Skip to Main Content
Cyber Operations
book

Cyber Operations

by Jerry M. Couretas
April 2024
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 58m
English
Wiley
Content preview from Cyber Operations

15Russian Cyber Operations and Tools

15.1 Russian Cyber Operations and Tools

As discussed in Chapter 5, Russia deploys a full spectrum of cyber operations, from IO to system‐level manipulation. From a technical standpoint, as discussed in Section I, the Russian Federation monitors its Internet and telecommunications through SORM (e.g., SORM‐3 (Lewis, 2014)). Additional cyber operations infrastructure is provided by contractors, from cyber tool developers to networking gear.

15.1.1 Example Operations’ Attack Paths

Due to the long history of Russian cyber operations, we have attack paths for both the attempted penetration of the U.S. Star Wars’ missile defense program in the 1980s and Operation Moonlight Maze in the 1990s. The Star Wars’ attack was documented in detail by Clifford Stoll in his book “The Cuckoo’s Egg” (Stoll, 2005).

15.1.1.1 U.S. Star Wars Missile Defense

In the late 1980s, German hackers, working on behalf of the Former Soviet Union’s KGB, penetrated the Lawrence Berkeley Lab’s computer network in an attempt to get information on the U.S. Star Wars missile defense program portfolio (Section 9.1.1.1). This is an excellent description of how an international hack works, with technical information that includes

  • keystroke logging to monitor attacker behavior
  • honey files to deceive and track a cyber attacker
  • honey tokens to track a cyber attacker
  • network diagrams to show the attacker’s path

As shown in Figure 15.1, “The Cuckoo’s Egg” also provides an early example ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition

Jeffrey Caruso
Cyber Threat Hunting

Cyber Threat Hunting

Nadhem AlFardan
Practical Cyber Intelligence

Practical Cyber Intelligence

Adam Tilmar Jakobsen

Publisher Resources

ISBN: 9781119712091Purchase Link