Feeds

Experts split over regulation for bounty-hunting bug sniffers

Exploit vuln marketplace grows rapidly

Build a business case: developing custom apps

RSA Europe Security researchers attending the RSA Europe conference are split over regulating the controversial exploit vulnerability marketplace.

In recent years several vendors, including Google, Firefox and later Facebook and PayPal have offered bug bounties for security researchers who find flaws in their products or services.

Technology suppliers such as iDefense and HP Tipping Point ZDI (Zero Day Initiative) offer to act as a middlemen between security researchers and vendors, offering between $500-$20,000 for exclusive details.

Knowledge of these vulnerabilities allows HP TippingPoint to add detection for attacks against vulnerabilities that have yet to be publicly disclosed, giving its Intrusion Prevention System (IPS) appliances and similar kit an edge over the competition.

Other less well-known firms, such as Endgame Systems, sell information about vulnerabilities to clients such as the US Department of Defense. Sketchy details of its business only emerged as a result of the HB Gary Federal hack by Anonymous in February 2011.

French outfit Vupen, meanwhile, thumbs its nose at the possibility of selling its security discoveries to Google, preferring to sell information to its customers.

Rapid growth

The exploit vulnerability marketplace appears to be growing at a rapid rate, partly driven by interest in the use of previously unknown security vulnerabilities to develop exploits for cyberweapons such as Stuxnet and Duqu.

Boldizsar Bencsath, assistant professor at the CrySyS Lab of the Budapest University of Technology and Economics, part of the team that first discovered Flame, told El Reg that the Microsoft 0day vulnerability used by the malware was probably discovered by independent security researchers.

They then sold their information on this vulnerability to the larger team developing the cyberespionage tool, which largely targeted victims in Iran.

"Finding vulnerabilities using reverse engineering is painstaking work requiring deep knowledge," Bencsath told El Reg. "It's quite possible, indeed likely, that the exploits were discovered by totally independent parties." Bencsath said the main team developing the malware were in his opinion a state-sponsored group, which he said was likely backed Israel and the US.

Security researcher Christopher Soghoian, who delivered a presentation about the exploit vulnerability marketplace at the recent Virus Bulletin conference, has likened the trade in exploits to a trade in weapons and raised the possibility of regulation.

"Politicians will inevitably get involved"

If vulnerabilities are sold in a completely open market then it's possible that US researchers, for example, will supply the bullets in attacks later used by hostile intelligence agencies from Russia, China or even Iran to target US business and infrastructure. Governments in general will be able to outbid the likes of Google and Microsoft, the argument goes.

Governmental use of Trojans, exploits and hacking is growing and this might be directed at internal dissidents as well as external targets.

Dancho Danchev, a security researcher at the anti-malware firm Webroot, told El Reg that regulation on the sale of exploits was coming, although he wasn't sure what form it would take. "Politicians will inevitably get involved," he said.

Security researchers who discover a bug have a choice of informing a vendor directly (potentially getting a reward in the process), selling it to a middleman (such as TippingPoint's ZDI) or auctioning it and selling it to the highest bidder.

Get rich and die trying

Greg Day, director of security strategy at Symantec, said that the volume of zero-day vulnerabilities was actually falling. "Security researchers should get a reward for discovering vulnerabilities but a black market for vulnerabilities is not the right long-term approach.

"Vulnerability researchers can adopt a 'get rich and die trying approach' but it doesn't work in the longer term," he added.

A senior member of the Jericho Forum, an independent group of IT security professionals, said that vendors such as Apple had to improve vulnerability reporting procedures. But he argued that a fringe element of security researchers would sell to black market sources, whatever incentives were given and however smooth the process of reporting was made.

Wolfgang Kandek, CTO at Qualys, said that proper incentives should be provided to "enable people to make a living from being white hats". Kandek, unlike Danchev, disagreed that there was a need for government regulation on who could sell and buy vulnerabilities.

Separately, he said that successful attacks often used more than one vulnerability. As operating system security has improved, hackers have turned their attention towards vulnerable technologies such as Java, he said. ®

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.