Worm: The First Digital World War

By Mark Bowden

The Conficker trojan horse contaminated its first desktop in November 2008 and inside a month had infiltrated 1.5 million pcs in 195 nations. Banks, telecommunications businesses, and important executive networks (including the British Parliament and the French and German army) have been contaminated. not anyone had ever obvious whatever love it. by way of January 2009 the malicious program lay hidden in not less than 8 million pcs and the botnet of associated pcs that it had created was once large enough that an assault may possibly crash the world.

Surprisingly, the U.S. govt used to be in simple terms vaguely conscious of the danger that Conficker posed, and the duty of mounting resistance fell to disparate yet proficient team of geeks, web marketers, and laptop programmers. They shaped what got here to be known as the Conficker Cabal, and commenced a tireless struggle opposed to the computer virus. but if Conficker’s controllers turned acutely aware that their production was once starting to stumble upon resistance, they all started refining the worm’s code to make it more challenging to track and extra strong trying out the Cabal’s solidarity and get to the bottom of. Will the Cabal lock down the computer virus ahead of it truly is too overdue? video game on.

Worm studies at the interesting conflict among these decided to take advantage of the web and people devoted to guard it.

Show description

Preview of Worm: The First Digital World War PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one manhattan occasions bestseller opposed to All Enemies, former presidential consultant and counter-terrorism professional Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber conflict! each involved American may still learn this startling and explosive publication that gives an insider’s view of White apartment ‘Situation Room’ operations and incorporates the reader to the frontlines of our cyber safeguard.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling desktop safeguard book--fully elevated and updated"Right now you carry on your hand essentially the most winning safety books ever written. instead of being a sideline player, leverage the dear insights Hacking uncovered 6 presents to aid your self, your organization, and your nation struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Improve and enforce an efficient end-to-end protection software Today’s complicated global of cellular systems, cloud computing, and ubiquitous facts entry places new protection calls for on each IT expert. info safety: the entire Reference, moment variation (previously titled community safety: the entire Reference) is the single finished e-book that provides vendor-neutral information on all elements of knowledge safety, with an eye fixed towards the evolving risk panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State-of-the-art concepts for locating and solving severe safeguard flaws improve your community and stay away from electronic disaster with confirmed ideas from a group of defense specialists. thoroughly up-to-date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth version explains the enemy’s present guns, abilities, and strategies and gives field-tested treatments, case stories, and ready-to-deploy checking out labs.

Additional info for Worm: The First Digital World War

Show sample text content

The web nonetheless works . . . :-) actually, anything had occurred. The computer virus did precisely what it was once programmed to do. The requests for guide got here knocking, via the thousands, from the entire bots scattered world wide, to every of the 500 domain names generated for that day, and them all seemed to were shunted towards the sinkhole at Georgia Tech, simply as John Crain and Rick Wesson and the others had prepared. was once this victory? They wouldn’t comprehend for sure for a minimum of a couple of days in the event that they had blocked each strength command situation; and, in fact, no matter if they'd, they'd need to be excellent back day after today, and the next day to come, and the subsequent, and each day thereafter—but that used to be not likely. April 1 used to be simply the 1st day it'd be attainable for the botmaster to factor a command. The Cabal had fixed a ancient, actually heroic attempt to avoid such instructions, yet in simple terms time may inform no matter if the botnet used to be totally contained. And with the entire exposure they'd generated, with everyone on this planet staring at, wouldn’t C-Day be the least most likely day for the undesirable men to make their circulation? Given the wonderful gamesmanship that they had confirmed to date, wouldn’t it make extra experience for them to enable the entire hype simply move pfffft? ship the X-Men an incredible raspberry? Rodney Joffe felt it. He grew more and more incensed in the course of the day with the foolish press insurance. He had began very early in his Phoenix workplace chairing by way of video hookup a three-hour ICANN protection assembly, all of the whereas scanning his e-mail, the place participants of the Cabal have been posting hyperlinks to the mounting hilarity. Rodney flew to San Francisco later that day to provide a conversation, and spent the cocktail hour element of the development railing opposed to fool newshounds. At his suburban New Jersey domestic place of work, Andre DiMino skilled the day as one other coup for the botmaster, who had made all of them glance silly. Andre had given an interview the day earlier than to NBC newshounds for a section to air at the at the present time express, wearing a eco-friendly T-shirt with a mike placing from the collar, cautioning the reporter (who didn’t have a clue what he used to be speaking approximately) that the botnet will possibly not really do something mammoth the subsequent morning, that it will possibly simply generate these types of new domains and start searching for directions; yet then he may perhaps see the Glaze descend. What may well he do concerning the newshounds’ love of doomsday predictions, and their utter loss of technical skillability, let alone their loss of subtlety? His cautionary phrases slipped off into the ether, sandwiched among the trumpets of imminent doom. nonetheless, Andre had saved his eye on his screens via lots of the day . . . simply in case. Very early within the morning, in his Alexandria workplace, monstrous Dre Ludwig was once now not letting this get him down. He were up all evening and used to be feeling self-congratulatory, and a bit tipsy. He wrote to the checklist: My techniques are as follows. This has been an grand attempt from the very begin on either a technical and logistical point. We made large political steps .

Download PDF sample

Rated 4.20 of 5 – based on 21 votes