Customers Also Bought
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firm s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the world s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet s planning, execution, and discovery, covering its genesis in the corridors of Bush s White House and its unleashing on systems in Iran and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today s flourishing zero-day grey markets, in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike and shows us just what might happen should our infrastructure be targeted by such an attack.
Propelled by Zetter s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war."
- ISBN-13: 9780770436179
- ISBN-10: 077043617X
- Publisher: Crown Publishing Group (NY)
- Publish Date: November 2014
- Page Count: 448
- Dimensions: 9.88 x 6.29 x 1.46 inches
- Shipping Weight: 1.48 pounds
Publishers Weekly® Reviews
- Reviewed in: Publishers Weekly, page .
- Review Date: 2014-09-08
- Reviewer: Staff
Cyberwarfare catapulted from science fiction into reality in 2010, when a previously unknown military-grade computer virus attacked centrifuges in Iran that were allegedly being used to enrich uranium for nuclear bombs. Zetter (Simple Kabbalah), a senior writer for Wired magazine, details how a series of clues led a small but intrepid group of computer security specialists from around the world to discover Stuxnet, the world’s first “zero-day exploit,” a virus without a patch. The origins of the virus were eventually traced to the U.S. and Israel, and though the allies frustrated Iran’s efforts to acquire a nuclear weapon, unleashing the virus was “remarkably reckless,” Zetter argues. Stuxnet and its successors have compromised trusted components of the international computer world, like digital certificates and security updates, and have drawn unwelcome attention to vulnerable U.S. energy, water, and transportation infrastructures. Zetter suggests that the Stuxnet attack has opened up a digital Pandora’s box, “legitimizing” a new strain of warfare against which there is little defense and inciting an arms race carried on behind the scenes. Even readers who can’t tell a PLC from iPad will learn much from Zetter’s accessible, expertly crafted account, which unpacks this complex issue with the panache of a spy thriller. Agent: David Fugate, LaunchBooks Literary Agency. (Nov.)