Worm: The First Digital World War
Written by Mark Bowden
Narrated by Christopher Lane
3.5/5
()
About this audiobook
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide.
When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link it with others to form a single network under illicit outside control known as a “botnet.” This botnet was soon capable of overpowering any of the vital computer networks that control banking, telephones, energy flow, air traffic, health-care information—even the Internet itself. Was it a platform for criminal profit or a weapon controlled by a foreign power or dissident organization?
Surprisingly, the U.S. government was only vaguely aware of the threat that Conficker posed, and the task of mounting resistance to the worm fell to a disparate but gifted group of geeks, Internet entrepreneurs, and computer programmers. But when Conficker’s controllers became aware that their creation was encountering resistance, they began refining the worm’s code to make it more difficult to trace and more powerful, testing the Cabal lock’s unity and resolve. Will the Cabal lock down the worm before it is too late? Game on.
Mark Bowden
Mark Bowden is the bestselling author of Killing Pablo (Atlantic 2002), Finders Keepers (Atlantic 2003), Guests of the Ayatollah (Atlantic 2006) and Black Hawk Down, which was made into a successful film by Ridley Scott. Guests of the Ayatollah is his latest book. He is a national correspondent for the Atlantic Monthly.
More audiobooks from Mark Bowden
Life Sentence: The Brief and Tragic Career of Baltimore’s Deadliest Gang Leader Rating: 4 out of 5 stars4/5Truth and Lies: What People Are Really Thinking Rating: 4 out of 5 stars4/5The Best Game Ever: Giants vs. Colts, 1958, and the Birth of the Modern NFL Rating: 5 out of 5 stars5/5Black Hawk Down Rating: 4 out of 5 stars4/5
Related to Worm
Related audiobooks
Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Kingdom of Lies: Unnerving Adventures in the World of Cybercrime Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Rise of the Machines: A Cybernetic History Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Spycraft: The Secret History of the CIA's Spytechs from Communism to Al-Qaeda Rating: 4 out of 5 stars4/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsThe Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5
Politics For You
The Righteous Mind: Why Good People Are Divided by Politics and Religion Rating: 5 out of 5 stars5/5While Time Remains: A North Korean Girl's Search for Freedom in America Rating: 4 out of 5 stars4/5The 48 Laws of Power Rating: 5 out of 5 stars5/5Jesus and John Wayne: How White Evangelicals Corrupted a Faith and Fractured a Nation Rating: 5 out of 5 stars5/5An Indigenous Peoples' History of the United States Rating: 4 out of 5 stars4/5The Radium Girls: The Dark Story of America's Shining Women Rating: 4 out of 5 stars4/5The Kingdom, the Power, and the Glory: American Evangelicals in an Age of Extremism Rating: 5 out of 5 stars5/5Manufacturing Consent: The Political Economy of the Mass Media Rating: 4 out of 5 stars4/5Behold a Pale Horse Rating: 5 out of 5 stars5/5Cobalt Red: How the Blood of the Congo Powers Our Lives Rating: 5 out of 5 stars5/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5The Only Plane in the Sky: An Oral History of September 11, 2001 Rating: 5 out of 5 stars5/5Out of the Wreckage Rating: 4 out of 5 stars4/5Dragonfire: Four Days That (Almost) Changed America Rating: 4 out of 5 stars4/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 5 out of 5 stars5/5You Can't Joke About That: Why Everything Is Funny, Nothing Is Sacred, and We’re All in This Together Rating: 4 out of 5 stars4/5Romney: A Reckoning Rating: 4 out of 5 stars4/5Blackout: How Black America Can Make Its Second Escape from the Democrat Plantation Rating: 4 out of 5 stars4/5Revenge: How Donald Trump Weaponized the US Department of Justice Against His Critics Rating: 4 out of 5 stars4/5The War on the West Rating: 5 out of 5 stars5/5The MAGA Diaries: My Surreal Adventures Inside the Right-Wing (And How I Got Out) Rating: 3 out of 5 stars3/5Everyday Utopia: What 2,000 Years of Wild Experiments Can Teach Us About the Good Life Rating: 4 out of 5 stars4/5Battle for the American Mind: Uprooting a Century of Miseducation Rating: 4 out of 5 stars4/5The Prince Rating: 4 out of 5 stars4/5
Reviews for Worm
100 ratings10 reviews
- Rating: 4 out of 5 stars4/5Very entertaining telling of this cyber tale. A great read
- Rating: 3 out of 5 stars3/5This book started out great but then it's almost as if the author gets bored with it and it limps to the finish. While it lasted it was a good story about how computer viruses and worms are combatted and the people that do this work.
- Rating: 3 out of 5 stars3/5Conficker was a malicious worm that was slowly working itself into millions of unknowing computers. A Cabal was formed of savvy computer guys to try and stop it from further advance, clean up where it already appeared, and try to figure out who was behind it and what was their motive. Gentle instruction is given to the reader who may not be proficient in Internet-speak. Those who are may find this book grindingly boring as they might be totally conversant in the subject, but those of us who are not will find it helpful.Surprisingly, this story does not end with millions of computers crashing and the FBI breaking down doors arresting perps but the deadline passed without incident and the worm continues to this day, seemingly under its own steam. Attacks using this worm still continue but no world wide calamity occurred. The people who fought against it presumably continue if they haven't moved on to other threats. No big celebration of victory was held as the battle still hasn't been won. Even so, the message of the book is clear - we need to continue to be vigilant about future attacks and, for Pete's sake, people, don't pick up a USB in a parking lot and stick it in your computer!!!
- Rating: 3 out of 5 stars3/5**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!***********
This was an interesting book. I learned a lot about a computer that I did not know. I do not know how much of the information that the author use was real/accurate. But it was still an interesting real. Some of the terms/jargon used may not be understandable to the average person. I believe that anyone interested in computers/internet would find this book interesting and should read it.
**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!*********** - Rating: 1 out of 5 stars1/5While this book was educational, it was very boooorrrinnnng. The author believed that he should explain the workings of a computer in order to describe the cornficker infection. After hearing about mano v mano and the foibles of various players, I decided that he had an axe to grind and set the "listen" to fast forward. I've read Bowden books in the past, but this one was baaaaad.
- Rating: 1 out of 5 stars1/5Not very good
- Rating: 3 out of 5 stars3/5Too many long email exchanges from the cabal. In the end - nothing happens.
- Rating: 3 out of 5 stars3/5Worm: The First Digital World War is a narrative anatomy of the Conficker worm ca. 2009. Mark Bowden has written some great books including Black Hawk Down but in this case he seems to be over his head with the technology (or explaining it coherently). I say this as someone who understands a lot, but often found his explanations unfathomable and felt sorry for any lay reader trying to comprehend. I was also put off by the negative stereotypes of computer experts, as if it were still 1999. Beyond that though there is a good story here and it's worthwhile knowing about. The world was one command away from Internet Armageddon, with all the deaths and chaos that would unleash. Conficker is still out there laying dormant, perhaps its master in jail or assassinated by the KGB - but it shows how this type of thing can happen and hopefully this story will act as a warning to prepare. We live in interesting times and Internet security is one of the most fascinating of subjects.
- Rating: 5 out of 5 stars5/5This is an account of efforts to contain the Conficker worm in 2008-2009. I thought it would read like a thriller, but it didn’t. First of all, a significant portion of the book is filled with background material: history of the Internet, history of malware, biographical sketches of the key players in the Cabal (the group that fought Conficker). Secondly, they never stopped Conficker or really learned who was behind it. I’m not saying that it wasn’t an interesting book – just that it wasn’t a page-turner. I did learn a lot about cybercrime from it. In particular, I didn’t realize that worms can make infected computers call for instructions whoever sent the worm and then crash designated websites, without the computer owners’ knowledge. Or they can take control over computers belonging to a particular bank or government agency and steal money or information – or sell control over such computers to whoever is interested. I’ve heard that one can buy anything on the Internet, but I had no idea that it includes control over “fifty computers belonging to the FBI.” This way the creators of the worm can make money with much less risk of exposure, since there’ll be no direct contact between them and the infected computers after the infection occurs. Some worm-makers don’t even infect computers themselves, but just sell their malware to whoever would like to use it. I was very surprised to learn that that’s not a crime. That is, according to the author, there’s nothing illegal in creating software that, say, exploits a flaw in the Windows operating system to gain control of other people’s computers, and in selling it to somebody. I also found out that cybercriminals can run from your garden variety bored teenage hacker who just wants to show off to very well-coordinated groups of people who are more knowledgeable and talented than the best Internet security specialists. The latter is what happened with Conficker. Whoever created that worm gave the Cabal, composed of the best and most experienced Internet professionals, a run for their money, always keeping one step ahead of them. The Cabal kept solving seemingly impossible problem, only to have their quarry upend the game once more. This begs the question as to why these people turn to crime, if they could obviously get any computer-related job in the world and make a ton of money legally, but the author never addresses this question. Another interesting point is that the Cabal was composed of network specialists who work for some company or run their own Internet-related companies, pure Internet researchers, and a volunteer who routinely spends his evenings hunting worms and then informing infected companies, without benefiting from it in any way (I was amazed that such people even exist! Ditto the guy who ran up a debt on his personal credit card to buy domains ahead of Conficker.) Anybody missing from this list? Yes, the government. It was very hard for the Cabal to get the attention of any of the relevant agencies, and then said agencies’ combined input into the effort to combat the worm was zero. Basically, if you’ve ever thought that the men and women in Washington are individuals with huge egos and feelings of entitlement who take much more from the country in the form of high salaries, benefits and various perks than they give back, this book will serve to confirm this opinion. Microsoft also comes in for its share of the blame. Before Conficker another worm had exploited a similar flaw in the Windows operating system. Back then Microsoft issued a “patch” for the port that worm had used to gain entry, but didn’t bother to check if a similar problem existed with any of the other ports. Had they done this and fixed that flaw too, Conficker wouldn’t have happened. And funnily, the author says elsewhere that if only everybody registered their Windows operating systems and allowed all the security updates from Microsoft to go through, Windows would have been “well near impregnable.” Yeah, right!I don’t know if people who’re into computers would find this book informative, but for me it was interesting to look over the shoulders of the Internet defenders, as they go about their work.
- Rating: 4 out of 5 stars4/5excellent, clear description of the new tech good guys=bad guys in cyber space.chilling