Book cover of This Is How They Tell Me the World Ends by Nicole Perlroth

Nicole Perlroth

This Is How They Tell Me the World Ends Summary

Reading time icon14 min readRating icon4.3 (9,478 ratings)

“How do we stop the next cyberattack when the entire global system is built on unsecured technology?”

1. A New Kind of Arms Race

The digital battlefield is no longer a concept of the future; it's already here. Nations are no longer limited to physical weapons; cyberweapons are becoming the tools of modern warfare. These are lines of code, zero-days, and software vulnerabilities turned into tools for surveillance, sabotage, and destruction.

The rise of cyberattacks like Russia’s attacks on Ukraine demonstrates the far-reaching implications of these weapons. In December 2015, Russian hackers turned off the electricity in parts of Ukraine during harsh winter months. The attacks were repeated in Kiev a year later, showing the vulnerability of basic infrastructure to digital threats. These kinds of modern-day assaults can paralyze entire communities without a single bomb being dropped.

Globally, governments have been engaged in an unspoken arms race, stockpiling zero-day exploits—vulnerabilities in software or systems that can be exploited before they are patched. These tools allow hackers to infiltrate systems unannounced, potentially affecting everything from personal devices to national infrastructure.

Examples

  • Russian hacking of Ukraine's power grid in 2015 and 2016.
  • The US's Operation Olympic Games disrupting Iran's nuclear facility via malware.
  • The spread of the Stuxnet worm to non-target systems worldwide.

2. The Value of Zero-Days

Zero-days are flaws in systems or software unknown to their creators. In the wrong hands, these glitches become weapons for espionage, sabotage, or even blackmail. Hackers can sell these vulnerabilities to governments, brokers, or companies, creating a secretive and chaotic marketplace.

For instance, hackers often sell these exploits to intelligence agencies. The NSA, the premier US spy agency, hoarded zero-days, such as those that infiltrated popular programs like Microsoft Internet Explorer or phones running Apple's iOS. But the secrecy of this market means companies rarely have the chance to patch these vulnerabilities before they’re exploited.

Further complicating matters, this market is unregulated and secretive. Sellers can’t openly negotiate fair prices, nor do they control how their discoveries are weaponized. This ambiguity makes the zero-day market a morally murky zone where neither buyers nor sellers know the consequences of their actions.

Examples

  • The NSA’s accumulation of zero-days used for surveillance.
  • Hackers selling zero-days to brokers like the Hacking Team.
  • Ethical hacker Charlie Miller exposing the zero-day market’s inefficiencies.

3. The Unregulated Global Marketplace

The global trade in zero-days is booming, and it's not limited to ethical players or nations with strong values. While companies like Google started offering “bug bounties” for white-hat hackers to report flaws, brokers and sellers often choose to pursue larger payouts by selling directly to foreign governments.

Countries like Russia, China, and even smaller nations have eagerly joined the market. Some zero-day brokers, like Italy’s Hacking Team, were exposed for selling tools to oppressive governments that in turn used them against dissidents, journalists, and activists.

As the marketplace grows, sellers focus more on profits and less on consequences. Many hackers justify their actions by claiming they simply expose flaws—they don’t use them. But as governments pile up stockpiles of zero-days, the line between accountability and negligence blurs further.

Examples

  • Google’s bug bounty program offering rewards for ethical reporting.
  • The Hacking Team selling exploits to authoritarian regimes.
  • French company Vupen refusing to share zero-days with tech companies like Google.

4. The Risks of Retaliation

What happens when cyberweapons escape their intended targets? The danger of unleashing digital tools on adversaries is that they can rapidly spread beyond their original scope. A prime example is the Stuxnet worm, which was designed to disable Iranian nuclear centrifuges but eventually leaked into systems worldwide.

Stuxnet, developed by the US and Israel, inadvertently gave hostile nations a blueprint for future cyberweapons. Once the worm became public, other hackers studied its code to replicate and tweak its capabilities. Adversaries like Russia and North Korea began to develop their own destructive cybersecurity programs, magnifying the scale and severity of the threats.

Cyberweapons don’t just disable their targets; they create an ongoing threat by becoming templates for others to use. This makes the global cybersecurity atmosphere chaotic and unpredictable.

Examples

  • The spread of Stuxnet to over 100 countries outside its intended target.
  • The replication and expansion of Stuxnet’s techniques in Russia’s Sandworm malware.
  • North Korea exploiting EternalBlue to launch ransomware like WannaCry.

5. The EternalBlue Disaster

In 2017, a group called the Shadow Brokers leaked a collection of elite NSA cyber tools, including EternalBlue, a potent zero-day that targeted Microsoft’s operating systems. Designed to infiltrate systems for espionage, it ended up being reused worldwide for malicious intent.

One of the most devastating uses of EternalBlue was in the WannaCry ransomware attack. This exploit locked critical systems—like those at hospitals in the UK—demanding payment in cryptocurrency. Within a day, WannaCry had spread to 150 countries, crippled businesses, and caused billions of dollars in damages.

This is only one example of how government hoarding of vulnerabilities can backfire. The very tools created for national security often become global threats when leaked or stolen.

Examples

  • Shadow Brokers’ public release of NSA cyberweapons in 2017.
  • WannaCry ransomware exploiting EternalBlue to infect global networks.
  • NotPetya malware, originating from Russia and leveraging EternalBlue.

6. The Absence of Accountability

The ongoing cybersecurity crises reveal widespread failures of responsibility. In the US, the Trump administration eliminated the role of national cybersecurity coordinator in 2018, leaving a glaring leadership vacuum in digital defense.

Meanwhile, companies often prioritize speed over security when launching new products. Vulnerabilities are patched reactively, rather than prevented proactively. This leaves millions of devices exposed to risks from overlooked weaknesses.

Other countries, like Japan and Norway, implement stricter government oversight on technology used in essential systems. These safeguards significantly reduce their vulnerability, but nations like the US have yet to fully embrace similar prevention measures.

Examples

  • Japan’s 2005 regulation requiring robust security for vital systems.
  • The US removing its national cybersecurity coordinator role.
  • Microsoft introducing emergency updates after EternalBlue’s release.

7. Rising Sophistication of Hackers

Hackers aren’t just a fringe group anymore. Many receive state sponsorship or work for well-resourced organizations. China, for instance, employs one of the most sophisticated hacking units in the world, Legion Yankee. Their achievements include stealing Google’s source code and years’ worth of intellectual property.

The growing professionalism among hackers makes it harder to contain cyberthreats. Top talent is often lured into government-backed operations or high-paying private ventures. Their skills mean breaches are more targeted and damaging than ever before.

Governments and corporations alike struggle to recruit cybersecurity experts, leaving them vulnerable to hackers with increasingly advanced capabilities.

Examples

  • China's Legion Yankee infiltrating Google’s servers in 2009.
  • The UAE hiring talent from the NSA to strengthen its own cyber program.
  • Hackers selling zero-days for six-figure sums to foreign governments.

8. A Growing Dependence on Vulnerable Systems

From smartphones to power grids, more of our world is connected than ever before. This interconnectivity makes nations, businesses, and individuals more susceptible to digital incursions. A single vulnerability can affect millions of people at once.

For example, critical infrastructure in the US—like water treatment facilities—runs on interconnected systems, making them easy targets for sophisticated attackers. Russia’s intermittent attacks on Ukraine’s power grids showcase the real-world life-and-death consequences of these gaps.

Despite warnings, the world continues to link more systems to the internet without stringent security measures, widening the attack surface available to hackers.

Examples

  • Increasing reliance on smart devices with minimal security.
  • Russia exploiting General Electric software to target US oil and gas networks.
  • Ukrainian infrastructure repeatedly hacked in 2015 and 2016.

9. Playing Catch-Up

One of the biggest challenges facing cybersecurity is the reactive approach taken by governments and companies. Instead of anticipating threats, systems are often patched only after they’ve been compromised.

Hackers continue to stay ahead of the curve, developing new techniques and redistributing old tools. The global hacking ecosystem thrives in this reactive atmosphere, ensuring that even outdated vulnerabilities continue to be exploited long after patches are available.

To turn the tables, nations must invest more in defenses and proactive measures. Yet, institutions are often bogged down by bureaucracy, slowing much-needed advancements.

Examples

  • Microsoft patching security holes in late updates after EternalBlue.
  • Apple and Google introducing bug bounty programs to encourage ethical reporting.
  • Pirated software remaining vulnerable to known zero-days.

Takeaways

  1. Governments should enforce stricter pre-release security testing for software and devices connected to critical infrastructure.
  2. Establish clear, enforceable regulations requiring disclosure of vulnerabilities like zero-days within a specified time frame.
  3. Expand cybersecurity education to train experts who can both protect against threats and build safer systems.

Books like This Is How They Tell Me the World Ends