Alexander

77%
Flag icon
It is unclear how long the North Korean hacking team spent planning what the United States later charged was an “indiscriminate” attack on hundreds of thousands of computers, many in hospitals and schools. But it is clear how the hackers got inside: with some vulnerabilities in Microsoft software stolen from the NSA by the Shadow Brokers group. It was the ultimate cascading crime: the NSA lost its weapons; the North Koreans shot them back.
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
Rate this book
Clear rating
Open Preview