Stuxnet to Sunburst
20 Years of Digital Exploitation and Cyber Warfare
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now.
From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.
Table of Contents
Chapter 1. The Worldwide Explosion of Personal Computers and the Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter 7. The Office of Personnel Management and Equifax Breaches. Chapter 8. Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust, or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11. Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare. Chapter 13. Australia’s Frustration with China and Assisting the FBI. Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or Worried? Our Government and Agencies Have Got This. Chapter 20. Making Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols. Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will Get Better Answers and Take Better Action.
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts.