PLAY PODCASTS
Agent.BTZ
Season 1 · Episode 8

Agent.BTZ

In the Shell

December 2, 202414m 25s

Audio is streamed directly from the publisher (files.yellowball.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

In this episode, we dive into the Agent.BTZ cyber incident—a sophisticated worm that penetrated U.S. military networks through a simple USB drive. Traced to Russian cyber espionage actors, this attack exposed critical vulnerabilities in military cybersecurity, leading to the creation of USCYBERCOM and fundamental changes in digital defense strategies. The episode reveals how a single piece of malware triggered a global reassessment of cyber warfare, highlighting the critical role of human behavior in technological security.


Don't just host your podcast, own it

🟡 Yellowball is a podcast hosting service I built to give podcasters more control and less nonsense. Whether you’re starting fresh, moving your show over, or just curious, check it out at https://yellowball.fm.


References

https://www.wired.com/2008/11/army-bans-usb-d/

https://www.wired.com/2010/03/ff_cyberwar/

https://www.washingtonpost.com/wp-dyn/content/article/2008/12/08/AR2008120803722.html

https://www.symantec.com/security-center/writeup/2008-071813-2408-99

https://www.gao.gov/products/gao-20-241

https://www.nsa.gov/news-features/speeches-testimonies/speeches/

https://www.simonandschuster.com/books/Dark-Territory/Fred-Kaplan/9781476763279

https://www.kimzetter.com/countdown-to-zero-day

https://www.cfr.org/defense-and-security/cyber-operations-and-cybersecurity

https://ndupress.ndu.edu/Media/News/News-Article-View/Article/571543/cyber-power-and-national-security/

https://www.rsaconference.com/Library

https://www.blackhat.com/html/archives.html

http://news.bbc.co.uk/2/hi/technology/7751641.stm

https://www.nytimes.com/2009/05/29/us/politics/29cyber.html

https://www.brookings.edu/experts/peter-w-singer/

https://symantec-enterprise-blogs.security.com/


Topics

cybersecuritymalware storiestech legendscyber threatshacker profilescyber attacksvirus historycyber espionageonline threatscybercrimetech titansdigital warfarecyber defense