OverDrive would like to use cookies to store information on your computer to improve your user experience at our Website. One of the cookies we use is critical for certain aspects of the site to operate and has already been set. You may delete and block all cookies from this site, but this could affect certain features or services of the site. To find out more about the cookies we use and how to delete them, click here to see our Privacy Policy.
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
Due to publisher restrictions the library cannot purchase additional copies of this title, and we apologize if there is a long waiting list. Be sure to check for other copies, because there may be other editions available.
Due to publisher restrictions the library cannot purchase additional copies of this title, and we apologize if there is a long waiting list. Be sure to check for other copies, because there may be other editions available.
Excerpts-
From the book
CHAPTER 1
EARLY WARNING
Sergey Ulasen is not the sort of person you’d expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmother’s country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.1
It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus–BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.
Not only was it using a skillful rootkit to cloak itself and make it invisible to antivirus engines, it was using a shrewd zero-day exploit to propagate from machine to machine—an exploit that attacked a function so fundamental to the Windows operating system, it put millions of computers at risk of infection.
Exploits are attack code that hackers use to install viruses and other malicious tools onto machines. They take advantage of security vulnerabilities in browser software like Internet Explorer or applications like Adobe PDF Reader to slip a virus or Trojan horse onto a system, like a burglar using a crowbar to pry open a window and break into a house. If a victim visits a malicious website where the exploit lurks or clicks on a malicious e‑mail attachment containing an exploit, the exploit uses the security hole in the software to drop a malicious file onto their system. When software makers learn about such holes in their products, they generally produce “patches” to close them up and seal the intruders out, while antivirus firms like Ulasen’s add signatures to their scanners to detect any exploits that try to attack the vulnerabilities.
Zero-day exploits, however, aren’t ordinary exploits but are the hacking world’s most prized possession because they attack holes that are still unknown to the software maker and to the antivirus vendors—which means there are no antivirus signatures yet to detect the exploits and no patches available to fix the holes they attack.
But zero-day exploits are rarely found in the wild. It takes time and skill for hackers to discover new holes and write workable exploits to attack them, so the vast majority of hackers simply rely on old vulnerabilities and exploits to spread their malware, counting on the fact that most computer users don’t often patch their machines or have up-to-date antivirus software installed, and that it can take vendors weeks or months to produce a patch for a known hole. Although more than 12 million viruses and other malicious files are captured each year, only about a dozen or so...
About the Author-
KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.
Reviews-
Starred review from September 8, 2014 Cyberwarfare catapulted from science fiction into reality in 2010, when a previously unknown military-grade computer virus attacked centrifuges in Iran that were allegedly being used to enrich uranium for nuclear bombs. Zetter (Simple Kabbalah), a senior writer for Wired magazine, details how a series of clues led a small but intrepid group of computer security specialists from around the world to discover Stuxnet, the world’s first “zero-day exploit,” a virus without a patch. The origins of the virus were eventually traced to the U.S. and Israel, and though the allies frustrated Iran’s efforts to acquire a nuclear weapon, unleashing the virus was “remarkably reckless,” Zetter argues. Stuxnet and its successors have compromised trusted components of the international computer world, like digital certificates and security updates, and have drawn unwelcome attention to vulnerable U.S. energy, water, and transportation infrastructures. Zetter suggests that the Stuxnet attack has opened up a digital Pandora’s box, “legitimizing” a new strain of warfare against which there is little defense and inciting an arms race carried on behind the scenes. Even readers who can’t tell a PLC from iPad will learn much from Zetter’s accessible, expertly crafted account, which unpacks this complex issue with the panache of a spy thriller. Agent: David Fugate, LaunchBooks Literary Agency.
Washington Post
"Immensely enjoyable...Zetter turns a complicated and technical cyber- story into an engrossing whodunit...The age of digital warfare may well have begun."
Economist
"An authoritative account of Stuxnet's spread and discovery...[delivers] a sobering message about the vulnerability of the systems--train lines, water-treatment plants, electricity grids--that make modern life possible."
Wall Street Journal
"Exhaustively researched...Zetter gives a full account of this "hack of the century," as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion
"Part detective story, part scary-brilliant treatise on the future of warfare...an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America--and the world--are sure to be facing over the coming years."
Publishers Weekly (starred)
"Unpacks this complex issue with the panache of a spy thriller...even readers who can't tell a PLC from an iPad will learn much from Zetter's accessible, expertly crafted account."
Kirkus
"A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come...Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors... Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you."
Bruce Schneier, author of Secrets and Lies and Schneier on Security
"An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
Title Information+
Publisher
Books on Tape
OverDrive Listen
Release date:
OverDrive MP3 Audiobook
Release date:
Digital Rights Information+
OverDrive MP3 Audiobook
Burn to CD:
Permitted
Transfer to device:
Permitted
Transfer to Apple® device:
Permitted
Public performance:
Not permitted
File-sharing:
Not permitted
Peer-to-peer usage:
Not permitted
All copies of this title, including those transferred to portable devices and other media, must be deleted/destroyed at the end of the lending period.
Please update to the latest version of the OverDrive app to stream videos.
Device Compatibility Notice
The OverDrive app is required for this format on your current device.
Bahrain, Egypt, Hong Kong, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, Palestine, Qatar, Saudi Arabia, the Sudan, the Syrian Arab Republic, Tunisia, Turkey, the United Arab Emirates, and Yemen
You've reached your library's checkout limit for digital titles.
To make room for more checkouts, you may be able to return titles from your Checkouts page.
Excessive Checkout Limit Reached.
There have been too many titles checked out and returned by your account within a short period of time.
Try again in several days. If you are still not able to check out titles after 7 days, please contact Support.
You have already checked out this title. To access it, return to your Checkouts page.
This title is not available for your card type. If you think this is an error contact support.
There are no copies of this issue left to borrow. Please try to borrow this title again when a new issue is released.
| Sign In
You will be prompted to sign into your library account on the next page.
If this is your first time selecting “Send to NOOK,” you will then be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."
The first time you select “Send to NOOK,” you will be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."
You can read periodicals on any NOOK tablet or in the free NOOK reading app for iOS, Android or Windows 8.