More on this book
Community
Kindle Notes & Highlights
Read between
August 9 - August 14, 2022
Starting in 2016, the U.S. National Security Agency’s own cyber arsenal—the sole reason the United States maintained its offensive advantage in cyberspace—was dribbled out online by a mysterious group whose identity remains unknown to this day. Over a period of nine months a cryptic hacker—or hackers; we still don’t know who the NSA’s torturers are—calling itself the Shadow Brokers started trickling out NSA hacking tools and code for any nation-state, cybercriminal, or terrorist to pick up and use in their own cyber crusades. The Shadow Brokers’ leaks made headlines, but like most news between
...more
Investigators at CrowdStrike, the security firm, started getting called into U.S. oil and energy firms to investigate. As CrowdStrike teased the code apart in late 2013, they began to pick up Russian-language artifacts and time stamps indicating that the attackers were working on Moscow hours. Either this was a Russian campaign, or someone taking great pains to look like a Russian campaign. CrowdStrike gave the grid hackers a deceptively affable name, Energetic Bear—Bear being the firm’s code word for Russia’s state-backed groups. As they unspooled the attacks, they discovered that the code
...more
At 3:30 P.M., December 23, in the Ivano-Frankivsk region of western Ukraine, residents were just starting to pack up their desks and head home for the holidays when an engineer inside Prykarpattyaoblenergo’s control center noticed his cursor gliding across his computer screen, as if pushed by an invisible hand. The cursor moved to the dashboard that controlled Prykarpattyaoblenergo’s circuit breakers at substations around the region. One by one, the cursor double-clicked on the box to open the breakers and take the substations offline. The engineer watched in horror as a pop-up window suddenly
...more
This highlight has been truncated due to consecutive passage length restrictions.
Below the quote was an emergency plan for cyberattacks. “Hour 0,” the notice read. “Notify White House Security Response. Hour 1: FBI and Secret Service reach out to victim. NSA searches intelligence for information. DHS coordinates national security response. End of Day: Send status message. If appropriate, this message will state that: ‘No further messages will be sent unless or until significant new information is obtained, which may take days or weeks.’ ” I’d always imagined the White House would have some advanced, real-time map of cyberattacks, denoted in red blips, sailing toward the
...more
But as NSA operators, security researchers, and hackers all over the world started teasing the file apart, it became clear this was the real deal. The trove contained zero-day exploits that could invisibly break through the firewalls sold by Cisco, Fortinet, and some of the most widely used firewalls in China. I immediately called up every former TAO employee who would pick up their phone. What is this? “These are the keys to the kingdom,” one put it bluntly. He had already combed through the sample cache and recognized the tools as TAO’s. They were all a cyberterrorist would need to break
...more

