跳到主要內容

Hacking America - The thrill of the Hack, prosecuting Cybercrime

interview with Stephen Watt, aka UT (Unix Terrorist)  - convicted felon

CNBC video

For start-ups eager to displace more established military contractors, selling vulnerabilities—and expertise about how to use them—has become a lucrative opportunity. Firms like Vupen in Montpellier, France; Netragard in Acton, Mass.; Exodus Intelligence in Austin, Tex.; and ReVuln, Mr. Auriemma's and Mr. Ferrante's Maltese firm, freely advertise that they sell knowledge of the flaws for cyberespionage and in some cases for cyberweapons.
Outside Washington, a Virginia start-up named Endgame—in which a former director of the N.S.A. is playing a major role—is more elusive about its abilities. But it has developed a number of tools that it sells primarily to the United States government to discover vulnerabilities, which can be used for fighting cyberespionage and for offensive purposes.
Like ReVuln, none of the companies will disclose the names of their customers. But Adriel Desautels, the founder of Netragard, said that his clients were "strictly U.S. based" and that Netragard's "exploit acquisition program" had doubled in size in the past three years. The average flaw now sells from around $35,000 to $160,000.
Chaouki Bekrar, the founder of Vupen, said his company did not sell to countries that are "subject to European Union, United States or United Nations restrictions or embargoes." He also said revenue was doubling every year as demand surged. Vupen charges customers an annual $100,000 subscription fee to shop through its catalog, and then charges per sale. Costs depend on the sophistication of the vulnerability and the pervasiveness of the operating system.
ReVuln specializes in finding remote vulnerabilities in industrial control systems that can be used to access—or disrupt—water treatment facilities, oil and gas pipelines and power plants. "They are engaging in willful blindness," said Christopher Soghoian, a senior policy analyst at the American Civil Liberties Union.
Many technology companies have started "bug bounty" programs in which they pay hackers to tell them about bugs in their systems rather than have the hackers keep the flaws to themselves—or worse, sell them on the black market. Nearly a decade ago the Mozilla Foundation started one of the first bounty programs to pay for bugs in its Firefox browser. Since then, Google, Facebook and PayPal have all followed suit. In recent months, bounties have soared.
In 2010, Google started paying hackers up to $3,133.70—the number is hacker code for "elite"—for bugs in its Web browser Chrome. Last month, Google increased its cash prize to $20,000 for flaws found in some of its widely used products. Facebook began a similar program in 2011 and has since paid out $1 million. (One payout included $2,500 to a 13-year-old. The most it has paid for a single bug is $20,000.)
"The program undermines the incentive to hold on to a bug that might be worth nothing in a day," said Joe Sullivan, Facebook's chief security officer. It had also had the unintended effect of encouraging ethical hackers to turn in others who planned to use its bugs for malicious use. "We've seen people back-stab other hackers by ratting out a bug that another person planned to use maliciously," he said.
Microsoft, which had long resisted such a program, did an about-face last month when it announced that it would pay hackers as much as $150,000 for information about a single flaw, if they also provided a way to defend against it.
Apple still has no such program, but its vulnerabilities are some of the most coveted. In one case, a zero-day exploit in Apple's iOS operating system sold for $500,000, according to two people briefed on the sale.
Still, said Mr. Soghoian of the A.C.L.U., "The bounties pale in comparison to what the government pays." The military establishment, he said, "created Frankenstein by feeding the market."
In many ways, the United States government created the market. When the United States and Israel used a series of flaws—including one in a Windows font program—to unleash what became known as the Stuxnet worm, a sophisticated cyberweapon used to temporarily cripple Iran's ability to enrich uranium, it showed the world what was possible. It also became a catalyst for a cyberarms race.
When the Stuxnet code leaked out of the Natanz nuclear enrichment plant in Iran in the summer of 2010, the flaws suddenly took on new value. Subsequent discoveries of sophisticated state-sponsored computer viruses named Flame and Duqu that used flaws to spy on computers in Iran have only fueled interest.
"I think it is fair to say that no one anticipated where this was going," said one person who was involved in the early American and Israeli strategy. "And today, no one is sure where it is going to end up."
In a prescient paper in 2007, Charlie Miller, a former N.S.A. employee, described the profitable alternatives for hackers who may have otherwise turned their information about flaws over to the vendor free, or sold it for a few thousand dollars to programs like Tipping Point's Zero Day Initiative, now run by Hewlett-Packard, which used them to enhance their security research.
He described how one American government agency offered him $10,000 for a Linux bug. He asked another for $80,000, which agreed "too quickly," Mr. Miller wrote. "I had probably not asked for enough."
Because the bug did not work with a particular flavor of Linux, Mr. Miller eventually sold it for $50,000. But the take-away for him and his fellow hackers was clear: There was serious money to be made selling the flaws.
At their conventions, hackers started flashing signs that read, "No more free bugs."
Hackers like Mr. Auriemma, who once gave away their bugs to software vendors and antivirus makers, now sound like union organizers declaring their rights.
"Providing professional work for free to a vendor is unethical," Mr. Auriemma said. "Providing professional work almost for free to security companies that make their business with your research is even more unethical."
Experts say there is limited incentive to regulate a market in which government agencies are some of the biggest participants.
"If you try to limit who you do business with, there's the possibility you will get shut out," Mr. Schmidt said. "If someone comes to you with a bug that could affect millions of devices and says, 'You would be the only one to have this if you pay my fee,' there will always be someone inclined to pay it."
"Unfortunately," he said, "dancing with the devil in cyberspace has been pretty common."

留言

這個網誌中的熱門文章

越南香草

Ngo ~ "N-gaw" Mui ~ "Moo-ee" Ngo ~ "N-gaw" Mui ~ "Moo-ee" Ngo ~ "N-gaw" Mui ~ "Moo-ee" Ngo (N-gaw) ,  Mui  (Moo-ee )  Cilantro Ngo Gai (N-gaw guy), Mui Tau (Moo-ee Tao), Ngo Tau (N-gaw Tao)   Mexican Coriander,  Sawtooth Coriander, Culantro    娥女帝(拼音), 刺芹   特徵:娥女帝是短株形的植物,氣味清淡,葉邊呈鋸齒形,十分容易辨認。來源地:越南。 功效:和白夏差不多,娥女帝亦有祛濕、解毒及驅風的療效。建議食法: Pho,  (Bánh Xeò) 越南煎餅, 炒菜,湯,咖哩 Ngo Gai ~ "N-gaw guy" Mui Tau ~ "Moo-ee Tao" Ngo Tau ~ "N-gaw Tao" - See more at: http://vietworldkitchen.typepad.com/blog/vietnamese-herb-primer.html#sthash.I9rzkzwI.dpuf Rau Ram (Rau Rahm) Vietnam Coriander, Laksa Leaf, "Vietnamese mint(actually not a mint)" Peppery, quite spicy. In salad Hung (Hoong), , Hung Lang (Hoong Lang) Spearmint.  Vietnamese coriander Hung Lui (Hoong Lou-ee), Hung Diu(Hoong Zee-ew) round mint used in salad Hung Cay (Hoong Kay) Mint Rau Que, Hung Que (H

copycat comandante C40 grinder

 from facebook 尋日朋友話係強國網上買左支C40,重要係斑馬木,話要拎嚟同我炫耀下,咁咪拎過嚟我到開箱囉。   斑馬木都停產左好耐,重要買到全新,重要係強國網,佢話買左二千四人仔,我當然半信半疑,見到面拎上手都好重手下,紙盒都算幾真,都幾結實,印刷都唔覺有太大問題,打開盒先開始覺得唔對路(圖1-14開箱圖)。 -1號圖,招紙貼得有d皺,但印刷都算幾清晰。 -2、3號圖,打開就爛左。 -4、5號圖,玻璃樽色澤、材質明顯有問題。 -7同9號係片,一定要聽下啲聲,好怪。 -8號圖,可以睇到冚蓋後,好大條罅。 -10號圖睇到,9號條片扭左幾下,不停有碎跌出黎。 -11號圖,拎出黎就花曬。 -12、13號圖,本身印刷品質數都高,但對番正版個張唔會有黑色油墨跡。 -14號圖,主體Logo係焫落去,有凹凸感,之後用正版對比,先發現問題。  立刻拎支正版出黎比對下。 -15-19號圖,如果無正版盒係手,就咁拎住個假盒都可能呃到下人,但真盒一拎上手,非常硬正,敲落去感覺好唔同。     -20-25號圖,基本重量無太大分別,假貨手柄比較重,正版高度比較多一點點。 -26-30號圖,透明、茶色粉杯一比之下就睇得出分別,正版比較通透、清晰,玻璃瓶品質高。 -31-33號圖,手柄膠片位有花、有明顯水口位,正版無水口,好平滑,木柄和連接轉軸位置都有所不同。 -34號片,正版磁力強,手柄好穩陣,假貨倒轉就跌出嚟,連磁石都甩埋(35號圖)。 -36-37號圖,歸零後正版手柄會卡住,假貨由於磁石位置甩咗,所以鎖唔住。 -38-39號圖,塑膠位置標誌以及文字正版都比較突顯、清晰。 -40號圖,未用內膽就有多處刮花。 -41-44號圖,驟眼睇真係好似,螺絲都跟都幾足,但網上搵左好多圖睇過,基本上文字同刀邊都會有距離,假野比較貼。 -45號圖,刀頭格數卡位用嘅孔,開箱個時扭左幾下已經有碎屑跌出嚟,放大睇更明顯睇到分別,正版手工好好,假野好似月球坑咁。 -46-47號圖,46正版歸零後好平,47扭到好盡,歸零唔順暢,有少許凸起。   -48號片,調節格數聲音,都唔洗講,一聽就知大問題 -49-50號圖,假貨膠料位置明顯水口,螺絲也有分別。 -51-52號圖,正版刀頭用左成年都好新,假貨扭左半日都無,就刮左個圈出黎蝕曬,鋼水差。   -53-56號圖,木面Logo雖然都做到好真,但都搵到分別

劣質洗衣機入水喉

上面白色是最易找到,$2x. 但漏水. 灰色, $4x, 是假冒 "MADE IN ITALY"  假冒 "MADE IN ITALY"  的標緻  左面是白色膠喉的喉頭, 右面是灰色膠喉的喉頭, 上圖左面是真正 好貨 ( MADE IN ITALY )灰色膠蓋.右面是冒牌 白色膠蓋. 膠蓋在安裝扭緊時爆開  上圖左面是真正 好貨 , 標了其他規格.右面是冒牌, 單單印了 MADE IN ITALY  好貨的膠蓋是可以下移, 露出喉頭及黑色軟膠墊 黑色軟膠墊是有坑紋. 質感較柔軟. 緊後可以"迫實"水龍頭 及喉蓋, 沒有滲漏 正板 MADE IN ITALY 賣 $4x, 價錢絕對合理. 冒牌貨在旺角新填地街買的, 也是$4x. 真是要小心!!! NB: MADE IN ITALY 是否真正 意大利制造實在無從考 証