Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/17/2008
09:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Big Bucks Bug-Brokering Program Shuttered

'Cadillac' buyers were taking too long to close the deal

It turns out that the high-end zero-day exploit market isn’t so lucrative anymore: Netragard LLC as of yesterday had shut down its bug-brokering program aimed at getting researchers big bucks -- anywhere from $10,000 to $200,000 -- for exploits they developed.

Adriel Desautels, who founded the SNOSoft research team that ran the so-called Exploit Acquisition Program, says Netragard’s zero-day buyer clients had begun taking an excessive amount of time to close the deal and pay for the bugs they had either commissioned Netragard to get from researchers, or that Netragard had sold to them on behalf of researchers.

“An exploit has a short shelf life,” says Desautels, chief technology officer for security firm Netragard. “To successfully broker exploits and be able to broker to a buyer, we need to be able to move within one week or one month… three months can be okay, depending on the item.”

The last straw was a recent deal that went unpaid for seven months and left the researchers and Netragard empty-handed. “The buyer just didn’t get its act together fast enough, and seven months elapsed and suddenly all of the issues were suddenly fixed,” so the zero-day exploit was basically worthless, he says.

Desautels can’t reveal any of the businesses who were buying exploits through the Netragard program, but he says they were legitimate U.S.-based organizations, many of which he had known for 15 years. He first launched the bug broker business in 2000 under the name Secure Network Operations; Netragard took it over a year ago.

He says the high-end, Cadillac-type bug brokering market isn’t “viable” unless the buyers move more quickly to close the deals. “The slowdown killed the whole program,” he says. The average transaction time with a buyer jumped from a month or less to four months, and that’s too long, he says.

HD Moore, director of security research for BreakingPoint Systems, says the $50,000 price tag that was often associated with Netragard’s bug-buying program was too high. “Personally, I think $50K for a bug was ridiculous and the bottom was going to drop out anyway,” Moore says. “[But] the $10,000- to $15,000 exploit market is alive and well.”

The danger, of course, is that researchers who had been working with Netragard may get tempted to peddle their zero-days on the dark side, where cybercriminals may be willing to pay top dollar. “I absolutely worry” about that, Desautels says. “The threat that could be created by these items can be significant.”

The high-end black market is alive and well. Moore (who doesn’t buy or sell vulnerabilities) says he was recently approached by a sketchy potential buyer interested in a browser vulnerability he had posted in the Month of Browser Bugs.

“I was approached about a browser exploit by a firm that said they wanted to do training and they ‘needed’ a zero-day exploit to verify it,” he says. “I went through enough of the motions to check it out, mostly because I was curious how it worked. Even though this person had a real business, the reason for wanting the exploit didn't make sense, but it was easily ten times the price that iDefense or ZDI would have offered.”

iDefense, ZDI, and Immunity Inc., for instance, each run their own bug-buying programs, where they purchase vulnerabilities for internal use. Immunity rolls the exploits it buys into its penetration testing tools, for example.

"Immunity buys a lot of vulnerabilities. We also find that people who are interested in selling their information want lots of different ways to do so,” says David Aitel, CTO of Immunity. "For example, you may not be able to get an exclusive license to information. Lots of people sell to Immunity who do not want Immunity to handle going to the vendor for them the way TippingPoint or iDefense would. Flexibility is key.”

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • BreakingPoint Systems
  • Immunity Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
    Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
    DevSecOps: The Answer to the Cloud Security Skills Gap
    Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
    Attackers' Costs Increasing as Businesses Focus on Security
    Robert Lemos, Contributing Writer,  11/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2013-3311
    PUBLISHED: 2019-11-21
    Directory traversal vulnerability in the Loftek Nexus 543 IP Camera allows remote attackers to read arbitrary files via a .. (dot dot) in the URL of an HTTP GET request.
    CVE-2013-3312
    PUBLISHED: 2019-11-21
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Loftek Nexus 543 IP Camera allow remote attackers to hijack the authentication of unspecified victims for requests that change (1) passwords or (2) firewall configuration, as demonstrated by a request to set_users.cgi.
    CVE-2013-3313
    PUBLISHED: 2019-11-21
    The Loftek Nexus 543 IP Camera stores passwords in cleartext, which allows remote attackers to obtain sensitive information via an HTTP GET request to check_users.cgi. NOTE: cleartext passwords can also be obtained from proc/kcore when leveraging the directory traversal vulnerability in CVE-2013-331...
    CVE-2013-3314
    PUBLISHED: 2019-11-21
    The Loftek Nexus 543 IP Camera allows remote attackers to obtain (1) IP addresses via a request to get_realip.cgi or (2) firmware versions (ui and system), timestamp, serial number, p2p port number, and wifi status via a request to get_status.cgi.
    CVE-2015-2793
    PUBLISHED: 2019-11-21
    Cross-site scripting (XSS) vulnerability in templates/openid-selector.tmpl in ikiwiki before 3.20150329 allows remote attackers to inject arbitrary web script or HTML via the openid_identifier parameter in a verify action to ikiwiki.cgi.