Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet
Rate it:
Open Preview
Kindle Notes & Highlights
2%
Flag icon
former White House cybersecurity advisor Richard Clarke published a book devoted to cyberwar, warning that planes could fall from the sky with a concerted attack on air-traffic control.
43%
Flag icon
they would investigate the technical infrastructure of the company. If it had its own domain name server, that would have to be attacked first, to stop the company from switching the numeric address behind the website. They also looked for parts of the website where bots could chew up the most resources, such as internal search pages, pages requiring authorization to use, and pages offering downloads.
43%
Flag icon
To cover themselves during the reconnaissance effort, the ring’s leaders would investigate potential targets with several hundred bots, confusing any search for the location of the real person. The spy would connect from his Internet service provider to an encrypted virtual private network (VPN), a kind of secure tunnel most common in large corporations with employees in the field. The VPN would take them to a bot, and only from there would the extortionists connect to the target. The eventual attacks would use “rooms” in IRC channels that had a thousand bots each.
48%
Flag icon
After examining the computers operating the infectious sites, the forensics team finally worked out what made them so effective. For most visitors, including the sleuths, the sites appeared normal and harmless. But Bra1n had a friend in St. Petersburg who could hack into domain name servers and “poison” them, sending surfers seeking one site to a different one instead. If they agreed to pick Nike.com, for example, most people typing in that address would have gone to any of a large number of domain name servers and then to the right place. But if they happened to stumble on one of the poisoned ...more
This highlight has been truncated due to consecutive passage length restrictions.
51%
Flag icon
WHILE CARDERPLANET WAS WREAKING havoc on a global scale, Shadowcrew was doing major damage in the U.S. Shadowcrew grew out of the collaboration of two very different men, a Scottsdale (Arizona) Community College business student in his early twenties named Andrew Mantovani and a former mortgage broker in New Jersey nearly twice his age, David Appleyard.
54%
Flag icon
That, sadly, is not the worst of it. Hacker CumbaJohnny had been helping run Shadowcrew, while his real-life alter ego, Albert Gonzalez, was helping the Secret Service track what happened there. But the same man had a third identity, “Segvec.” Federal agents knew Segvec was bad, they just didn’t know he was one of their own. In filings against e-Gold, they described customer Segvec as a known Ukrainian carder. In reality, the Secret Service later admitted, Segvec was the young Cuban American who had been aiding their Shadowcrew probe since 2003. All the while, Gonzalez and two young men in ...more