Monday, October 29, 2007

Putting Pieces of a Puzzle Together

Stories that make me feel all warm and fuzzy inside:

Ex-spook cult now running most of Russian politics


Russian political life has been usurped by "siloviki" -- ex-spies -- who have apparently seized power from the small network of hyper-rich plutocratic "bankers" who rose to power after the Wall came down. The siloviki are a tight mafiyeh whose methods include high-profile international assassination of defectors (the assassins walk free and then run for high office).

Virtually all key positions in Russian political life -- in government and the economy -- are controlled by the so-called "siloviki," a blanket term to describe the network of former and current state-security officers with personal ties to the Soviet-era KGB and its successor agencies. The unexpected replacement of former Prime Minister Mikhail Fradkov by former Federal Financial Monitoring Service Director Viktor Zubkov is the latest consolidation of this group's grip on power in Russia. Although Zubkov is not an intelligence officer by background, he has become one de facto during his years at the Financial Monitoring Service, and he has intimate knowledge of where the country's legal and illegal assets are to be found.

The core of the siloviki group, led by former KGB officer and Federal Security Service (FSB) Director Vladimir Putin himself, comprises about 6,000 security-service alumni who entered the corridors of power during Putin's first term. Now, as Putin's second term winds down, their clout is virtually unassailable. Their locus of power is in the presidential administration: deputy chief of staff Igor Sechin cut his teeth in the KGB's First Main Directorate, which oversaw foreign intelligence operations and has since been transformed into the Foreign Intelligence Service (SVR). Fellow deputy chief of staff Viktor Ivanov worked for the KGB's main successor organization, the FSB, which is responsible for counterintelligence operations.
Full story here.

and more:
StormWorm botnet lashes out at security researchers


The Storm Worm botnet (thought to be the largest network of compromised machines in the world) has begun to figure out which security researchers are trying to disrupt its command-and-control systems and knock them offline with unmanagable crapfloods from its zillions of zombie machines.

The worm can figure out which users are trying to probe its command-and-control servers, and it retaliates by launching DDoS attacks against them, shutting down their Internet access for days, says Josh Korman, host-protection architect for IBM/ISS, who led a session on network threats.

"As you try to investigate [Storm], it knows, and it punishes," he says. "It fights back."

As a result, researchers who have managed to glean facts about the worm are reluctant to publish their findings. "They're afraid. I've never seen this before," Korman says. "They find these things but never say anything about them."

And not without good reason, he says. Some who have managed to reverse engineer Storm in an effort to figure out how to thwart it have suffered DDoS attacks that have knocked them off the Internet for days, he says.

As researchers test their versions of Storm by connecting to Storm command-and-control servers, the servers seem to recognize these attempts as threatening. Then either the worm itself or the people behind it seem to knock them off the Internet by flooding them with traffic from Storm's botnet, Korman says.
Full story here.

No comments: