Zero Day: A Novel (6 page)

Read Zero Day: A Novel Online

Authors: Mark Russinovich,Howard Schmidt

Tags: #Cyberterrorism, #Men's Adventure, #Technological.; Bisacsh, #Thrillers.; Bisacsh, #Suspense, #Technological, #Thrillers, #Suspense Fiction, #Fiction, #Espionage

BOOK: Zero Day: A Novel
8.5Mb size Format: txt, pdf, ePub

The small apartment was typical of those built during Soviet days. Of shoddy construction, rushed to completion to meet an arbitrary deadline, it was small, less than five hundred square feet, one room with a cramped kitchenette in one corner, and a bathroom with a shower. The tiny kitchen table, with room for just two, the bed, and his computers all but filled the remaining space. A path was kept clear to his workstation, with three keyboards for three computers he’d built himself and which he never turned off. He could roll his wheelchair to the refrigerator, and to the doorway of the bathroom to empty his bladder sack if Ivana was at work or shopping.

This was twenty-nine-year-old Vladimir’s world. At one time the confinement, the limits of his physical existence, had nearly driven him insane. On the brink of life-ending despair he’d discovered a universe, one he could access without ever leaving this room. His portals were there on the desk and at his keyboards, on his screens, where he was the same as everyone else. It was liberating. Empowering. He had thought at one time to be an engineer, but his sudden awakening as a cripple had forced on him a fresh evaluation of life expectations. Instead, he’d taken his computer skills and morphed them into a kind of expertise that had saved him.

The new Russia was brimming with opportunity, but few ways to make any money if you were not a prostitute, mobster, or drug dealer. If it had not been for Ivana, none of this would have been possible. She’d worked one job after another, never complaining. Sometimes he found her endless self-sacrifice to be all but unbearable.

Vladimir tapped the keys and returned to the Web site he’d been browsing. He spent twenty minutes scrolling through the various forums, examining the code posted there. Little of it was fresh or unknown to him. On occasion he’d see something that caught his attention, code he thought he could use, something new and creative. But on examination it was usually rubbish, or pointless.

Code was the essence of any computer, and of the Internet, which was simply a connection of millions of computers. Code was the machination behind the curtain that made everything else work. Code turned keystrokes into words in word processing, code made images, code produced color, code created hyperlinks.

Everything on a computer screen came from code. Those who could write code at a sophisticated level were creators; a handful were, in their way, godlike, for what they wrote produced marvelous manifestations.

But there was code, and there was code. Like a child painting a tiger by the numbers, some hackers, as code writers were generally called, did little more than follow the lines created by others. These script kiddies copied and pasted this from here, added a little of that from there, and counted themselves lucky when it actually produced something that worked.

Code generated in such a way looked as childish to the skilled hacker as that child’s colored picture of a tiger. Other bits were repeatedly written, to the point of being counterproductive. One section might create an action, another would stop it; then it would be created again, then stopped again, sometimes in long, pointless strings. An amazing amount of code could be written to produce almost nothing. Useless code lay everywhere, occupying a cyber universe with its clutter.

Then there were the hackers such as Vladimir. These were artists of the most rare and talented sort. Their code was lean and strong, producing results with the sparest of keystrokes. What they wrote was elegant, masterful.

The Russian had made his cyber reputation by discovering a vulnerability in Windows XP. He’d posted the details in various chat rooms to claim the credit. Several weeks later, Microsoft confirmed the vulnerability when it released a patch to repair it. Vladimir had responded by posting the details of a second vulnerability. This time it took Microsoft three months to release a patch.

In standard computer protocol, Vladimir had no business publishing the vulnerabilities. He should have given the information directly to the company. By taking the approach he had, he’d gained an initial reputation for himself, but he’d also exposed many thousands of Windows XP owners to virus attacks. By posting, he had been able to claim full credit. Had he notified Microsoft, then posted the details only
after
the security patch was released, he would have been mocked.

Vladimir’s reputation had grown when he posted the first vulnerability in Windows Vista within hours of its being released. In fact, he’d discovered three vulnerabilities while examining the beta version—but by that time he was losing interest in what he considered the juvenile game of claiming credit for finding weaknesses in the software giant’s programs. It was impossible to produce a complex program to serve so many millions of users and not leave
something
vulnerable. He’d claimed the one, but had quietly informed Microsoft of the other two.

Still, Vladimir’s reputation had been made. He’d had no lasting desire to involve himself daily in the cyber-hacker world and had always been a private person, so with the posting of the first Windows Vista vulnerability, he’d withdrawn from regular active exposure in the hacker chat rooms and forums.

By this time Vladimir had realized he possessed an extraordinary aptitude. It took another two years to turn it into meaningful income. Now his services were much sought after, and he could pick and choose his assignments. He maintained an e-gold account—a digital gold currency created to allow the instant transfer of gold ownership between users—into which his fees were deposited outside Russia. There were over 3 million e-gold accounts and nearly 4 million ounces of gold in storage. But one of the unintended uses of the accounts was to, in essence, allow the laundering of payments.

For his immediate need, Vladimir decided no help was to be found on the Internet. He returned to the code he was writing and tried again. Still … something eluded him. He went back and rewrote a section, then nodded. He copied the sequence and dropped it into his test computer. It worked.

Vladimir smiled. Slick. This last was his best. Even he was impressed.

9

MANHATTAN, NYC

IT CENTER

FISCHERMAN, PLATT & COHEN

TUESDAY, AUGUST 15

2:32 A.M.

As was his habit when working, Jeff set his digital watch to chirp every two hours. When it went off, he would stand from his station, stretch, then take a walk around the offices to exercise his body and clear his head, though a part of him never let go of the problem he was grappling with. He’d drink a Coke or a cup of black coffee, use the restroom, wash his face, then return to his place.

Respectful of his dedication, Sue didn’t break his concentration with idle chatter or questions about what she was seeing over his shoulder. She took her breaks at different times, always returning with the smell of cigarette smoke about her. He’d sniffed once before realizing it came from her. She’d said, “I know. A disgusting habit. I just
have
to quit.”

At one point some hours into the process, Harold disappeared. It could have been the middle of the night or broad daylight. Jeff had no idea. But when Harold returned with food from the all-night diner, Jeff realized how hungry he was. He wolfed down a ham-and-cheese sandwich just as the new framework dropped the unencrypted copy of the code onto his disk. He chewed as he analyzed it.

So far, he had discovered mostly negatives. The single most troubling development had been an attempt by the virus to replicate itself. In this case, it had failed, but, he realized, in other environments it might well be succeeding. It didn’t affect what he was doing today, though it could mean disaster for thousands of other businesses. But that was in the future. Right now he had to concentrate on what he was getting paid to do. As he finished the food and wiped his hands on a napkin, Jeff mentally groaned at what he saw. Even the decrypted code he’d labored so long to produce was obtuse. The cracker was using tricks that ran in the low-level environment. That meant that this approach was a dead end.

Jeff didn’t realize that Sue had been gone until she reentered the room. She came up behind him and leaned down at a time when he had his screen filled with the string output. Her proximity reminded him for a moment that she was an attractive woman. But almost as quickly as the sensation came, it vanished. It had happened before when he’d been drawn to a woman. He knew the shutting down of his emotions was related to Cynthia’s death, and the guilt he felt about not having done more to prevent it.

But nothing would ever change what had happened.

His BlackBerry rang, snapping him out of his gloom. “Excuse me,” he muttered to Sue, as he answered.

Sue took the opportunity to examine Jeff much more closely as he listened to his caller. She’d been attracted from the start and, having watched him work, was now even more impressed. Now she could take him in as a man and liked what she saw. She wondered if he mixed business with pleasure. In her experience, most men did, given the chance.

“I’m in Manhattan too, on a system crash. I’ve never seen anything like it. I’m sorry to hear about the deaths.” Jeff paused. “Sure, sure. That sounds good, Daryl. Maybe I’ll know something by then.” Slipping his BlackBerry back in his pocket, he looked up at Sue. “Sorry about that. A colleague. She’s in town working on something similar.”

“She’s obviously dedicated. It’s the middle of the night. Could it be the same virus?”

Jeff considered what Daryl had told him. “It’s possible, except her virus didn’t crash the system. Just caused it to malfunction in a deadly way.”

“I guess we should be thankful no one’s died even with all the problems we’re having. This could be a lot worse. Any luck? You’ve been at this for some time, and I thought I worked long hours.”

Jeff grinned. “It’s why I get the big bucks. I may not solve the problem, but they can’t complain about the time I put in.” Jeff’s smile vanished. “What I’ve found so far isn’t making much sense.”

“Any guesses?”

“Unfortunately, a few.” Leaning back in his chair, Jeff folded his arms across his chest. “So far, whatever you contracted isn’t a known variant of a virus. It doesn’t look very sophisticated, since it killed itself, and in probability is a cut-and-paste job at its core. But it was plenty destructive. It wanted to replicate, which is bad news for other computers. It’s also encrypted and deeply embedded, which is making my job very tough. From how some of the code is written, I can speculate that the author may be Russian. If true, that’s not reassuring at all. The Russian Mafia is heavily involved in financial fraud through malware.”

Jeff stopped and thought about the implications of what he’d just said. In recent years the Russian Mafia had hired the best software engineers in the former Soviet Union to create new viruses and unleashed them on the cyber world. They were making hundreds of millions a year, and the more they made, the more aggressive and creative they’d become.

“I’m surprised the virus has been so hard to find,” Sue said, focusing his thoughts.

“They usually aren’t,” Jeff agreed. “Typically, I spend most of my time recovering information and rebuilding systems. But lately I’ve been seeing more and more of this kind of thing. A cracker gets into your system to do damage, not to steal information. Not long ago a guy was caught who hired a cracker to shut down the Web sites of his major competitors. These were Internet businesses; as long as he got away with it, everyone’s customers went to him.”

“That’s terrible!” Sue knew the Internet was used for scams, but she’d never before heard such a story. To her, the Internet should be benign, a resource to make life better, not a destructive force.

Jeff knew what Sue was feeling. He often felt the same way. “I hate to say it, but that’s only one of hundreds of ways to profit from cybercrime. In the good old days, hackers were geeks out to make a name for themselves. Now they can earn money, sometimes big money, with the same skills and malicious intentions. There are even Web sites where you can download malware. You graft on something you’ve cooked up yourself, and you’re off and running. One guy got into a bank’s system and had a tenth of a penny—that’s all, just a tenth of a penny—taken from every transaction over one hundred dollars and wired into an offshore account. The bank’s computer was programmed to round pennies up, so it kept covering the shortage.”

“What’s a tenth of a penny?”

“I have no idea.” Jeff shrugged. “I guess they break currency down as far as they can. He could have asked for a twentieth, or a hundredth.”

“What happened?”

“Within four months he’d made over six hundred thousand dollars. Even then the bank’s computer kept covering for him. I don’t know how long it would have gone on if he hadn’t made the mistake of not deleting all bank-employee accounts from his scam. See, these people knew the system, and a lot of them balanced their checkbooks to the penny. One of them spotted that the accounting system was skewing and checked the programming. He found the virus, and it didn’t take long to find the crook.” Jeff took a sip of coffee. That hadn’t been his case, but he’d cracked one like it, and it had felt very, very good. In some ways the satisfaction he took from his work was more important than the pay.

“I’m surprised our security measures didn’t stop this. They were supposed to,” Sue said.

“All security systems are reactive in nature. That means the virus has a head start in infecting computers
before
it’s identified and enters the log of the antivirus and firewall programs. There are very sophisticated crooks who have taken to hiring crackers to deliver viruses that steal financial information. Computer security has become much more difficult now that there’s a great deal of money to be made. Russian crackers looted a French bank of more than one million dollars in 2006.”

Sue shook her head in amazement.

“Since your firewall and antivirus software didn’t spot whatever it is, it’s something off the charts,” Jeff said, rubbing his forehead, trying to ease his exhaustion away. “Something new, or something very sneaky—perhaps something targeted specifically at you. Any business makes enemies.”

Other books

ThinandBeautiful.com by Liane Shaw
CHOSEN by Harrison, Jolea M.
Furious Old Women by Bruce, Leo
Spanish Gold by Kevin Randle
44 Charles Street by Danielle Steel
Bellman & Black by Diane Setterfield
Skeleton Man by Joseph Bruchac
Killman by Graeme Kent
The Einstein Prophecy by Robert Masello