The Rules of Contagion

(Greg DeLong) #1

  1. ‘Computer Hacker Who Launched Attacks On Rutgers
    University Ordered To Pay $8.6m’, U.S. Attorney’s Office, District
    of New Jersey, 26 October 2018.

  2. @MalwareTechBlog, 13 May 2017.

  3. Staniford S. et al., ‘How to 0wn the Internet in Your Spare Time’,
    ICIR, 2002.

  4. Assuming R=20 and infectious for 8 days, equivalent to 0.1
    infections per hour.

  5. Moore D. et al., ‘The Spread of the Sapphire/Slammer Worm’,
    Center for Applied Internet Data Analysis (CAIDA), 2003.

  6. ‘Kaspersky Lab Research Reveals the Cost and Profitability of
    Arranging a DDoS Attack’, Kaspersky Lab, 23 March 2017.

  7. Palmer D., ‘Ransomware is now big business on the dark web
    and malware developers are cashing in’, ZDNet, 11 October
    2017.

  8. Nakashima E. and Timberg C., ‘NSA officials worried about the
    day its potent hacking tool would get loose. Then it did’,
    Washington Post, 16 May 2017.

  9. Orr A., ‘Zerodium Offers $2 Million for Remote iOS Exploits’,
    Mac Observer, 10 January 2019.

  10. Background on Student from: Kushner D., ‘The Real Story of
    Stuxnet’, IEEE Spectrum, 26 February 2013; Kopfstein J.,
    ‘Stuxnet virus was planted by Israeli agents using USB sticks,
    according to new report’, The Verge, 12 April 2012.

  11. Kaplan F., Dark Territory: The Secret History of Cyber War
    (Simon & Schuster, 2016).

  12. Dark Trace. Global Threat Report 2017.
    http://www.darktrace.com

  13. Background and quotes from: Lomas A., ‘Screwdriving.
    Locating and exploiting smart adult toys’, Pen Test Partners Blog,
    29 September 2017; Franceschi-Bicchierai L., ‘Hackers Can

Free download pdf