Summary of Kim Zetter's Countdown to Zero Day
By IRB Media
()
About this ebook
Please note: This is a companion version & not the original book.
#1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.
IRB Media
With IRB books, you can get the key takeaways and analysis of a book in 15 minutes. We read every chapter, identify the key takeaways and analyze them for your convenience.
Read more from Irb Media
Summary of Anna Lembke's Dopamine Nation Rating: 4 out of 5 stars4/5Summary of David R. Hawkins's Letting Go Rating: 4 out of 5 stars4/5Summary of Joe Dispenza's Breaking the Habit of Being Yourself Rating: 4 out of 5 stars4/5Summary of Al Brooks's Trading Price Action Trends Rating: 5 out of 5 stars5/5Summary of Tiago Forte's Building a Second Brain Rating: 4 out of 5 stars4/5Summary of Clarissa Pinkola Estés's Women Who Run With the Wolves Rating: 5 out of 5 stars5/5Summary of Dr. Mindy Pelz's The Menopause Reset Rating: 3 out of 5 stars3/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Summary of Jessie Inchauspe's Glucose Revolution Rating: 5 out of 5 stars5/5The Untethered Soul by Michael A. Singer | Key Takeaways, Analysis & Review: The Journey Beyond Yourself Rating: 4 out of 5 stars4/5Summary of Lindsay C. Gibson's Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of Mark Wolynn's It Didn't Start with You Rating: 4 out of 5 stars4/5Summary of Ryan Daniel Moran's 12 Months to $1 Million Rating: 5 out of 5 stars5/5Summary of Dr. Julie Smith's Why Has Nobody Told Me This Before? Rating: 4 out of 5 stars4/5Summary of James Nestor's Breath Rating: 5 out of 5 stars5/5Summary of Mark Douglas' The Disciplined Trader™ Rating: 5 out of 5 stars5/5Summary of Gordon Neufeld & Gabor Maté's Hold On to Your Kids Rating: 5 out of 5 stars5/5Summary of Haemin Sunim's The Things You Can See Only When You Slow Down Rating: 5 out of 5 stars5/5Summary of Erin Meyer's The Culture Map Rating: 5 out of 5 stars5/5Summary of Lindsay C. Gibson's Self-Care for Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of Gabor Mate's When the Body Says No Rating: 0 out of 5 stars0 ratingsSummary of Uma Naidoo's This Is Your Brain on Food Rating: 5 out of 5 stars5/5Summary of Brendan Kane's One Million Followers Rating: 0 out of 5 stars0 ratingsSummary of Bronnie Ware's Top Five Regrets of the Dying Rating: 4 out of 5 stars4/5Summary of Gino Wickman's Traction Rating: 4 out of 5 stars4/5Summary of Thomas Erikson's Surrounded by Idiots Rating: 1 out of 5 stars1/5Summary of Rebecca Fett's It Starts With The Egg Rating: 0 out of 5 stars0 ratingsSummary of Devon Price's Unmasking Autism Rating: 5 out of 5 stars5/5Summary of Anna Coulling's A Complete Guide To Volume Price Analysis Rating: 5 out of 5 stars5/5
Related to Summary of Kim Zetter's Countdown to Zero Day
Related ebooks
Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan Rating: 0 out of 5 stars0 ratingsZero Day: A Jeff Aiken Novel Rating: 3 out of 5 stars3/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 0 out of 5 stars0 ratingsSecrets and Lies: Digital Security in a Networked World Rating: 4 out of 5 stars4/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsSummary of Nicole Perlroth's This Is How They Tell Me the World Ends Rating: 2 out of 5 stars2/5Summary of Kevin D. Mitnick's The Art of Invisibility Rating: 0 out of 5 stars0 ratingsIntelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5The Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsCyberspace in Peace and War, Second Edition Rating: 0 out of 5 stars0 ratingsBuilding an Intelligence-Led Security Program Rating: 5 out of 5 stars5/5Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership Rating: 0 out of 5 stars0 ratingsSummary of Christian Brose's The Kill Chain Rating: 1 out of 5 stars1/5Enemies of Intelligence: Knowledge and Power in American National Security Rating: 0 out of 5 stars0 ratingsSummary of Andy Greenberg's Sandworm Rating: 0 out of 5 stars0 ratingsThe Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger | Conversation Starters Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Learning Network Forensics Rating: 5 out of 5 stars5/5Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsCyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5
Wars & Military For You
A Daily Creativity Journal Rating: 3 out of 5 stars3/5The Art of War Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5The God Delusion Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5The Only Plane in the Sky: An Oral History of 9/11 Rating: 5 out of 5 stars5/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5Idaho Falls: The Untold Story of America's First Nuclear Accident Rating: 4 out of 5 stars4/5Dr. Seuss Goes to War: The World War II Editorial Cartoons of Theodor Seuss Geisel Rating: 4 out of 5 stars4/5Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5Unacknowledged: An Expose of the World's Greatest Secret Rating: 5 out of 5 stars5/5The Forgotten Highlander: An Incredible WWII Story of Survival in the Pacific Rating: 5 out of 5 stars5/5Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5The Wager Disaster: Mayem, Mutiny and Murder in the South Seas Rating: 4 out of 5 stars4/5The Making of the Atomic Bomb Rating: 5 out of 5 stars5/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5Fall and Rise: The Story of 9/11 Rating: 5 out of 5 stars5/5Israel: A Concise History of a Nation Reborn Rating: 4 out of 5 stars4/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/5God Is Not One: The Eight Rival Religions That Run the World--and Why Their Differences Matter Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5The Last Kingdom Rating: 4 out of 5 stars4/5The Afghanistan Papers: A Secret History of the War Rating: 4 out of 5 stars4/5Band of Brothers: E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest Rating: 5 out of 5 stars5/5About Face: The Odyssey of an American Warrior Rating: 4 out of 5 stars4/5The Girls of Atomic City: The Untold Story of the Women Who Helped Win World War II Rating: 4 out of 5 stars4/5
Reviews for Summary of Kim Zetter's Countdown to Zero Day
0 ratings0 reviews
Book preview
Summary of Kim Zetter's Countdown to Zero Day - IRB Media
Insights on Kim Zetter's Countdown to Zero Day
Contents
Insights from Chapter 1
Insights from Chapter 2
Insights from Chapter 3
Insights from Chapter 4
Insights from Chapter 5
Insights from Chapter 6
Insights from Chapter 7
Insights from Chapter 8
Insights from Chapter 9
Insights from Chapter 10
Insights from Chapter 11
Insights from Chapter 12
Insights from Chapter 13
Insights from Chapter 14
Insights from Chapter 15
Insights from Chapter 16
Insights from Chapter 17
Insights from Chapter 18
Insights from Chapter 19
Insights from Chapter 1
#1
In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2
The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3
The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4
The. LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.
#5
The use of a legitimate digital certificate to authenticate malicious files undermined the trustworthiness of the computer world’s signing architecture and called into question the legitimacy of any file signed with digital certificates thereafter.
#6
The computer security industry began to address the worm that had a name: Stuxnet. The driver was discovered on a computer by itself, without any of Stuxnet’s other files, but it was assumed to be related to Stuxnet since it shared similarities with the other drivers that VirusBlokAda had found.
#7
The discovery of the second certificate led to more speculation about how the hackers had obtained these security documents. It seemed that the attackers had stolen the digital signing keys and certs of two Taiwanese companies, RealTek and JMicron, and used them to sign their malware.
#8
Stuxnet was the first digital weapon, and it appeared that it was on its way out of the spotlight. But a few security researchers weren’t ready to let it go.
#9
The Autorun feature in Windows is a convenience feature that allows programs on a USB flash drive, CD-ROM, or DVD to automatically launch when the devices are inserted into a computer. It’s a known security risk because any malicious program on the device will automatically launch as well.
#10
Microsoft’s security response team received an email from an antivirus company in Belarus about the malware. They were able to stop the virus from spreading, but not before it had already infected hundreds of computers.
#11
The driver might have been used with a new version of Stuxnet the attackers unleashed after tweaking the code to prevent antivirus signatures from detecting it. No later version of Stuxnet has ever been discovered.
Insights from Chapter 2
#1
O’Murchu was manager of operations for the Security Response team in Symantec’s Culver City office, and it was his job to review new malware. He had never seen anything like the code he was looking at. It was using techniques that went way beyond anything he had ever seen before.
#2
O’Murchu’s first encounter with malware was in 1996, when he was studying computer science at University College Dublin. He was fascinated by