Risk
9/17/2013
10:19 AM
50%
50%

NSA Contracted With Zero-Day Vendor Vupen

NSA likely used French exploit service to keep tabs on the competition and run "deniable cyber ops," says cyber-weapon critic.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
The National Security Agency (NSA) has been a customer of France-based Vupen Security, which sells zero-day exploits.

That fact was revealed by public records service MuckRock, which filed a Freedom of Information Act (FOIA) request with the NSA earlier this month seeking "copies of contracts with Vupen Security and any final reports generated and delivered by Vupen to the agency over the past 10 years."

In response, the NSA shared a copy of an 18-page contract for a 12-month subscription to Vupen's "binary analysis and exploits service," dated Sept. 14, 2012. The contract was signed by both the NSA and Vupen CEO Chaouki Bekrar. Under the FOIA Act, some types of commercial and financial information can be withheld, and the cost of the NSA's Vupen subscription was blanked out.

Bekrar -- who's also Vupen's head researcher -- said via email that it was common sense that intelligence agencies would work with vulnerability sellers. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," he said. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries."

[ Want to know about NSA's decryption capabilities and what they mean for you? See NSA Crypto Revelations: 7 Issues To Watch. ]

Indeed, the NSA's subscription with Vupen -- which bills itself as "the leading provider of defensive and offensive cyber security intelligence" -- is hardly surprising, given what's known about the practice of selling exploits to the U.S. government, especially in the wake of Stuxnet. That malware, which was allegedly built by a combined U.S.-Israeli cyber-weapons program to target centrifuges at a uranium refinery in Iran, included exploits for four different zero-day -- aka previously unknown -- vulnerabilities.

Beyond crafting some future Stuxnet, why else might the NSA contract with a vulnerability seller? "[The] likely reasons for NSA subscription to Vupen's 0day exploits: know what capabilities other [governments] can buy, and false flag, deniable cyber ops," Christopher Soghoian, principal technologist and senior policy analyst for the ACLU's Speech, Privacy and Technology Project, said via Twitter. "There are times when U.S. special forces use AK-47s, even though they have superior guns available," he said. "Same for NSA's Vupen purchase. Deniability."

Vupen's website, meanwhile, makes no secret of the fact that it works with "government agencies and the intelligence community," and Bekrar emphasized that customers must meet "strict eligibility criteria," with customers being restricted to law enforcement and intelligence agencies in countries that are members or partners of NATO, the Australia, New Zealand, United States Security Treaty (ANZUS) or the Association of Southeast Asian Nations (ASEAN). Customers must also meet the requirements of the U.S. government's "Know Your Customer" guidance, and not be in any country that's on a restricted or embargo list maintained by the European Union, United States or United Nations.

Bekrar also said that although the company is based in France, it has no difficulty selling exploit information to eligible foreign governments. "France is one of the largest arms exporters, so why not cyber arms?" he said.

Vupen has previously drawn criticism from security experts, as well as privacy advocates such as Soghoian, who Monday characterized the firm as being a "zero-day cyber weapon merchant."

Why sell exploits? In fact, the vulnerability marketplace can be worth big bucks for bugs that can be turned into weaponized exploits. Last year, for example, the Bangkok-based vulnerability buyer and seller known as the GrugQ -- who takes a 15% commission on deals -- said that six-figure deals are common, and that he won't touch a vulnerability worth less than $50,000.

Vupen, however, differs from vulnerability brokers such as the GrugQ, or HP's Zero Day Initiative, which buy and sell other people's bugs. Bekrar said via Twitter Tuesday that "all of our research is done in-house," and that his firm doesn't buy or sell third-party exploits.

As the NSA contract suggests, business appears to be good for Vupen, which has made a name for itself by taking top prizes in multiple Pwn2Own competitions. Last month, Vupen also announced plans to expand to the United States by opening an office in Maryland and hiring vulnerability researchers who have clearance to handle top secret or sensitive compartmentalized information.

Learn more about defending your organization from cyber threats by attending the Interop conference track on Risk Management and Security in New York from Sept. 30 to Oct. 4.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
9/17/2013 | 4:19:25 PM
re: NSA Contracted With Zero-Day Vendor Vupen
Back in June, when the Prism scandal first broke, I wrote a column "Defending NSA's Prism Big Data Tools" http://ubm.io/12jwDfh I stand by my analysis that the technology itself is capable of handling data in a privacy sensitive way. But with everything I've read about NSA activities and actions since that time, I've lost confidence that the agency is being careful about respecting privacy. Quite to the contrary, between cracking encryption and seeking out exploits, it's quite apparent that NSA is willing to do whatever it takes to peer into every scrap of information available. There don't seem to be appropriate boundaries or a sense of accountability to the public.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.