Blog
Tech

"One iPhone hack, please." "Gladly, that'll be two million dollars."

6 comments

Security holes are a much sought-after commodity especially those still unknown to the security community. As there is no defense against these attacks, they're fittingly called zero-day exploits with zero being the number of days software developers have to provide a fix. They are the perfect attack vector to distribute malware, steal data or sabotage computer systems - and there's a global market for them!

Inglorious holes

Aside from faceless hackers on the darknet who prefer anonymous Bitcoin transactions in exchange for exploits, there are also security companies that quite openly offer "advice and inspiration". Then there are exploit brokers who will act as intermediaries and are known for their discretion. They have long lists of, so far, undiscovered exploits that cover anything from Flash to Android, MS Office and MacOS. It's easy to picture a bidding war between potential buyers whoever that may be. Once the knowledge has been bought, existing malware is simply modified to target new vulnerabilities - or the ready-to-use program is purchased right away! Naturally, there's is no guarantee how long a vulnerability will remain unfixed (maybe the software developer is already in the know) so buyers may have ultimately spent large sums for nothing. What is shocking though is that, on average, vulnerabilities remain exploitable for a whopping 7 years.

Here's what it looks like in practice: a hacker discovers a vulnerability that allows for execution of malicious code in a popular program, a PDF reader for example. Or they notice a security flaw in a web-based application (like a login page) that exposes the underlying database and allows access to customer data. This is often achieved by inputting special commands instead of valid login credentials since many systems aren't properly hardened. Big online stores, banks, government sites and well-liked programs across operating systems are all equally popular targets - as they mean either big money or sensitive data.

Trading in undiscovered vulnerabilities

It's usually not lonely nerds in their basements that find new exploits, that's a rarity and a common cliché. Today, bug hunting is a highly professional business with entire teams picking apart program code, trying out new attacks and systematically hunting down weaknesses. Once successful, they can either sell their findings directly or fall back on brokers. Currently, there's no law that forces them to disclose their information for the public good. Naturally, the bigger the user base, the better the pay. Exploits for Firefox pay more than vulnerabilities in some niche application. Apart from Chrome, iOS and Windows are considered the major league and prices for such exploits can quickly climb up to seven-figure sums.

These days, prices are always rising anyway since weaknesses are increasingly harder to find. If you looked at past browsers or operating systems today, you'd seriously wonder why not all computers were infested with viruses back then as the software was that poorly designed. Nowadays, gaping holes are rare since companies are ramping up their security with strict quality checks for every piece of code. They know mistakes not only result in waning customer trust but may also lose them millions on the stock exchange. For vital code, companies may also hire outside agencies that legally employ hackers to track down bugs in their products. Only when they give the go will the software get published. But despite all security procedures, there's only one certainty: errors will be made - and found.

Grateful customers of zero-day exploits

There's no shortage of buyers and they also include affected companies or security software developers, naturally. Likewise, criminals seeking to distribute malware or to make a quick buck are also among the bidders and so are intelligence agencies all over the world that would just love to use the vulnerabilities to their own ends. After all, knowing how to sneak surveillance tools into browsers can have strategic advantages especially since the Internet is also used by political opponents, terrorists and criminals. Others may think more defensively and purchase knowledge about vulnerabilities to fix them before an attack happens. The German Federal Criminal Police office bought a complete suite for €147,000 that not only included a zero-day exploit but also the software to use it. It's a bit surreal that they didn't purchase the code itself but a 1-year license. Germans are such orderly people!

Activists have long been clamoring for a legal obligation to disclose vulnerabilities especially for government institutions. For example, US intelligence agencies are known for having a wide range of exploits at their disposal - and for making good use of them to circumvent and neutralize encryption methods and security systems of their opponents. Then again, they also knowingly expose the public to a significant threat. Whether brokers sell the same exploit multiple times or vulnerabilities are rediscovered by others, billions of systems remain insecure because of secrecy. In many instances, malware programs simply exploited what the government already knew for quite some time. So does government-funded cyber warfare outweigh public security? What do you think?

6 comments
  • A

    Se fosse i lingua italiana, sarebbe molto meglio - giorgio

    Sfortunatamente, non parlo italiano. :(

  • J

    Hi, I was reading the comments and saw Sven's comment about how Tim Berners-Lee created the internet during WW2???

    He wasn't alive then

    Born: Jun 08, 1955 · London, England

    That is indeed incorrect and I can’t remember ever writing that. :)

  • J

    Exploit = " to use someone unfairly for your own advantage."

    It is a Middle Ages English word, used in Old French, origin

    Latin, explicitum.

    There are many meanings from different regions of the world

    and words of historical interest are mixed in English, which in

    part is mixed with German and French.

    If one cares to translate the word to German there are a plethora of meanings for many different situations.

    In the context of this article both meanings are correct.

    ..................................................................................................

    Tim Berners-Lee created the Internet for a good cause during WW2 to assist in communications, he certainly wasn't aware that it would become a powerful, growing monster, assisting criminals and miscreants in their endeavours to create anonimity.

    Thank You Sven.

  • D

    Throughout history crime-fighters have often resorted to dubious methods in order to defeat criminals. In this, the cyber-crime battlefield is no different from pre-internet times.

    I'm no expert, but I suspect that if we try to prevent the good guys from sometimes straying into some bad territory, we'll be tying their hands behind their backs (to mix my metaphors!).

    Andrew Day - I disagree with your view on the use of the word 'exploit'. It can indeed mean a daring feat, but I suggest that its more frequently used meaning, as a noun or verb, is to indicate an extensive use.

    I'm delighted to see my readers discuss terminology. This aspect it often given to little attention especially in technical fields.

  • H

    Not to mention US gov trying to get chip makers to create back doors for Gov access. Word is they didn't succeed.... or did they?

  • A

    Thank you Sven. Very interesting as always.

    I know it's too late, but I dislike the use of the word 'exploit' in this context. To me an exploit is a bold or daring feat, not a security risk. Is it too late to suggest 'exploitable' as an alternative?

    (Zero-day) exploit is the technical term, there is nothing I can do about that. :)

About Ashampoo
Users
22+ million
Downloads
500.000+ per month
World-wide
In over 160 countries
Experience
Over 25 years
Ashampoo icon