Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$36.10$36.10
Ships from: Amazon Sold by: Happy Trade Store
Save with Used - Good
$16.25$16.25
Ships from: Amazon Sold by: Found Treasurer
Return this item for free
We offer easy, convenient returns with at least one free return option: no shipping charges. All returns must comply with our returns policy.
Learn more about free returns.- Go to your orders and start the return
- Select your preferred free shipping option
- Drop off and leave!
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Hardcover – November 11, 2014
Purchase options and add-ons
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
- Print length448 pages
- LanguageEnglish
- PublisherCrown
- Publication dateNovember 11, 2014
- Dimensions6.4 x 1.42 x 9.61 inches
- ISBN-10077043617X
- ISBN-13978-0770436179
Book recommendations, author interviews, editors' picks, and more. Read it now.
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
Review
--Washington Post
"An authoritative account of Stuxnet’s spread and discovery...[delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible."
--Economist
"Exhaustively researched...Zetter gives a full account of this “hack of the century,” as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
--Wall Street Journal
“Part detective story, part scary-brilliant treatise on the future of warfare…an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”
—Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion
“Unpacks this complex issue with the panache of a spy thriller…even readers who can’t tell a PLC from an iPad will learn much from Zetter’s accessible, expertly crafted account.”
—Publishers Weekly (starred)
“A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come…Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors… Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you.”
--Kirkus
"An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
--Bruce Schneier, author of Secrets and Lies and Schneier on Security
About the Author
Excerpt. © Reprinted by permission. All rights reserved.
EARLY WARNING
Sergey Ulasen is not the sort of person you’d expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmother’s country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.1
It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus–BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.
Not only was it using a skillful rootkit to cloak itself and make it invisible to antivirus engines, it was using a shrewd zero-day exploit to propagate from machine to machine--an exploit that attacked a function so fundamental to the Windows operating system, it put millions of computers at risk of infection.
Exploits are attack code that hackers use to install viruses and other malicious tools onto machines. They take advantage of security vulnerabilities in browser software like Internet Explorer or applications like Adobe PDF Reader to slip a virus or Trojan horse onto a system, like a burglar using a crowbar to pry open a window and break into a house. If a victim visits a malicious website where the exploit lurks or clicks on a malicious e‑mail attachment containing an exploit, the exploit uses the security hole in the software to drop a malicious file onto their system. When software makers learn about such holes in their products, they generally produce “patches” to close them up and seal the intruders out, while antivirus firms like Ulasen’s add signatures to their scanners to detect any exploits that try to attack the vulnerabilities.
Zero-day exploits, however, aren’t ordinary exploits but are the hacking world’s most prized possession because they attack holes that are still unknown to the software maker and to the antivirus vendors--which means there are no antivirus signatures yet to detect the exploits and no patches available to fix the holes they attack.
But zero-day exploits are rarely found in the wild. It takes time and skill for hackers to discover new holes and write workable exploits to attack them, so the vast majority of hackers simply rely on old vulnerabilities and exploits to spread their malware, counting on the fact that most computer users don’t often patch their machines or have up-to-date antivirus software installed, and that it can take vendors weeks or months to produce a patch for a known hole. Although more than 12 million viruses and other malicious files are captured each year, only about a dozen or so zero-days are found among them. Yet here the attackers were using an extremely valuable zero-day exploit, and a skillful rootkit, for a virus that, as far as Ulasen and Kupreev could tell, had only been found on machines in Iran so far. Something didn’t add up.
THE MYSTERY FILES had come to their attention a week earlier when a reseller of VirusBlokAda’s security software in Iran reported a persistent problem with a customer’s machine in that country. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.2 VirusBlokAda’s tech-support team had scanned the system remotely from Minsk to look for any malware their antivirus software might have missed, but came up with nothing. That’s when they called in Ulasen.
Ulasen had been hired by the antivirus firm while still in college. He was hired to be a programmer, but the staff at VirusBlokAda was so small, and Ulasen’s skills so keen, that within three years, at the age of twenty-six, he found himself leading the team that developed and maintained its antivirus engine. He also occasionally worked with the research team that deconstructed malicious threats. This was his favorite part of the job, though it was something he rarely got to do. So when the tech-support team asked him to weigh in on their mystery from Iran, he was happy to help.3
Ulasen assumed the problem must be a misconfiguration of software or an incompatibility between an application installed on the machine and the operating system. But then he learned it wasn’t just one machine in Iran that was crashing but multiple machines, including ones that administrators had wiped clean and rebuilt with a fresh installation of the operating system. So he suspected the culprit might be a worm lurking on the victim’s network, reinfecting scrubbed machines each time they were cleaned. He also suspected a rootkit was hiding the intruder from their antivirus engine. Ulasen had written anti-rootkit tools for his company in the past, so he was confident he’d be able to hunt this one down if it was there.
After getting permission to connect to one of the machines in Iran and remotely examine it, Ulasen and Kupreev zeroed in on six suspicious files--two modules and four other files--they thought were the source of the problem.4 Then with help from several colleagues in their lab, they spent the next several days picking at the files in fits and starts, hurling curses at times as they struggled to decipher what turned out to be surprisingly sophisticated code. As employees of a small firm that mostly developed antivirus products for government customers, they weren’t accustomed to taking on such complex challenges: they spent most of their days providing routine tech support to customers, not analyzing malicious threats. But they pressed forward nonetheless and eventually determined that one of the modules, a driver, was actually a “kernel-level” rootkit, as Ulasen had suspected.5
Rootkits come in several varieties, but the most difficult to detect are kernel-level rootkits, which burrow deep into the core of a machine to set up shop at the same privileged level where antivirus scanners work. If you think of a computer’s structure like the concentric circles of an archer’s target, the kernel is the bull’s eye, the part of the operating system that makes everything work. Most hackers write rootkits that operate at a machine’s outer layers--the user level, where applications run--because this is easier to do. But virus scanners can detect these--so a truly skilled hacker places his rootkit at the kernel level of the machine, where it can subvert the scanner. There, it serves as a kind of wingman for malicious files, running interference against scanners so the malware can do its dirty work unhindered and undetected. Kernel-level rootkits aren’t uncommon, but it takes sophisticated knowledge and a deft touch to build one that works well. And this one worked very well.6
Kupreev determined that the rootkit was designed to hide four malicious .LNK files--the four other suspicious files they’d found on the system in Iran. The malware appeared to be using an exploit composed of these malicious files to spread itself via infected USB flash drives, and the rootkit prevented the .LNK files from being seen on the flash drive. That’s when Kupreev called Ulasen over to have a look.
Exploits that spread malware via USB flash drives aren’t as common as those that spread them over the internet through websites and e‑mail attachments, but they aren’t unheard of, either. All of the USB exploits the two researchers had seen before, however, used the Autorun feature of the Windows operating system, which allowed malicious programs on a USB flash drive to execute as soon as the drive was inserted in a machine. But this exploit was more clever.7
Windows .LNK files are responsible for rendering the icons for the contents of a USB flash drive or other portable media device when it’s plugged into a PC. Insert a USB flash drive into a PC, and Windows Explorer or a similar tool automatically scans it for .LNK files to display the icon for a music file, Word document, or program stored on the flash drive.8 But in this case, the attackers embedded an exploit in a specially crafted .LNK file so that as soon as Windows Explorer scanned the file, it triggered the exploit to spring into action to surreptitiously deposit the USB’s malicious cargo onto the machine, like a military transport plane dropping camouflaged paratroopers onto enemy territory.
The .LNK exploit attacked such a fundamental feature of the Windows system that Ulasen wondered why no one had thought of it before. It was much worse than Autorun exploits, because those could be easily thwarted by disabling the Autorun feature on machines--a step many network administrators take as a matter of course because of Autorun’s known security risk. But there is no way to easily disable the .LNK function without causing other problems for users.
Ulasen searched a registry of exploits for any others that had used .LNK files in the past, but came up with nothing. That was when he suspected he was looking at a zero-day.
He took a USB flash drive infected with the malicious files and plugged it into a test machine running Windows 7, the newest version of the Microsoft operating system. The machine was fully patched with all the latest security updates. If the .LNK exploit was already known to Microsoft, patches on the system would prevent it from dropping the malicious files onto the machine. But if the .LNK exploit was a zero-day, nothing would stop it. He waited a few minutes to examine the computer and, sure enough, the malicious files were there.
He couldn’t believe it. VirusBlokAda, a tiny security firm that few in the world had ever heard of, had just discovered that rarest of trophies for a virus hunter. But this wasn’t just any zero-day exploit; it was one that worked against every version of the Windows operating system released since Windows 2000: the attackers had bundled four versions of their exploit together--in four different .LNK files--to make sure their attack worked against every version of Windows it was likely to encounter.9
Ulasen tried to wrap his head around the number of machines that were at risk of infection from this. But then something equally troubling struck him. The malicious driver module, and another driver module that got dropped onto targeted machines as part of the malicious cargo, had installed themselves seamlessly on their test machine, without any warning notice popping up on-screen to indicate they were doing so. Windows 7 had a security feature that was supposed to tell users if an unsigned driver, or one signed with an untrusted certificate, was trying to install itself on their machine. But these two drivers had loaded with no problem. That was because, Ulasen realized with alarm, they were signed with what appeared to be a legitimate digital certificate from a company called RealTek Semiconductor.10
Digital certificates are trusted security documents, like digital passports, that software makers use to sign their programs to authenticate them as legitimate products of their company. Microsoft digitally signs its programs and software updates, as do antivirus firms. Computers assume that a file signed with a legitimate digital certificate is trustworthy. But if attackers steal a Microsoft certificate and the private cryptographic “key” that Microsoft uses with the certificate to sign its files, they can fool a computer into thinking their malicious code is Microsoft code.
Attackers had used digital certificates to sign malicious files before. But they had used fake, self-signed certificates masquerading as legitimate ones, or had obtained real certificates through fraudulent means, such as creating a shell company to trick a certificate authority into issuing them a certificate under the shell company’s name.11 In both scenarios, attackers ran the risk that machines would view their certificate as suspicious and reject their file. In this case, the attackers had used a valid certificate from RealTek--a trusted hardware maker in Taiwan--to fool computers into thinking the drivers were legitimate RealTek drivers.
It was a tactic Ulasen had never seen before and it raised a lot of questions about how the attackers had pulled it off. One possibility was that they had hijacked the computer of a RealTek software developer and used his machine and credentials to get their code secretly signed.12
But it was also possible the attackers had simply stolen the signing key and certificate, or cert. For security reasons, smart companies store their certs and keys on offline servers or in hardware security modules that offered extra protection. But not everyone did this, and there were possible clues to suggest that RealTek’s cert had indeed been nabbed. A timestamp on the certificates showed that both of the drivers had been signed on January 25, 2010. Although one of the drivers had been compiled a year earlier on January 1, 2009, the other one was compiled just six minutes before it was signed. The rapid signing suggested the attackers might have had the RealTek key and cert in their possession. There was something notable about the compilation date of this driver, however. When hackers ran their source code through a compiler to translate it into the binary code that a machine could read, the compiler often placed a timestamp in the binary file. Though attackers could manipulate the timestamp to throw researchers off, this one appeared to be legitimate. It indicated that the driver had been compiled on July 14, two days after VirusBlokAda had gone public with news of Stuxnet.
The implications were disturbing. The use of a legitimate digital certificate to authenticate malicious files undermined the trustworthiness of the computer world’s signing architecture and called into question the legitimacy of any file signed with digital certificates thereafter. It was only a matter of time before other attackers copied the tactic and began stealing certificates as well.13 Ulasen needed to get the word out.
Responsible disclosure dictated that researchers who find vulnerabilities in software notify the relevant vendors before going public with the news to give the vendors time to patch the holes, so Ulasen dashed off e‑mails to both RealTek and Microsoft, notifying them of what his team had found.
But after two weeks passed with no response from either company, Ulasen and Kupreev decided they couldn’t keep quiet.14 The rest of the security community needed to know about the .LNK exploit. They had already added signatures to VirusBlokAda’s antivirus engine to detect the malicious files and were seeing infections pop up on machines all over the Middle East and beyond. The worm/virus was on the run and spreading quickly. They had to go public with the news.15
1 Ulasen and his team encountered the malware the week of June 24, 2010.
2 Ulasen has never disclosed the name of the reseller, but a link on VirusBlokAda’s website for its distributor in Iran points to vba32-ir.com, a site owned by the Deep Golden Recovery Corporation, a data-recovery firm in Iran.
3 Information about VirusBlokAda’s encounter with the malware comes from interviews with Sergey Ulasen and Oleg Kupreev, as well as from an account published by Kaspersky Lab in 2011, after the Russian antivirus firm hired Ulasen away from VirusBlokAda. That interview, “The Man Who Found Stuxnet--Sergey Ulasen in the Spotlight,” was published November 2, 2011, at eugene.kaspersky.com/2011/11/02/the-man-who-found-stuxnet-sergey-ulasen-in-the-spotlight.
4 A module is a stand-alone component. It is often interchangeable and can be used with various programs.
5 Drivers are software programs that are used as interfaces between a device and a computer to make the device work with the machine. For example, a driver is required to allow a computer to communicate with a printer or digital camera that is connected to it--different drivers are available for different operating systems so that the same device will work with any computer. In this case the drivers were actually rootkits designed to install and conceal malicious files on the machine.
6 The reboot problem didn’t occur on other machines later found to be infected by the malware. So some researchers suspect the problem may have been an incompatibility between one of the malware’s drivers and VirusBlokAda’s antivirus software. The malware used the driver to install itself, and researchers at Kaspersky Lab in Russia suspected that when the driver injected the malware’s main file into the memory of the machines in Iran, this caused some machines to crash. Researchers at Kaspersky Lab later tried to reproduce the problem but got inconsistent results--sometimes a machine crashed, sometimes it didn’t. The irony is that the attackers had put a lot of effort into testing their malware against antivirus scanners from Kaspersky, Symantec, McAfee, and others, precisely to make sure their code wouldn’t be detected by the scanners or crash machines. But they apparently hadn’t tested it against VirusBlokAda’s scanning software. So if VBA’s scanner was the problem, it meant this tiny Belarusian firm had been their undoing in more ways than one.
7 Autorun is a convenience feature in Windows that allows programs on a USB flash drive, CD-ROM, or DVD, to automatically launch when the devices are inserted into a computer. It’s a known security risk, however, because any malicious program on the device will automatically launch as well.
8 If Autorun is disabled for security reasons, the malicious code on the flash drive that exploits this feature will not be able to launch automatically but will only launch if users specifically click on the file to open it.
9 The exploit worked against seven versions of Windows: Windows 2000, WinXP, Windows 2003, Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
10 With Windows Vista and Windows 7, a driver that isn’t signed with a trusted digital certificate that Microsoft recognizes will have trouble installing on the machine. On 32-bit Windows machines that have Vista or Windows 7 installed, a warning will display, telling the user the file is not signed or is not signed with a trusted certificate, forcing the user to make a decision about whether to let it install. On 64-bit Windows machines using either operating system, a file not signed with a trusted certificate simply won’t install at all. The malware VirusBlokAda found only worked on 32-bit Windows machines.
11 Certificate authorities dole out the signing certificates that companies use to sign their code and websites. The CAs are supposed to verify that an entity requesting a certificate has the authority to do so--to prevent someone other than Microsoft from obtaining a code-signing certificate in Microsoft’s name, for example--and to ensure that if someone applies for a signing certificate for a company they claim is theirs, it’s a real company producing real code. Some certificate authorities don’t do due diligence, however, and certificates are sometimes issued to malicious actors. There are also companies that, for a fee, will use their key and certificate to sign code for others. Hackers have used these companies in the past to sign their malware.
12 In September 2012, this is exactly what happened to Adobe. The software giant, which distributes the popular Adobe Reader and Flash Player programs, announced that attackers had breached its code-signing server to sign two malicious files with an Adobe certificate. Adobe stored its private signing keys in a device called a hardware security module, which should have prevented the attackers from accessing the keys to sign their malicious files. But they compromised a build server--a server used for developing software--which had the ability to interact with the code-signing system and get it to sign their files.
13 Ironically, on July 12, 2010, the day Ulasen went public with news about the malware, a researcher with the Finnish security firm F-Secure published a conference presentation about digital certificates, stating that, as of then, malware using stolen certificates had yet to be discovered. He noted, however, that this would inevitably happen now that new versions of Windows treated unsigned drivers with suspicion, pushing hackers to steal legitimate certificates to sign their malware. (See Jarno Niemela, “It’s Signed, Therefore It’s Clean, Right?” presented at the CARO conference in Helsinki, Finland; available at f‑secure.com/weblog/archives/Jarno_Niemela_its_signed.pdf.) Indeed, not long after VirusBlokAda’s discovery of the RealTek certificate, other hackers were already attempting to use the same tactic. In September 2010, antivirus firms discovered Infostealer.Nimkey, a Trojan horse specifically designed to steal private key certificates from computers. This was followed over the next two years by a number of malicious programs signed with certificates apparently stolen from various trusted companies.
14 Ulasen contacted Microsoft through a general e‑mail address used for its security team. But Microsoft’s security response team receives more than 100,000 e‑mails a year, so it was understandable that an e‑mail sent to its general mailbox from an obscure antivirus firm in Belarus got lost in the queue.
15 The malware, researchers would later discover, was a combination of a worm and virus. The worm portion allowed it to spread autonomously without user action, but once it was on a system, other components infected files, like a virus would, and required user action to spread.
Product details
- Publisher : Crown
- Publication date : November 11, 2014
- Edition : First Edition
- Language : English
- Print length : 448 pages
- ISBN-10 : 077043617X
- ISBN-13 : 978-0770436179
- Item Weight : 1.5 pounds
- Dimensions : 6.4 x 1.42 x 9.61 inches
- Best Sellers Rank: #241,130 in Books (See Top 100 in Books)
- #2 in Computer Viruses
- #34 in Conventional Weapons & Warfare History (Books)
- #59 in Political Intelligence
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book well-paced and easy to understand, with meticulous research that provides enough detail to grasp the implications. Moreover, the book offers great insight into cyber warfare, with one customer describing it as the best account of industrial cyber attacks, and another noting its relevance to current times. However, the narrative receives mixed feedback, with some customers finding it repetitious at times.
AI-generated from the text of customer reviews
Customers find the book highly readable, with each chapter being worth reading and striking the right balance between storytelling and informative content. One customer notes that it reads like a good mystery.
"...That being said, it is written towards the general computer user so I think most people can get the gist of the more technical details." Read more
"...To her credit, she strikes the right balance between telling a riveting story accessible to a wide audience and offering much technical detail in..." Read more
"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more
"...Why I love this book * Zetter strikes a beautiful balance between technical writing, suspense, and investigative journalism, that is not too..." Read more
Customers praise the book's meticulous research and technical depth, providing enough detail to understand the implications of Stuxnet.
"...You can tell that Kim Zetter has a strong background in investigative journalism, and that she worked very hard to compile a thorough and well..." Read more
"...Ms. Zetter succeeds with much talent in making an arcane subject understandable to a lay audience while simultaneously satisfying the appetite of a..." Read more
"...was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more
"...The work is a great and fascinating study of how digital technology can and is being used just as effectively as kinetic weapons (e.g. bombs)...." Read more
Customers appreciate the book's coverage of cyber warfare, with one customer highlighting its detailed account of a nation-state cyber attack, while another notes it serves as a must-read for those interested in cyber espionage.
"...even more praise-worthy aspect of this book is it's description of how cyber warfare blossomed from it's furtive beginnings in the 80's to what we..." Read more
"...I've learned about the security implications of digital weapons...." Read more
"...The beautiful marriage of transnational security (politics) and technology as a weapon (cyber-security) *..." Read more
"...But the book is much more than that: it describes how governmental cyberwarfare has evolved over the past two decades, including many details of..." Read more
Customers find the book relevant to current times and the future, with one customer noting how it explains the larger societal implications and another praising how it distills a complex international story.
"...She also provides a history of earlier, less destructive cyber attacks around the world and how we first tested how a virus could manifest into a..." Read more
"...While a lot has changed since 2014, this book is still relevant and worth reading for anyone working in cybersecurity or technology, or for anyone..." Read more
"...as other reviewers have pointed out, she did a great job of distilling a complex international story with hundreds of players into something readers..." Read more
"...this book stole all the great adjectives, but I will echo that this book is alarming, mesmerizing, compelling and add that I believe this is a..." Read more
Customers find the book well-paced and riveting, with one customer describing it as a fast-paced detective novel.
"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more
"...But, for a dense, non-fictional accounting, it reads fast and was a thrilling story...." Read more
"...But, too many pages read with too little motion in the storyline per pages. Gets bogged down in computerese...." Read more
"...Very timely given the current talks with Iran and helped me understand more thoroughly the challenges facing our government (and others')...." Read more
Customers find the book accessible and easy to understand, with one customer noting that the technology is explained clearly for laymen to enjoy.
"...It is not only written in a way that makes it accessible to anyone, even with little knowledge on computer networks, industrial electronics and..." Read more
"...Well written and understood by people without an engineering and computer science background...." Read more
"...were available in the footnotes, and this makes the book more accessible by less-technical readers." Read more
"...of the more technical details the author discusses but the book is equally approachable by those without such a technical background...." Read more
Customers appreciate the visual quality of the book, noting its great detail, with one customer describing it as a work of journalistic art.
"...changed the course of war for good and this book does an amazing job of portraying that...." Read more
"...In my opinion, this book accurately captures the intricate details of the Stuxnet malware's operation and impact on its intended target process...." Read more
"...Kim Zetter wrote a beautiful book accompanying step by step the discovery and analysis of the largest (up today) computer virus...." Read more
"...Boy was I wrong. The book goes into great detail about how Stuxnet came to be including some brilliant research work on all aspects of the..." Read more
Customers have mixed opinions about the narrative quality of the book, with some finding it better than fiction while others note it can be repetitious at times.
"...This is the best non-fiction book I have read in my life, and perfect for those who are interested in foreign affairs and how technology can be used..." Read more
"...Definitely not a dry read even though it has a lot of technical details...." Read more
"...The result is a slow and repetitive information dump that doesn't make for very compelling reading...." Read more
"...impressed and gripped to the book just as you would with a great espionage thriller...." Read more
Reviews with images
excellent book - well-researched, well-written
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on December 16, 2014This book is very well written. You can tell that Kim Zetter has a strong background in investigative journalism, and that she worked very hard to compile a thorough and well thought out narrative. This book is also very well edited, which is helpful when slogging through a somewhat dense topic like this.
One thing I will say up front is that this book isn't quite so much about the Iranian nuclear program and the sabotage thereof as it is about a specific area of cyber warfare that uses the Iranian program as a backdrop. If you are keen to read technical details about other countries covert uranium enrichment and weaponization processes, there are better books out there for that. But, if you want a good timeline and summary on how the world reacted to the Iranian program and dealt with it on many levels - something along the lines of a good Frontline episode - then this is your book.
But perhaps the even more praise-worthy aspect of this book is it's description of how cyber warfare blossomed from it's furtive beginnings in the 80's to what we see today. The description of the book's namesake - zero day exploits - is excellent. I thought I knew the material well enough for a layman, but Ms. Zetter explained it out in great if not scary detail. Then she takes that topic as first introduced with the Stuxnet virus launched against the Iranian nuclear program and relates it to the world's infrastructure that is controlled by SCADA systems - a truly scary situation we are all in. She also provides a history of earlier, less destructive cyber attacks around the world and how we first tested how a virus could manifest into a physical act of destruction. And finally some insight how the white hats and black hats of the hacker world work today, including those in our government.
This book is also a good investigation story. We see how researchers with Symantec and Kaspersky (and some smaller firms) all battled this virus, probing it, dissecting it, until they unlocked it's method and then it's purpose. Very informative, very logical - like a good detective story. And then right when you think they got this thing - you find out that Stuxnet was just the tip of the iceberg! Duqu and Flame come into the light and a whole new chapter on the Iranian sabotage unfolds.
And finally, I would say that if you have absolutely no knowledge at all about how computers works - for example if the terms root kit or buffer overflow or *.dll files all are utterly foreign to you - then you might want to find another book on this topic. That being said, it is written towards the general computer user so I think most people can get the gist of the more technical details.
- Reviewed in the United States on January 25, 2015Kim Zetter uses Stuxnet, the world’s first digital weapon used against Iran’s nuclear program, to make her audience aware of the challenges and opportunities that zero-day vulnerabilities and exploits represent for the nations with the greatest connectivity. Critical infrastructures represent a juicy target not only for cyber criminals (a.k.a. the black market), but also for law enforcement and intelligent agencies (a.k.a. the gray market) around the world. Ms. Zetter clearly highlights the numerous challenges that the software makers and web site owners (a.k.a. the white market) experience in trying to make their offerings as secure as possible. To her credit, she strikes the right balance between telling a riveting story accessible to a wide audience and offering much technical detail in the footnotes of her book. Furthermore, Ms. Zetter demonstrates with much clarity that the legal and policy issues surrounding the use of zero-day vulnerabilities and exploits have not been appropriately addressed in public in the United States. Like other countries involved with cyber warfare, the United States has to play both defense and offense in order to secure its interests. My only regret is that the author does not deal with the fast-growing Internet of Things. “Big Data” is a juicy target for the black, gray, and white markets mentioned above. In summary, Ms. Zetter succeeds with much talent in making an arcane subject understandable to a lay audience while simultaneously satisfying the appetite of a more tech-savvy audience.
- Reviewed in the United States on May 10, 2017I took this book in an attempt to understand what Stuxnet is and to understand its inner workings, but I have learned much more by picking it up.
I've learned some things about how the process of creating nuclear bombs look like. I've learned about the security implications of digital weapons. I've learned about what goes on in order to actually get permission to use a digital weapon. I now have a clearer picture of what the Iranian nuclear deal developed. I have a clearer picture of what could happen next in cyber warfare.
And while the technical explanation of what Stuxnet is and how it behaved was dispersed over the different chapters, I've accomplished the original goal. It will still take me some time to have a full understanding of it, but this book gave me a clear direction on where to look at.
I compared it to Dan Brown's Digital Fortress a couple of times in the last couple of days and I stay behind that comparison. This book is basically Digital Fortress that has actually happened. That alone makes this book even more amazing than it already was.
I highly recommend it to everyone interested in cyberspace. Stuxnet changed the course of war for good and this book does an amazing job of portraying that. It also shows you all the drawbacks that Stuxnet had and problems it encountered on its way. At the end, it tells you how the researchers opened the Pandora's box after discovering it, proving that it wasn't a one-time thing and telling you about the entire system of malware Stuxnet was a part of.
I rarely write book reviews, but this book deserves it. I highly recommend it and will continue recommending it for a long time in the future.
I've started following Kim's work after grabbing this book and will continue following it for a long time. I really hope she'll find some other topic worth writing about and cover it in such great details as she did in this one. If (or when) she does that, I'll be grabbing it on day one. This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic.
Top reviews from other countries
Robert D. CraneReviewed in Australia on January 3, 20164.0 out of 5 stars If you are a technology person then you'll certainly enjoy the depth and detail that the bool provides
A really thorough treatise of the Stuxnet malware and the later ramifications it has generated. I felt the booked jumped around a little bit when swapping back and forth between the major players and the actual timeline as well as the affected targets in Iran.
If you are a technology person then you'll certainly enjoy the depth and detail that the bool provides, especially when it comes to the footnotes. The author has done a great job pulling all the sources and information together and making it readable by all.
If nothing else, this book should demonstrate what is digitally possible in the world we live in today and how afraid we should be about what could be unleashed tomorrow that could have ramifications far beyond what we think. We live in a digital world and that now too is under attack and being threaten like any battlefield of the past. The only thing now is that there are no longer any borders.
Harry JReviewed in India on September 23, 20205.0 out of 5 stars Buy this book, it's must read for factory automation service providers
Best read of recent times. The author has taken great efforts to gather the information and present it for non technical readers who do not have an industrial automation background or work experience in that field.
This book is based on true story and so perhaps that's what makes this book really exciting, intriguing and interesting.
Hats off to the author once again for pulling this one. Best.
HugoReviewed in France on April 2, 20155.0 out of 5 stars Very Informative !
I had very little knowledge about Stuxnet and limited computer science skills and this book was very informative for me!
The reading is not always easy, some chapters are a bit long but at the end of the book I felt like I learnt a lot.
-
shigeoReviewed in Japan on July 10, 20154.0 out of 5 stars サイバー攻撃の恐るべき実態
サイバー攻撃は、ここまで出来るのか、ここまでやるのか、に驚いた。システム設計上、サイバー攻撃対策の構築に参考になる。それにしても、このウイルスが発見されたというレポートが出たとき、対ウイルスソフト業界(もちろんOSメーカを含む)がそれに対してほとんど無反応出会ったとは、意味深長である。辞書を引いてでも読むべき
-
RodrigoReviewed in Brazil on June 15, 20215.0 out of 5 stars Leitura Sensacional
Conteúdo incrível compartilhado pela jornalista Kim Zetter. Nota-se a preocupação de trazer a informação sem nenhum viés, focando exatamente nos fatos ocorridos. Além de aprender muito sobre segurança, traz um contexto histórico riquíssimo sobre muitos conflitos no Oriente Médio e até em outros locais do mundo.
Certeza que é um livro que recomendo a qualquer pessoa que leia, sobretudo se for profissional da segurança da informação.








