Summary of Andy Greenberg's Sandworm
By IRB Media
()
About this ebook
Please note: This is a companion version & not the original book.
Book Preview: #1 iSight Partners, a private intelligence firm, had a team that specialized in software vulnerability research. In 2014, they discovered a secret security flaw in Microsoft Office that allowed hackers to break out of the confines of the software application and begin to execute their own code on a target computer.
#2 iSight’s Ukrainian staff found the email, and Hultquist, the company’s loud and bearish army veteran, made a point of periodically shouting from his desk into the bull pen. He burst out of his office and into the room, briefing the room and assigning tasks to triage what would become one of the biggest finds in the small company’s history.
#3 The hackers had used the feature to carefully plant two chunks of data within the presentation. The first was loaded into a temporary folder on the target computer. The second took advantage of PowerPoint’s animation feature: when the presentation loaded that animation file, it would run an automated script that right-clicked on the first file and click install on the resulting drop-down menu, giving that code a foothold on the computer without tipping off its user.
#4 Zero days do have authors. When Erickson had first begun to pull apart the attack in his blacked-out workshop that morning, he hadn’t simply been studying some naturally occurring, inanimate puzzle. He was admiring the first hints of a remote, malevolent intelligence.
IRB Media
With IRB books, you can get the key takeaways and analysis of a book in 15 minutes. We read every chapter, identify the key takeaways and analyze them for your convenience.
Read more from Irb Media
Summary of Clarissa Pinkola Estés's Women Who Run With the Wolves Rating: 5 out of 5 stars5/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Summary of David R. Hawkins's Letting Go Rating: 5 out of 5 stars5/5Summary of Jessie Inchauspe's Glucose Revolution Rating: 5 out of 5 stars5/5Summary of Anna Lembke's Dopamine Nation Rating: 4 out of 5 stars4/5Summary of Joe Dispenza's Breaking the Habit of Being Yourself Rating: 4 out of 5 stars4/5The Untethered Soul by Michael A. Singer | Key Takeaways, Analysis & Review: The Journey Beyond Yourself Rating: 4 out of 5 stars4/5Summary of Mark Wolynn's It Didn't Start with You Rating: 4 out of 5 stars4/5Summary of Dr. Mindy Pelz's The Menopause Reset Rating: 3 out of 5 stars3/5Summary of Lindsay C. Gibson's Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of James Nestor's Breath Rating: 5 out of 5 stars5/5Summary of Al Brooks's Trading Price Action Trends Rating: 5 out of 5 stars5/5Summary of Gabor Mate's When the Body Says No Rating: 0 out of 5 stars0 ratingsSummary of Tiago Forte's Building a Second Brain Rating: 4 out of 5 stars4/5Summary of Haemin Sunim's The Things You Can See Only When You Slow Down Rating: 5 out of 5 stars5/5Summary of Erin Meyer's The Culture Map Rating: 5 out of 5 stars5/5Summary of Ryan Daniel Moran's 12 Months to $1 Million Rating: 5 out of 5 stars5/5Summary of Mark Douglas' The Disciplined Trader™ Rating: 5 out of 5 stars5/5Summary of Dr. Julie Smith's Why Has Nobody Told Me This Before? Rating: 4 out of 5 stars4/5Summary of Lindsay C. Gibson's Self-Care for Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of Gordon Neufeld & Gabor Maté's Hold On to Your Kids Rating: 5 out of 5 stars5/5Summary of Tara Swart's The Source Rating: 0 out of 5 stars0 ratingsSummary of Rebecca Fett's It Starts With The Egg Rating: 0 out of 5 stars0 ratingsSummary of Thomas Erikson's Surrounded by Idiots Rating: 1 out of 5 stars1/5Summary of Anna Coulling's A Complete Guide To Volume Price Analysis Rating: 5 out of 5 stars5/5Summary of Uma Naidoo's This Is Your Brain on Food Rating: 5 out of 5 stars5/5Summary of Gino Wickman's Traction Rating: 4 out of 5 stars4/5Summary of Bronnie Ware's Top Five Regrets of the Dying Rating: 4 out of 5 stars4/5Summary of Brianna Wiest's 101 Essays That Will Change The Way You Think Rating: 0 out of 5 stars0 ratings
Related to Summary of Andy Greenberg's Sandworm
Related ebooks
Summary of Kim Zetter's Countdown to Zero Day Rating: 0 out of 5 stars0 ratingsThe Hacker's Zibaldone Rating: 0 out of 5 stars0 ratingsHIPAA Health Insurance Portability And Accountability Act A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsLegislating Privacy: Technology, Social Values, and Public Policy Rating: 0 out of 5 stars0 ratingsMore Than You Wanted to Know: The Failure of Mandated Disclosure Rating: 4 out of 5 stars4/5Sink or Swim (Review and Analysis of the Sindells' Book) Rating: 0 out of 5 stars0 ratingsCode with Java 21: A practical approach for building robust and efficient applications (English Edition) Rating: 0 out of 5 stars0 ratingsFrank, Who Liked to Build: The Architecture of Frank Gehry Rating: 5 out of 5 stars5/5Global "Body Shopping": An Indian Labor System in the Information Technology Industry Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsRemote Control Retirement Riches: How to Change Your Future with Rental Homes Rating: 0 out of 5 stars0 ratingsSilicon Triangle: The United States, Taiwan, China, and Global Semiconductor Security Rating: 0 out of 5 stars0 ratingsSummary of David Wise's Tiger Trap Rating: 0 out of 5 stars0 ratingsCypherpunks: Freedom and the Future of the Internet Rating: 4 out of 5 stars4/5Solution Nation: One Nation is Disproportionately Responding to the World's Most Intractable Problems Rating: 0 out of 5 stars0 ratingsIn the Name of Security – Secrecy, Surveillance and Journalism Rating: 0 out of 5 stars0 ratingsData Personified: How Fraud Is Transforming the Meaning of Identity Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsWtf? Where’s the Fraud?: How to Unmask and Stop Identity Fraud’s Drain on Our Government Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsZero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers Rating: 0 out of 5 stars0 ratingsThe Craft of Scientific Presentations: Critical Steps to Succeed and Critical Errors to Avoid Rating: 5 out of 5 stars5/5Global Muckraking: 100 Years of Investigative Journalism from Around the World Rating: 3 out of 5 stars3/5The New Economics of Sovereign Wealth Funds Rating: 0 out of 5 stars0 ratingsInsider Threat Program A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEthics of Spying: A Reader for the Intelligence Professional Rating: 0 out of 5 stars0 ratingsYour Data, Their Billions: Unraveling and Simplifying Big Tech Rating: 4 out of 5 stars4/5
Historical Biographies For You
Seven Pillars of Wisdom: A Triumph Rating: 4 out of 5 stars4/5Manhunt: The 12-Day Chase for Lincoln's Killer Rating: 4 out of 5 stars4/5The Book of Charlie: Wisdom from the Remarkable American Life of a 109-Year-Old Man Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5Master Slave Husband Wife: An Epic Journey from Slavery to Freedom Rating: 4 out of 5 stars4/5Vanderbilt: The Rise and Fall of an American Dynasty Rating: 4 out of 5 stars4/5The Diary of a Young Girl Rating: 4 out of 5 stars4/5King Leopold's Ghost: A Story of Greed, Terror, and Heroism in Colonial Africa Rating: 4 out of 5 stars4/5The Indifferent Stars Above: The Harrowing Saga of the Donner Party Rating: 4 out of 5 stars4/5A Moveable Feast Rating: 4 out of 5 stars4/5Leonardo da Vinci Rating: 4 out of 5 stars4/5The Diary of Anne Frank (The Definitive Edition) Rating: 4 out of 5 stars4/5Seven Pillars of Wisdom (Rediscovered Books): A Triumph Rating: 4 out of 5 stars4/5Benjamin Franklin: An American Life Rating: 4 out of 5 stars4/5Black Like Me: The Definitive Griffin Estate Edition Rating: 4 out of 5 stars4/5Frederick Douglass: Prophet of Freedom Rating: 4 out of 5 stars4/5Coreyography: A Memoir Rating: 4 out of 5 stars4/5The Girls of Atomic City: The Untold Story of the Women Who Helped Win World War II Rating: 4 out of 5 stars4/5The Day the World Came to Town: 9/11 in Gander, Newfoundland Rating: 4 out of 5 stars4/5Twelve Years a Slave (Illustrated) (Two Pence books) Rating: 4 out of 5 stars4/5Mein Kampf Rating: 3 out of 5 stars3/518 Tiny Deaths: The Untold Story of Frances Glessner Lee and the Invention of Modern Forensics Rating: 4 out of 5 stars4/5The Devil and Harper Lee Rating: 4 out of 5 stars4/5The Gulag Archipelago: The Authorized Abridgement Rating: 4 out of 5 stars4/5Shakespeare: The World as Stage Rating: 4 out of 5 stars4/5Profiles in Courage: Deluxe Modern Classic Rating: 4 out of 5 stars4/5Putin's People: How the KGB Took Back Russia and Then Took On the West Rating: 4 out of 5 stars4/5
Reviews for Summary of Andy Greenberg's Sandworm
0 ratings0 reviews
Book preview
Summary of Andy Greenberg's Sandworm - IRB Media
Insights on Andy Greenberg's Sandworm
Contents
Insights from Chapter 1
Insights from Chapter 2
Insights from Chapter 3
Insights from Chapter 4
Insights from Chapter 5
Insights from Chapter 6
Insights from Chapter 1
#1
iSight Partners, a private intelligence firm, had a team that specialized in software vulnerability research. In 2014, they discovered a secret security flaw in Microsoft Office that allowed hackers to break out of the confines of the software application and begin to execute their own code on a target computer.
#2
iSight’s Ukrainian staff found the email, and Hultquist, the company’s loud and bearish army veteran, made a point of periodically shouting from his desk into the bull pen. He burst out of his office and into the room, briefing the room and assigning tasks to triage what would become one of the biggest finds in the small company’s history.
#3
The hackers had used the feature to carefully plant two chunks of data within the presentation. The first was loaded into a temporary folder on the target computer. The second took advantage of PowerPoint’s animation feature: when the presentation loaded that animation file, it would run an automated script that right-clicked on the first file and click install on the resulting drop-down menu, giving that code a foothold on the computer without tipping off its user.
#4
Zero days do have authors. When Erickson had first begun to pull apart the attack in his blacked-out workshop that morning, he hadn’t simply been studying some naturally occurring, inanimate puzzle. He was admiring the first hints of a remote, malevolent intelligence.
#5
Once the initial frenzy surrounding the zero day had died down, questions remained: Who had written the attack code. Whom were they targeting with it, and why. Those questions fell to Drew Robinson, a malware analyst at iSight.
#6
In late 2007, the security firm Arbor Networks counted more than thirty botnets built with BlackEnergy, mostly aiming their attacks at Russian websites. But on the spectrum of cyberattack sophistication, distributed denial-of-service attacks were largely crude and blunt.
#7
The use of BlackEnergy by these hackers was no longer for indiscriminate theft, but for precise spy operations.
#8
The BlackEnergy malware had a so-called campaign code that identified it as having come from the Ukrainian hackers. Robinson was able to decipher the malware’s configuration settings, which contained a so-called campaign code that was immediately recognized by Robinson as being from his private life as a science fiction nerd: arrakis02.
#9
The setting of Dune, a book by Frank Herbert, is the desert planet Arrakis, where the novel takes place. Arrakis is the planet where the Fremen, a tribe of people who can ride sandworms, live.
#10
Robinson began to match the Dune references in the malware samples he found to lure documents that seemed to be targeting specific