BeginnerThreat IntelligenceNarrativeGeopolitics

Sandworm

A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

5 / 5

Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2019
Publisher
Doubleday
Pages
368
Language
English

Table of contents

36 chapters

Part I: Emergence

  1. 1

    The Zero Day

  2. 2

    BlackEnergy

  3. 3

    Arrakis02

  4. 4

    Force Multiplier

  5. 5

    StarLightMedia

  6. 6

    Holodomor to Chernobyl

  7. 7

    Maidan to Donbas

  8. 8

    Blackout

  9. 9

    The Delegation

Part II: Origins

  1. 10

    Flashback: Aurora

  2. 11

    Flashback: Moonlight Maze

  3. 12

    Flashback: Estonia

  4. 13

    Flashback: Georgia

  5. 14

    Flashback: Stuxnet

Part III: Evolution

  1. 15

    Warnings

  2. 16

    Fancy Bear

  3. 17

    Penquin & BlackEnergy

  4. 18

    Industroyer / CrashOverride

Part IV: Apotheosis

  1. 19

    Maersk

  2. 20

    Shadow Brokers

  3. 21

    EternalBlue

  4. 22

    Mimikatz

  5. 23

    NotPetya

  6. 24

    Breakdown

  7. 25

    Aftermath

  8. 26

    Distance

Part V: Identity

  1. 27

    OlympicDestroyer

  2. 28

    Whodunit

  3. 29

    False Flags

  4. 30

    74455

  5. 31

    The Tower

  6. 32

    Russia

  7. 33

    The Indictments

Part VI: Lessons

  1. 34

    Bombshell

  2. 35

    Restraint

  3. 36

    Resilience

Prerequisites

None. Greenberg writes for the curious general reader, but practitioners will read it faster, not differently.

Read this if

Anyone who wants to understand the strategic context their day job sits inside, defenders, policy people, students choosing a path.

Skip this if

Readers wanting deep technical detail. The forensic granularity exists, but the book lives at the operational and political levels.

Key takeaways

  • NotPetya was not a ransomware accident; it was a wartime weapon that overshot.
  • Attribution is slow, contested, and political, but it is also possible and increasingly precise.
  • The line between cybercrime and statecraft is thinner than the threat-intel literature suggests.

Notes

Treats Sandworm not as a series of hacks but as a campaign with tempo, logic, and recurring actors. The Maersk-recovers-from-a-Ghana-domain-controller chapter is the kind of detail journalism is uniquely good at. The book to give people who keep asking what cybersecurity 'actually is.'