DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchov

DDEFCONConference
396,000
4,919 views
111 likes
2 months ago
20:47

Description

This presentation tracks the evolution of Russian cyber-military operations from the 2007 Estonia DDoS attacks to the 2022 invasion of Ukraine. It details how the Russian state integrates BGP hijacking, electronic warfare, and information operations with kinetic military actions.

Title: Mapping the Shadow War: The Decade-Long Evolution of Russian Cyber-Military Doctrine

Introduction In the realm of modern conflict, the line between digital and physical warfare has blurred into a single, cohesive 'Shadow War.' At DEF CON 33, Evgueni Erchov, a seasoned threat intelligence expert and former US Army officer, delivered a chilling analysis of how Russian cyber operations have evolved from simple digital nuisances into integrated military components. This isn't just about hackers in dark rooms; it is about the calculated fusion of kinetic destruction, electronic warfare, and state-mandated infrastructure control. Understanding this evolution is critical for security researchers and defenders who must now contend with adversaries that treat the internet as a physical battlefield. In this post, we will explore the historical milestones of this doctrine and the technical mechanisms Russia uses to maintain dominance.

Background & Context The concept of cyber warfare has shifted significantly since the early 2000s. Initially viewed as a tool for espionage or occasional vandalism, it has now become a foundational element of the Russian 'Gerasimov Doctrine'—a strategy that emphasizes non-military means to achieve strategic goals. The risk assessment today is higher than ever; as Erchov notes, the tactics used in regional conflicts like Georgia and Crimea are effectively testbeds for techniques that can be applied globally. The core of this strategy rests on the ability to isolate an adversary, control their information flow, and demoralize their population through targeted digital and physical strikes.

Technical Deep Dive

Understanding the Vulnerability: BGP Hijacking and SORM One of the most potent weapons discussed by Erchov is the malicious use of BGP (Border Gateway Protocol) hijacking. While BGP hijacks often occur due to configuration errors, the Russian state uses them as a strategic tool. By announcing fake routes, they can redirect a target country's traffic through Russian-controlled ASN nodes. Once the traffic enters Russian territory, it falls under the jurisdiction of the SORM (System for Operational-Search Measures) platform. The Yarovaya Law (Yarevaya Log) mandates that all Russian ISPs must retain metadata for up to six years and provide decryption keys to the FSB upon request. This combination means that if your traffic passes through Russia via a BGP hijack, you must assume that all encrypted communications are transparent to their intelligence services.

Step-by-Step Evolution of Exploitation

  1. Estonia (2007): The primary tactic was DDoS (Distributed Denial of Service). By crowdsourcing criminals and providing automated tools, they successfully jammed Estonian infrastructure, demonstrating that digital isolation could have real-world economic impacts, such as disabling ATM networks.

  2. Georgia (2008): Tactics evolved to include kinetic strikes. Russia physically destroyed communication towers while simultaneously using BGP hijacks to route internal traffic through Russian servers. This was the first time we saw the total control of a sovereign nation's digital perimeter.

  3. Crimea (2014): The focus shifted to Electronic Warfare (EW). Russia deployed satellite jammers and radio-frequency interference to isolate military units from their headquarters. They leveraged SORM-3 compliant infrastructure that was already in place for the Sochi Olympics to monitor and intercept local communications.

  4. Ukraine (2022): Modern techniques now include Deepfakes for information operations and specialized hardware hacking. Erchov detailed a fascinating method where Russian forces trojanized Android devices left on the battlefield. When Ukrainian troops recovered and used these devices to manage Starlink or Viasat terminals, the malware allowed the Russians to compromise the satellite connections.

Tools and Techniques The primary 'tools' of the shadow war are not just software scripts but state-level infrastructure. SORM acts as the ultimate interceptor, while electronic warfare units provide the 'denial' phase of service. On the software side, groups like Turla have been observed updating certificates on target machines via Russian-controlled infrastructure, making man-in-the-middle attacks nearly impossible to detect for the average user.

Mitigation & Defense Defending against state-sponsored infrastructure control requires a shift in how we view trust. Organizations should implement robust monitoring for BGP route changes and avoid routing sensitive data through untrusted geopolitical regions. Furthermore, the reliance on biometric data for authentication is a growing risk; while passwords can be changed, facial and fingerprint data are permanent once compromised by deepfake or intercept technologies. Defenders must move toward post-quantum encryption and multi-layered hardware authentication that does not rely on local ISP integrity.

Conclusion & Key Takeaways The 'Shadow War' is a testament to the fact that cyber security is no longer just a technical discipline—it is a geopolitical one. The evolution from the 2007 Estonian DDoS to the 2022 Starlink terminal compromises shows a clear trajectory toward total information dominance. The key takeaway is simple: trust nothing that traverses a network you do not control. As threat actors migrate globally and potentially collaborate with other criminal entities, the techniques mapped by Erchov will likely spread. Stay vigilant, monitor your routes, and treat your metadata with the same security priority as your most sensitive secrets.

AI Summary

In this DEF CON 33 Recon Village presentation, Evgueni Erchov, a Senior Director of Research and Threat Intelligence, provides a comprehensive mapping of Russian cyber operations over the last 15 years. Erchov, leveraging his background as a former US Army Cyber Threat Intelligence Officer, analyzes the strategic shift in how Russia combines digital attacks with physical military operations. The timeline begins with the 2007 attacks on Estonia, which focused on using crowdsourced cybercriminals to launch massive DDoS attacks. This operation successfully isolated the country, disrupting news outlets and ATM networks, and served as a proof of concept for remote disruption. The talk moves to the 2008 invasion of Georgia, where Russia evolved its tactics by incorporating kinetic attacks on communication towers and implementing BGP (Border Gateway Protocol) hijacking. This allowed them to route Georgian internet traffic through Russian infrastructure, providing full visibility and control over communications. Erchov highlights the critical role of the SORM (System for Operational-Search Measures) platform and the Yarovaya Law, which requires Russian ISPs to retain metadata and provide encryption keys to the FSB. He emphasizes that BGP hijacking is a powerful tool in Russia's arsenal precisely because of this state-controlled infrastructure. The analysis continues through the 2014 annexation of Crimea, where Russia utilized advanced electronic warfare (EW) to jam satellite and radio communications, further isolating defenders. Finally, the presentation covers the 2022 invasion of Ukraine, detailing the use of deepfake technology to spread misinformation and the sophisticated compromise of Viasat and Starlink terminals. A key takeaway is the 'Great Migration' of cybercriminals fleeing the conflict zone, which may lead to new collaborations with international cartels and a shift in the global threat landscape. Erchov concludes with a warning about the future of biometric data security and the necessity of assuming all communications are compromised when traversing Russian-influenced infrastructure.

More from this Playlist

DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov
43:37
Science & Technologyresearch-presentationhybridhumint
DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald Pellegrino
41:12
Science & Technologyresearch-presentationhybridosint
DEF CON 33  Recon Village -  A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson
22:01
Science & Technologyresearch-presentationhybridwebmethods
DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa
23:21
Science & Technologyresearch-presentationtechnical-deep-diveai
DEF CON 33 Recon Village - Discord OSINT - Zach Malinich
37:49
Science & Technologyresearch-presentationhybriddiscord
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in