Jump to ratings and reviews
Rate this book

Jeff Aiken #2

Trojan Horse

Rate this book
The West is under its greatest threat yet in Mark Russinovich's Trojan Horse. A revolutionary, invisible computer virus that alters data without leaving a trace―more sophisticated than any seen before―has been identified within the computers of the United Nations, roiling international politics. Cybersecurity analysts Jeff Aiken and Daryl Haugen are summoned to root it out and discover its source.

As the virus penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.

333 pages, Kindle Edition

First published September 4, 2012

87 people are currently reading
1760 people want to read

About the author

Mark E. Russinovich

48 books365 followers
Mark Russinovich is a Technical Fellow in Windows Azure, Microsoft's cloud operating system group. Russinovich is a widely recognized expert in Windows operating system internals as well as operating system architecture and design.

Russinovich joined Microsoft when Microsoft acquired Winternals software, the company he cofounded in 1996 and where he worked as Chief Software Architect. He is also cofounder of Sysinternals.com, where he wrote and published dozens of popular Windows administration and diagnostic utilities including Autoruns, Process Explorer and Tcpview.

Russinovich coauthored "Windows Internals" and "The Sysinternals Administrator's Reference," both from Microsoft Press, authored the cyberthriller Zero Day, is a Contributing Editor for TechNet Magazine and Senior Contributing Editor for Windows IT Pro Magazine, and has written many articles on Windows internals. He has been a featured speaker at major industry conferences around the world, including Microsoft's TechEd, IT Forum, and Professional Developer's Conference, as well as Windows Connections, Windev, and TechMentor, and has taught Windows internals, troubleshooting and file system and device driver development to companies worldwide, including Microsoft, the CIA and the FBI. Russinovich earned his Ph.D. in computer engineering from Carnegie Mellon University.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
558 (24%)
4 stars
891 (39%)
3 stars
646 (28%)
2 stars
155 (6%)
1 star
22 (<1%)
Displaying 1 - 30 of 154 reviews
Profile Image for Chris (horizon_brave).
255 reviews5 followers
February 2, 2017
I really really wanted to like this series of books. And I've tried. I literally read through this book *twice* back to back. Just to see if perhaps the first go 'round I judged it unfairly... Alas..no. The book falls into the same trap, and even worse so, that the previous book falls into. Mark Russinovich is a very very smart, and talented man. In the field of security, and threat detection, he's a futurist, and a man that, has a lot of insight into what the future may hold for our political/techno world. I very much so trust his opinion and his idea's that the future of warfare will be shaped by the internet, and more covert cyberware rather than ground forces and bombs.
That being said... Mark...we're all not writers. Sadly to say, the art of writing a novel isn't a gift bestowed upon everyone. Trojan Horse, occurs a few years after Zero Day. Let's start off with my biggest praise of the series. The books start off with a very scary but ultimately very realistic look into different situations that could possibly happen if the right code fell into the wrong hands. We're given the scene of a team of doctors in the middle of an operation on someone's exposed brain, and the entire hospital goes lights out... a train is given the wrong signal on a track, and halted, while another train immediately behind collides... This similar intro was presented in Zero Day as well. Mark has quite the imagination when it comes to these types of events and ideas. He gives us very scary and thought provoking scenes that show us, we are vulnerable behind a shadow of a doubt. To this effect, Mark Russinovich, proves his mettle. Unfortunately, that's sort of where it ends. Mark is very good at showing us that we are and have been lulled into a false sense of security, and that our society is far far more vulnerable than we think. If the opportunity presented itself, we could be in serious trouble. The problem is...he made this point in his book Zero Day. We were present with the very same situation. The United States finds itself exposed and vulnerable, that honestly scares me. Then in Trojan Horse we're literally given the same set of circumstances just with a literal new plot.

Building on the idea that Trojan Horse bears too much resemblence to Zero Day, the characters all fall into the very same writing problems that they did in Zero Day. Mark does an excellent job presenting characters with interesting backstories, but utterly fails in bringing any of them to life. Each character, Jeff, Darryl, Frank, the host of shadowy bad guys are all flat and I honestly have no real emotional connection to any of them. That's pretty bad when your main character AND support characters can draw no emotional response. While the "bad guys" here are given some elaborate attention to detail in regards to their motivations (which is always a good thing), in the real time action of the story they come off as just cut outs and characters of little dimension.
I reason this to be the result of another major problem with Mark's writing. He spends far, far too long with the exposition. That is to say he sets up explanations that last pages. And it becomes tiresome. This is a complaint that dogged the first book as well. He has paragraphs explaining one matter, such as pgp keys. or a page dedicated to a political process or how a system works. These types of exposition is good if used sparingly. He literally drowns the book in it, and it leaves precious little room for actual character interaction, dialogue and anything in the way of writing for the characters.
Also, and again this is a carry over that runs into Trojan Horse as well... His characters just blur together. I read through this book twice, and I still couldn't tell you the individual characters on the Muslim/Chinese/European sides, to distinguish between them. What ends up happening is characters talk and say things, but because there's so little real substance, they just come off as flat and unengaging. Mark tries to throw in bits of humor, such as Darryl teasing Jeff about taking her on a vacation in Italy... or proding him with a jab about her getting used to certain treatment etc.. Unfortunately this type of dialogue is just empty. As there is absolutely zero relationship building in this series. Throughout zero day and trojan horse, relationships between characters is non-existant. There's a character in Trojan Horse, Frank something or another.. he's suddenly a close friend to Jeff and Darryl. But yet there's no setup to this, no follow ups, or anything. I feel as though in the way of personal lives and relationships, there's zero continuity. Nothing is followed up on, there's no consequence or continuing bit of subplot. Even Jeff's overly dramatic back story about his gf dying in the sept. 11th attacks (see my previous review of Zero Day as to why I think it's a pretty silly plot..) is not even mentioned here. And that's how Jeff,Darryl and mostly all the characters are... We're given these back stories, but none of them seem to affect the story, or future events at all. It means the characters are just flat, unmoving, static devices to advance the plot.

So getting passed the major problem of completely un-interesting characters, is the issue of actual plot. Don't get me wrong, I think the story lines are great and very realistic, but there is such a thing as "over the top". I'd rather see the characters go through a much more down to earth and realistic plot than some trumped up huge epic world ending storyline. Look...our character Jeff is the private owner of a small web security firm... The previous book already stretches the imagination that he gets wrapped up and is able to foil a terrorist plot and suddenly become a martial artist and gun totting bad ass and literally saves the United States. Alright...so a fluke right? A once in a lifetime deal that a real person would probably hold to be the greatest thing they ever accomplished in their lives... Nope, here's book two and the same "normal" guy Jeff Aiken is wrapped up in a 2nd even larger spread terrorist plot. Again managing to foil it and save the world ( I don't think that's an overstatement here) So what's my problem? It just comes off as being too fake and unbelievable. I know big plots and epic stories sell, but I'd probably really care for Jeff and Darryl a *tad* bit more if I could relate to them solving way way more down to earth crime or situation. Instead we're again given this hyped up plot that apparently a guy with just some basic logic can stop, but yet the entirety of the US intelligence agencies can't?

My last complaint is Mark's poor description of locales. Trojan Horse supposedly takes place in many different countries around Europe, China, and bits of the US. Yet there is absolutely no feeling given to any of these places. Ever. Aside from Mark mentioning the name of the current location in the beginning, I would have sworn that every chapter took place in the same area. There is no descriptive text or feeling given to any of the locales. (the only small exception is when Ahmed is in Prague I believe and describes standing out from the normal blonde/blue eyed crowd) This is a pity because the book spans many locations that could take more of a front seat and actually apply to the story, but nope. It comes off, just like the main characters...flat and inconsequential.

Both books just feel rushed and "going through the motions". The stories themselves are creative, the character backstories are lush, but none of it matters when the execution and writing of the novel itself is done so poorly. Aside from beating the bad guys the main characters have no movement. I really doubt I'll be in any rush to read and start Rogue Code. I have so little caring or motivation to read yet another installment of this series, because I'm 90% sure it'll be another carbon copy of these first two books. Sorry Jeff, you gotta save the world apparently without me...
Profile Image for RM(Alwaysdaddygirl).
456 reviews64 followers
February 22, 2020
2 stars. Technical part was interesting. The author and forward author have amazing technical experience. There were many journeys of the characters that was not believable. Disappointed.


🇺🇸
281 reviews3 followers
January 1, 2015
This might be my last Russinovich read. As it is, it is my second (after Zero Day) and that may be one too many. I just was not impressed at all.

The beginning had promise and the technical side of the story (which is done very well, as expected) was balanced nicely with the actual plot. I actually found myself worrying about how close this comes to reality in the beginning and thought that the Chinese were more terrifying than anything that was shown in Zero Day. But that didn't last long. Somehow we veered off to Middle Eastern terrorists and once the plot could not be held together with technical details, everything started falling apart.

I just don't think the writing is very good in this book. I don't want to go back and reread my review on Zero Day and be influenced, but I think that I thought the same thing with that one too. The characters, hero or villain, were just not that interesting. We kept jumping back between locales and supporting characters in an effort to mimic an international thriller (Bourne-esque) but it comes across as flimsy and badly paced. By the time that the plot circled back around to the Chinese, they felt as if the author had remembered them at the last minute and added them back in. The last quarter of the book was almost unreadable to me. I had to skim just to keep myself turning pages because the plot, characters or writing itself were not getting the job done.

One of my biggest problems with this book is the effort the author goes into writing excuses into the book; to explain away why things don't make sense. Characters seem to make these unexplainable leaps of logic that that are explained away by the author saying something like 'she doesn't know why she knows this, but she does...' that just seem ridiculous. It is as if the author painted himself into a corner and instead of finding a creative way out of the situation, takes the easiest/shortest route in order to keep the plot moving. For this to happen once or twice over the course of the story might be plausible because chance/randomness does exist, but this device is used so often that it just becomes tiresome.

There is plenty more to say about this book, but I am not sure that I want to invest any more time on it. If you take away anything from this review, it is that I just did not find this book worth the time it took to read it.
Author 2 books111 followers
Read
August 7, 2013
Сегодня дочитал вторую по счету художественную книгу Марка Руссиновича под названием “Trojan Horse”. Первой был аналогичный кибер триллер “Zero Day” (ревью - http://sergeyteplyakov.blogspot.com/2...), а эта книга является продолжением с теми же главными героями.

Как-то не знаю… Первое творение мне более или мене понравилось, не сюжетом, конечно, но и с ним все было не так и плохо. Вторая часть написана похожим образом, но вот положительных эмоций, почему-то стало меньше.
Понятно, что с точки зрения сюжета книги далеки от триллеров Тома Кленси, где распутывается клубок из десятка сюжетных линий, когда до середины вообще не понятно, чем они связаны. Да и описания боев, тактических действий и всякой такой триллеровской хрени явно не дотягивает до современных показателей (хотя чтение на английском может слегка искажать мое восприятие).

С другой стороны компьютерная составляющая, по идее, должна быть на высоте. Но вот она мне тоже не очень понравилась. Технари-персонажи при общении со своим руководством сыпят терминами и деталями, за которые эти самые руководители гнали бы их пинками из своих кабинетов. При этом сказать, что эти самые детали такие глубокие и интересные мне как технарю, я тоже не могу. Вот и получаются, что меня эти детали не впечатляют, а для неспециалиста они будут кадрами из фильма Хакеры, Матрица или «Пароль Рыба-Меч», в которых великие хакеры сидят за тремя мониторами и ломают вражеские системы из пейнта.

Идея кибер-преступности как таковой, весьма интересна, особенно если задуматься над качеством современного ПО и над тем, что в подавляющем большинстве случаев о безопасности никто не задумывается. С этой точки зрения идея автора хорошо, но вот с исполнением все же есть некоторые проблемы.

Да, в книге нет технических ошибок, но повествованию явно не хватает драйва и интриги. Сюжет похож на слегка искривленную стрелу: довольно прямой и весьма предсказуемый. Вот и получается, что книга отлично подходит для изучения английского языка, поскольку объем книги не велик, а лексика близка к технической. А вот с эстетической точки зрения, новое творение камрада Руссиновича вряд ли произведет серьезное впечатление.
183 reviews2 followers
October 19, 2012
OK, save the world in Zero Day, but don't let on, so when this all comes up again two years later, the folks in the intelligence services don't know what you have done, suspect you are just a cowboy, and you can almost get killed again.

Suggestion for the protagonists: read some self-help books on avoiding getting spied on, kidnapped, followed, shot, take some self defense training, hire some personal security, or get in another line of work.
Profile Image for Rick Howard.
Author 3 books46 followers
April 5, 2015
My Blog (Terebrate) review of this book: http://bit.ly/Wj67AB


Executive Summary:

I recommend this book for the casual reader that is interested in cyber security topics. It is not a must read for the cyber security professional, but it is a fun one. You will not learn anything new here, but you will enjoy wallowing around in a Clancy-esque story with cyber security tech as the main focus. In it, Russinovich describes the nature of the Chinese Cyber Espionage program, general hacking techniques, and the significance of STUXNET. If you are looking for some easy entertainment during a rainy weekend, this is your book.

Review:

The story picks up two years after “Zero Day” ended [12]. Daryl is now out of government service and working with her better half, Jeff, in his consulting firm. Jeff gets called in to track down a nasty piece of Malcode that changed the contents of an important UN document regarding the Iranian nuclear program prior to publication. Daryl comes in to assist and the two of them discover that the Chinese are behind the UN attacks. But, their investigation leads them to stumble upon the Chinese attempting to deliver a STUXNET Eradicator tool to the Iranians. For those not familiar, STUXNET is the infamous Malcode that the west launched against Iran to prevent the nation from building an atomic bomb [10]. Spy vs Spy hijinks ensue and our two heroes find themselves in all sorts of threatening physical situations from Chinese agents and their Muslim proxies. You know; a typical day for a geek.

That’s what I like about Mr. Russinovich. He throws a lot of ingredients into the pot, applies heat and stirs vigorously. While readers watch all of these things collide with each other, they also get a good history lesson on some recent cyber security issues and learn about some interesting hacks; some we have seen in the real world and others we have not seen but are quite possible.

Recent Cyber Security History

To sober the audience up a bit, Russinovich talks about the 2009 hacks against unmanned drones in the Middle East. Iraqi insurgents were able to capture video feeds from flying Predators by repurposing a $30 Russian software package called SkyGrabber that was originally intended to snatch music and videos that others are downloading [15][16].

To inform the reader about how prolific and successful the Chinese cyber espionage program is, Russinovich spotlights how the Chinese stole the plans for the Pentagon’s $300 Billion Joint Strike Fighter jet by hacking into military systems [7]. Hey also describes the forces involved in the Chinese Cyber Warfare program; how there are three hacker contingents in the country -- The Patriotic Hackers, the Militia and the PLA – and how none report to the same leader [13][14].

He also takes a shot at describing how STUXNET represents that first real-world example of Cyber Warfare. If you believe David Sanger in his most excellent book “Confront and Conceal: Obama’s Secret Wars and Surprising Use of Military Power,” the US and Israel have demonstrated that cyber warfare is a viable middle ground option when it comes to diplomacy between sanctions on the one side and bombing and/or occupation on the other [10].

And just for fun, he talks about how Jeff and Daryl track down a Malcode author because the hacker placed his home address in the code. This sounds crazy when you say it out loud like that but it actually happened in the real world. At a TED Talk in 2011, Mikko Hyoponen described that very thing [9].

Hacking Techniques

Mr. Russinovich packs a lot of realistic tech into this Story too. He does not shy away from pointing out that the Anti-Virus industry is really not very good at their job; at least for discovering new, never before seen malware [5][6]. He explains what a keylogger is and then explains how a nation state in the story uses them to compromise UN officials. He talks about the long-standing cyber philosophy of Responsible Disclosure where it is perfectly fine for researchers to discover vulnerabilities in commercial software but they should not go public with that information until the vendor has had time to fix it. He also talks about how that practice is losing ground to the lucrative market for selling these kinds of things to governments and independent contractors willing to pay large sums of money for just the right Zero Day [11].

In this story, Russinovich has devised a scary new piece of Malcode that, if it existed in the real world, would be a spy’s dream come true. The Malcode in question is smart about how its victim operates. It knows that the victim writes position papers using the Microsoft Word program. In this case, a United Nations official is writing disparaging remarks about Iran’s nuclear program. Once the official saves the final draft, he cryptographically signs the document before he sends it to the intended recipient. Signing the document like that guarantees the integrity of the file. When the receiver opens the document and verifies the signature, the receiver knows that the document he is reading is the same one that the sender gave him. But that is the rub. The Malcode understands that process and inserts itself into the seam. After the author saves the document but before he cryptographically signs it, the Malcode alters the document to say something that the Malcode author wants to be said. In this case, the Iranian nuclear program is not that bad. When the author signs the document, he has no idea that the Malcode has altered the contents and sends it on its way. I have not seen a piece of Malcode that does this in the real world, but it could be done. Russinovich even gives the Malcode the same “Call Home” design that the famous Conficker Worm used; essentially, generate thousands of random DNS names and systematically try each at random intervals. The Malcode author would place his command and control server at one of those names in the list of a thousand; kind of like hiding in the noise [8].

“Trojan Horse” is another fun romp in the political thriller genre that places cyber security geeks up front as the heroes. It is not a must read for the cyber security professional, but it is a fun one. You will not learn anything new here, but you will enjoy wallowing around in a Clancy-esque story with cyber security tech as the main focus.. If you are looking for some easy entertainment during a rainy weekend, this is your book.

Sources:

[1] “Announcing Trojan Horse, the Novel,” by Mark Russinovich, Mark Russinovich’s Blog, 8 May 2012, Last Visited 6 February 2013
http://blogs.technet.com/b/markrussin...

[2] “ZeroDay – A non-Fiction View,” by Mark Russinovich, RSA Conference 2012, 23 March 2012, Last Visited 13 February 2013
http://www.youtube.com/watch?v=SX7Lxv...

[3] “Windows Sysinternals,” by Mark Russinovich and Bryce Cogswell, Microsoft, , Last Visited 13 February 2013
http://technet.microsoft.com/en-us/sy...

[4] “Sony Rootkits and Digital Rights Management Gone too Far,” by Mark Russinovich, Mark Russinovich’s Blog, 31 October 2005, Last Visited 13 February 2013
http://blogs.technet.com/b/markrussin...

[5] “Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt
,” by Nicole Perlroth, The New York Times, 31 Dec 2012, Last Visited 24 February 2013
http://www.nytimes.com/2013/01/01/tec...

[6] “Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet
,” by Mikko Hypponen, Wired Magazine 6 June 2012, Last Visited 24 February 2013
http://www.wired.com/threatlevel/2012...

[7] “Computer Spies Breach Fighter-Jet Project,” by SIOBHAN GORMAN, The Wall Street Journal, 21 April 2009, Last Visited 24 February 2013
http://online.wsj.com/article/SB12402...

[8] “Conficker expectedly chaos-free as it activates across world,” by Dan Kaplan, SC Magazine, 1 April 2009, Last Visited 24 February 2013
http://www.scmagazine.com/conficker-e...

[9] “Fighting viruses, defending the net,” by Mikko Hypponen, TED Global, July 2011, Last Visited 24 February 2013
http://www.ted.com/playlists/10/who_a...

[10] Citation: “Confront and Conceal: Obama’s Secret Wars and Surprising Use of Military Power,” by David Sanger, June 5 2012.
http://www.amazon.com/Confront-Concea...

[11] “Rebuttal: Missing the Value of Bug Bounties,” by jericho, attrition.org, January 3 2013, Last Visited 27 February 2013
http://attrition.org/security/rebutta...

[12] “Book Review: “Zero Day (2011)” by Mark Russinovich,” by Rick Howard, Terebrate, February17 2013, Last Visited 27 February 2013
http://terebrate.blogspot.com/2013/02...

[13] “China’s Red Hackers: The Tale of One Patriotic Cyberwarrior,” by Hannah Beech, Time, February 21 2013, Last Visited 27 February 2013
http://world.time.com/2013/02/21/chin...

[14] “China’s Cyber-Militia,” by Shane Harris, National Journal, January 31 2011, Last Visited 27 February 2013
http://www.nationaljournal.com/magazi...

[15] “Drone hack explained: Professor details UAV hijacking,” by RT, July 3 2012, Last Visited 27 February 2013
http://rt.com/usa/texas-professor-dro...

[16] “SkyGrabber: hack of US drones shows how quickly insurgents adapt,” by Michael Farrell, The Christian Science Monitor, December 17 2009, Last Visited 27 February 2013
http://www.csmonitor.com/USA/2009/121...
Profile Image for Tibor Konig.
132 reviews2 followers
July 23, 2023
A nulladik nap folytatása, ugyanazokkal a főszereplőkkel, kicsit nagyobb gyakorlattal a cselekmény bonyolításában, de továbbra is elég valószínűtlen fordulatokkal. Azért ez eléggé "alkalmazott irodalom", a nagy erőssége még mindig az informatikai biztonság kihívásainak hiteles bemutatása.

Van a kötetben egy novella is, a címe "A Pusztulás hadművelet", ami sajnos rettenetes.

Egyelőre nem tudom eldönteni, elolvassam-e a harmadik kötetet ("Tolvaj kód") - most kicsit elszállt a lelkesedésem.
322 reviews2 followers
May 2, 2019
Superb pacy thriller. Set in a digital world that feels more than a little too real this feels like the kind of read that says a lot about the future of terrorism and crime, and is all the scarier for it.
I thought it might get too technical with the jargon but it kept things at just the right level of understanding even for a guy who actively swerves any kind of technobabble.
I'll be going back to read Zero Day, the first book of the series and am interested to see how iit has developed since then too
267 reviews
May 12, 2019
The plot to this one is basically the same as Russinovich's previous novel, Zero Day, which I wrote about in a previous post. This time Jeff and Daryl are after Iranian Muslims (of course), who are being aided by the Chinese, and a Turkish girl. The novel begins in a similar manner to Zero Day, in that everyday situations turn sour, due to everyday situations being dependent on technology which is susceptible to hackers. Iran are very close to completing their nuclear bomb, and don't want anything to interrupt them. This means they need to get the West off their case so that they can complete their work in peace. China (who we learn are very close to Iran due to their dependency on oil) create a Trojan Horse which allows China to edit files on user's computers. This allows China to change any reports that the UN are writing on the progress of Iran's nuclear arms. Of course, the UN finds out that the report has been changed, and so they bring in Jeff to take a look at what is happening. Cue a wild goose chase that takes us to Geneva, Prague and Turkey.

We learn in this novel that 3 Iranian Muslim agents with training in various terrorist acts are no match for 2 Americans with no training in conflict. Jeff and Daryl manage to escape from the Iranian's not once but thrice! Jeff escapes in Geneva, Jeff and Daryl escape in Prague, and finally Jeff escapes again in Turkey (the less said about the way they escape the better). More unfortunate is the demise of the 2 Chinese agents that make an appearance later in the book. The way Russinovich wipes them out is pitiful. There is zero suspense any where in the novel. Again, the plot is as thin as it gets, more as a platform for Russinovich to warn us of the dangers of software with security holes. I also felt that the technical details were even more jarring in this novel compared to his first.
This entire review has been hidden because of spoilers.
Profile Image for Wesley F.
336 reviews9 followers
February 2, 2017
A detailed technothriller that reminds me a lot of an NCIS episode. There's a little national security, international politics, and cyberwarfare mixed in with what is basically a story about a guy calling tech support. An unassuming premise that builds into a somewhat interesting story but author Mark Russinovich just doesn't generate that much excitement or drama.

Jeff Aiken is a cybersecurity expert coming off a huge success against Al Qaida. He is called in to analyze a potential security breach in UN and UK Foreign Ministry computers. The path of the malware program leads to a UN report on Iran's nuclear program, and evidence that Iranian hackers are behind the attack. Jeff and his partner Daryl (also his girlfriend) are not so sure.

This book is pretty dry. It is big on technical details, background information, and some very informative dialogue. While the subject-matter can definitely be exciting, this one just didn't get my blood pumping that much. Sure, it has action. But Russinovich isn't all that great at writing action. His expertise is cybersecurity, definitely not storytelling.

The ending is pretty underwhelming as well. There are no structural or glaring problems with the conclusion, or the plot in general, but really it just doesn't deliver a whole lot.

Trojan Horse is more for cybersecurity and IT experts, and not really for sci fi or general thriller readers. There isn't enough excitement or drama to carry it for a broader audience. If you love details and computers, this is for you. Otherwise, move on.
Profile Image for Peter.
Author 1 book5 followers
May 25, 2014
Mark Russinovich is great at demonstrating how different aspects of cyberwarfare work in the real world, by having his characters develop, deploy and try to counter the technology in fictional but realistic settings. Cyberwarfare is everywhere now - so far as an espionage tool and a proxy for physical warfare - but with serious real-world threats and consequences. I like reading Russinovich because I feel like I learn a lot about what the actual threats are and how they might work.
149 reviews
December 21, 2014
The author is a highly respected senior technologist at Microsoft, so the tech in this techno-thriller is good stuff. This is book 2 of the series, and the "book" part (as opposed to the techie part) is much better than the first one. Great insights about how vulnerable we all are to cyber terrorism.
Profile Image for Brian's Book Blog.
805 reviews62 followers
July 20, 2017
See this review and more like it at Brian's Book Blog

A Tight and Technical Technothriller

I read the original novel by Russinovich years ago (Zero Day) and absolutely loved it.  Jeff Aiken was such a fun and different character. And Russinovich was incredibly detailed in his writings about the zero day virus he was writing out.  It helps that he has lots of knowledge in the tech world having worked at Microsoft and other tech firms. 

Trojan Horse was a little different, showing off more of the thriller part of technothriller -- it was a little bit focused on the virus(es) and computer stuff, but more focused on Jeff and Daryl trying to save the world... again. 

The story itself was strong and a fun one to follow.  Trojan Horse as a book was one of the most fun technothrillers I've read in a while. There were just nonstop action scenes intermixed in with some technical detail here and there.  The best part is that this book is a few years old now and it could still be as true as the day it was written.  All of the things inside are possible, have happened, or could easily happen.

I can't wait to continue the series and read the third Aiken novel and I'll hopefully get to that this year. 

If you like action-packed Technothrillers -- Trojan Horse is definitely for you.  Russinovich wrote a tight and technical thriller that I'll remember for a while.

Trojan Horse was narrated by the great Johnny Heller -- if you're an audiobook person I don't have to say much more.  If you're not, he has a wonderfully easy voice to listen to and made this book fly by.
Profile Image for Ixby Wuff.
186 reviews2 followers
July 5, 2020

It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.


But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.


A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.

Profile Image for Elwin Kline.
Author 1 book11 followers
April 24, 2020
I really like these! They are a lot of fun.

Light, easy to digest, "techno-thriller", entertaining, full of hacker fun, drones, malware, evil terrorists, agents of good, kidnapping, women in duress who overcome their male attackers, gun fights, and more!

One of my co-workers in the past used to call books like this "pop-corn". Just something for entertainment and quick to consume, as he described it.

I considered giving this book a 3, but I honestly really did enjoy it. It's like watching an entertaining/good TV show and then moving on to something else and feeling totally okay with that.

Another thing that pushed me into giving this a 4, is at the end of the book the author does an interview/Q&A with Kevin Mitnick that was awesome. I've read all of Kevin Mitnicks books (Ghost in the Wires being my favorite! Highly recommend!)

If you are okay with accepting everything identified above, than I certainly recommend this series for a "getaway" read and just to have something light and fun.

I look forward to finishing the series and starting Rogue Code soon!
Profile Image for Rose Read.
53 reviews1 follower
July 18, 2019
On a technological aspect, this book feels incredibly real. The topic of cyber warfare will remain on headlines until the end of time. This book explains the workings behind a virus in a comprehensible manner for the average reader.
Plot-wise, the CIA agents being captivated with no weapons or self-defense training, is where the story falls short. The book essentially turns into a thriller, which I’m not complaining (I love thrillers). But I can see the reason for the upset readers who were looking for a more realistic approach to the situations going on.

Profile Image for Chris Knight.
425 reviews3 followers
April 26, 2021
Enjoyed this one more than the first in the series. Good amount of action. I've learned to suspend disbelief about a computer security expert operating as an agent in the field with the author's books. It's an effective way to generate a lot of action. The side characters in this novel were more fleshed out and not quite as numerous. Technical details for the most part aren't too far from being plausible.
5 reviews
July 30, 2020
The book covers some interesting stuff in the first quarter, but once the tech stuff is done, its pretty straight forward from there and very slow paced at times.
I would not recommend it for real hackers as it covers little technical details to make your head blow up.
All in all its still a decent read.
41 reviews
May 1, 2021
An easy read, and not full of horrible misconceptions about viruses and Trojan horses. But just not gripping despite all the action. And the author’s style of writing about a scene that involves persons A, B, C and starting this from A’s perspective, switching to B and C in mid-paragraph was not a good idea in my opinion.
77 reviews
July 17, 2024
This is spectacular. It has been in the news a lot how the Chinese government is constantly using Cyber warfare on the US and other countries' infrastructure, looking for weaknesses. They have been penetrating newspapers and blog sites around the world to find informants and dissidents. The novel was written before most of this has come to light to the public. This is a 4 1/2 Aces.
Profile Image for Dr. Christopher S. Hope.
20 reviews
November 20, 2018
As a security professional and professor of computer science, this book touches on the topics of my lectures and brings a real life scenario to the classroom. This is the James Bond of computers. Recommended to all my students.
103 reviews
January 11, 2023
A fairly light read much a like a Cussler or Clancy. Some reasonable discussion around technology, but the plot is fairly thin. Quite a buit of time is spent building to what was a bit of a sudden ending. Great for a suspending reality, probability and reationality.
196 reviews6 followers
June 23, 2025
I really enjoyed listening to this book. Mark Russinovich does not let you down as far as tech thrillers go. Definitely recommended if that is what you are looking for in a good story.

As an Audible piece I thought the Performance was good and the story excellent. Over all 4+ stars.
274 reviews13 followers
March 7, 2017
Meh. The first book was a bit frustrating at times but mostly fun. It was so in part because the computer-chase/analysis sequences were way more interesting than the action sequences, and the ratio in the first book leaned more toward the computer side, which the author clearly knows and understand.

This book reversed that ratio. There's a bit of computer sequences and then the rest of the book basically becomes one long action sequence. This is annoying because the characters aren't particularly smart in their choices (can't tell how much of that is intentional, since they're not professionals in the book, and how much is just to create plot problems) and way too much time is spent on the stories and backstories of the villains (and on random side stories or memos that sometimes seem totally irrelevant, wasteful, and boring).

The result is a fair bit of drudgery reading just to get through, and resolutions that seem as much based on luck as anything else. In one case in particular there's a lot of backstory and discussion of some side characters that ends by luck suddenly and unexpectedly going up in flames and making that whole set of characters and their backstory feel largely irrelevant to the plot. That and the whole thing feels like a gross underestimation of the capability and interest of the CIA or Mossad in such a situation, but that feels intentional because recognizing and leveraging those capabilities would have made short work of the problem and ended the book early and cleanly (might have been better).

The end result of it all is fairly boring. The author is a fairly well known computer professional with some real depth and background knowledge, and this book felt like a long exploration of how much he should have stayed within his wheelhouse in writing this story. Within it his work is generally quite interesting and fun to follow along with. Outside it not so much...
2 reviews
March 13, 2018
The book was enticing if you like crypto and hacking stuff, but it is a good read for people who are interested in cyber warfare as well
Profile Image for Erin Templeton.
172 reviews
July 16, 2018
The writing isn’t great, but the concepts here are really interesting.
16 reviews
January 23, 2019
A cyber thriller. You don't have to be a techie to enjoy this but, for me, it made it that much better.
Displaying 1 - 30 of 154 reviews

Can't find what you're looking for?

Get help and learn more about the design.