)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


Date During the Russian-Georgian conflict throughout July-August 2008
Suspected actor The Georgian authorities accused Russia of the attack, but the Russian government denied the allegations but admitted that it was possible that "individuals in Russia or elsewhere had taken it upon themselves to start the attacks".[1] However, multiple experts found hints that the attacks were launched by a group known as the 'Russian Business Network' that has close ties to the Russian government.[2]
Target A number of government websites was targeted. The website of the Georgian President was taken down and then later defaced. The websites of the Georgian Parliament, of the Foreign Affairs Ministry, the Ministry of Defence as well as those of several Georgian news agencies and commercial entities were taken down.
Method The websites were brought offline as the result of the DDos attacks on the servers. Other websites were defaced showing images comparing the Georgian President with Adolf Hitler. The sites of several news agencies were also under external control facing disruptions and showing different content than intended.
Purpose The cyber attacks were seen as part of Russia's warfare in the armed conflict between the two countries. Whilst the cyber attacks were not decisive for the outcome of the armed conflict, the position of the Georgian government was significantly weakened and created the time and space for Russia to shape the international narrative of the conflict.[3]
Result During the conflict, the Georgian sites were temporarily available as their traffic was re-reouted through German servers run by Deutsche Telekom. However, the communication in the country was severely disrupted. The attack significantly restricted the government’s ability to react by spreading its message online and to connect with foreign governments around the world during the fighting with Russia.
Aftermath After the events in Estonia, this incident is often cited as one of the first examples where offensive cyber attacks were part of synchronized kinetic military operations.
Analysed in Scenario 13