Jump to content

Fancy Bear Goes Phishing

From Wikipedia, the free encyclopedia
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
AuthorScott J. Shapiro
LanguageEnglish
SubjectComputer hacking
GenreNon-fiction:
PublishedMay 23, 2023
PublisherFarrar, Straus and Giroux, Macmillan Publishers
Publication placeUnited States
Media typePrint (Hardcover)
Pages432
ISBN9780374601171
WebsiteMacmillan

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks is a book on the history of cybersecurity and computer hacking by Scott J. Shapiro, a professor of philosophy and law at Yale Law School. The book was published by Farrar, Straus and Giroux on May 23, 2023.[1] The book was released to generally positive reviews.

Synopsis

[edit]

Fancy Bear Goes Phishing covers five computer hacks and their methods, as well as the political, legal and cultural impacts of the hacks. It examined the Morris Worm, a computer virus named after its creator Robert Tappan Morris. The book examines how the virus spread using various technological methods, including exploits from a backdoor in the Unix sendmail program and a buffer overflow exploit in the finger network service.

Fancy Bear discussed Dark Avenger, the pseudonym of a computer virus writer from Bulgaria who had a very signature style of writing computer viruses. In the discussion of Dark Avenger, Shapiro examines the use of Internet forums used by typical computer hackers in exchanging their ideas and viruses. Shapiro also examines the typical psychological profile of a hacker and their reasons for getting started in, and subsequent departure from the computer hacking scene.

Fancy Bear discussed the hacking of Paris Hilton's phone and the ultimate release of her sex tape by Cameron LaCroix. Shapiro discusses the hack and uses it as a lens to explain social engineering in computer security and the intersection between computers and modern telecommunications equipment.

Fancy Bear also focused largely on the hacking of Democratic National Committee servers and the release of Hillary Clinton's emails. Shaprio discusses "Cozy Bear" and "Fancy Bear", the two Russian organizations who penetrated the DNC servers through the use of phishing and social engineering, and examined the political consequences of modern-day computer hacks.

Fancy Bear culminated in discussion of the "botnet wars", coordinated denial-of-service attacks who originally were only used as a paid service that would lated be turned against each other. These coordinated viruses would use unsecured Internet of things (IoT) devices to build large scale coordinated attack robots in carrying out their DDOS attacks.

Reception

[edit]

Fancy Bear Goes Phishing was released to generally positive reviews. John Naughton praised the book as am "impressive achievement" and applauded Shapiro's ability to tell a story about the current state of computing using the five large hacks to tell a narrative.[2] Dorian Lynskey of The Guardian also applauded Shapiro for his ability to use "vivid case studies to dramatise a technically complex subject".[3] Richard Lea of The Wall Street Journal called the accounting the hacks in Fancy Bear "gripping" and praised the "level-headed suggestions" presented by Shapiro in Fancy Bear to aid in modern computer security.[4] Fancy Bear Goes Phishing was listed on Amazon.com "Best Books of the Year" list.[5]

References

[edit]
  1. ^ Shapiro, Scott (2023). Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (First ed.). New York: Farrar, Straus and Giroux. ISBN 9780374601171.
  2. ^ Naughton, John (22 May 2023). "Fancy Bear Goes Phishing by Scott Shapiro review – a gripping study of five extraordinary hacks". The Guardian.
  3. ^ Lynskey, Dorian (June 2, 2023). "Fancy Bear Goes Phishing by Scott J Shapiro – hacking for beginners". The Guardian.
  4. ^ Lea, Richard (May 16, 2023). "'Fancy Bear Goes Phishing' Review: The Art of Hacking Humans". The Wall Street Journal.
  5. ^ "Fancy Bear Goes Phishing". Macmillan Publishers. Retrieved April 17, 2024.