Risk
9/17/2013
10:19 AM
50%
50%

NSA Contracted With Zero-Day Vendor Vupen

NSA likely used French exploit service to keep tabs on the competition and run "deniable cyber ops," says cyber-weapon critic.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
The National Security Agency (NSA) has been a customer of France-based Vupen Security, which sells zero-day exploits.

That fact was revealed by public records service MuckRock, which filed a Freedom of Information Act (FOIA) request with the NSA earlier this month seeking "copies of contracts with Vupen Security and any final reports generated and delivered by Vupen to the agency over the past 10 years."

In response, the NSA shared a copy of an 18-page contract for a 12-month subscription to Vupen's "binary analysis and exploits service," dated Sept. 14, 2012. The contract was signed by both the NSA and Vupen CEO Chaouki Bekrar. Under the FOIA Act, some types of commercial and financial information can be withheld, and the cost of the NSA's Vupen subscription was blanked out.

Bekrar -- who's also Vupen's head researcher -- said via email that it was common sense that intelligence agencies would work with vulnerability sellers. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," he said. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries."

[ Want to know about NSA's decryption capabilities and what they mean for you? See NSA Crypto Revelations: 7 Issues To Watch. ]

Indeed, the NSA's subscription with Vupen -- which bills itself as "the leading provider of defensive and offensive cyber security intelligence" -- is hardly surprising, given what's known about the practice of selling exploits to the U.S. government, especially in the wake of Stuxnet. That malware, which was allegedly built by a combined U.S.-Israeli cyber-weapons program to target centrifuges at a uranium refinery in Iran, included exploits for four different zero-day -- aka previously unknown -- vulnerabilities.

Beyond crafting some future Stuxnet, why else might the NSA contract with a vulnerability seller? "[The] likely reasons for NSA subscription to Vupen's 0day exploits: know what capabilities other [governments] can buy, and false flag, deniable cyber ops," Christopher Soghoian, principal technologist and senior policy analyst for the ACLU's Speech, Privacy and Technology Project, said via Twitter. "There are times when U.S. special forces use AK-47s, even though they have superior guns available," he said. "Same for NSA's Vupen purchase. Deniability."

Vupen's website, meanwhile, makes no secret of the fact that it works with "government agencies and the intelligence community," and Bekrar emphasized that customers must meet "strict eligibility criteria," with customers being restricted to law enforcement and intelligence agencies in countries that are members or partners of NATO, the Australia, New Zealand, United States Security Treaty (ANZUS) or the Association of Southeast Asian Nations (ASEAN). Customers must also meet the requirements of the U.S. government's "Know Your Customer" guidance, and not be in any country that's on a restricted or embargo list maintained by the European Union, United States or United Nations.

Bekrar also said that although the company is based in France, it has no difficulty selling exploit information to eligible foreign governments. "France is one of the largest arms exporters, so why not cyber arms?" he said.

Vupen has previously drawn criticism from security experts, as well as privacy advocates such as Soghoian, who Monday characterized the firm as being a "zero-day cyber weapon merchant."

Why sell exploits? In fact, the vulnerability marketplace can be worth big bucks for bugs that can be turned into weaponized exploits. Last year, for example, the Bangkok-based vulnerability buyer and seller known as the GrugQ -- who takes a 15% commission on deals -- said that six-figure deals are common, and that he won't touch a vulnerability worth less than $50,000.

Vupen, however, differs from vulnerability brokers such as the GrugQ, or HP's Zero Day Initiative, which buy and sell other people's bugs. Bekrar said via Twitter Tuesday that "all of our research is done in-house," and that his firm doesn't buy or sell third-party exploits.

As the NSA contract suggests, business appears to be good for Vupen, which has made a name for itself by taking top prizes in multiple Pwn2Own competitions. Last month, Vupen also announced plans to expand to the United States by opening an office in Maryland and hiring vulnerability researchers who have clearance to handle top secret or sensitive compartmentalized information.

Learn more about defending your organization from cyber threats by attending the Interop conference track on Risk Management and Security in New York from Sept. 30 to Oct. 4.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
9/17/2013 | 4:19:25 PM
re: NSA Contracted With Zero-Day Vendor Vupen
Back in June, when the Prism scandal first broke, I wrote a column "Defending NSA's Prism Big Data Tools" http://ubm.io/12jwDfh I stand by my analysis that the technology itself is capable of handling data in a privacy sensitive way. But with everything I've read about NSA activities and actions since that time, I've lost confidence that the agency is being careful about respecting privacy. Quite to the contrary, between cracking encryption and seeking out exploits, it's quite apparent that NSA is willing to do whatever it takes to peer into every scrap of information available. There don't seem to be appropriate boundaries or a sense of accountability to the public.
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report