TechWeb

Weaponized Bugs: Time For Digital Arms Control

Oct 09, 2012 (05:10 AM EDT)

Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=240008564


Who Is Anonymous: 10 Key Facts
Who Is Anonymous: 10 Key Facts
(click image for larger view and for slideshow)
Is it right that every newly discovered zero-day vulnerability can potentially be turned into a weapon?

Of course, not every bug goes down that path. Security researchers can disclose unknown vulnerabilities directly to vendors, then withhold details until the vendor issues a fix. They can also simply go public with information about the vulnerability. Or they can keep the details of the bug secret, and sell the information to the highest bidder. But if they do that, who's buying?

"Google and Microsoft can't outbid the U.S. government--they will never win a bidding war with the Army, Navy, or NSA," warned security and privacy expert Christopher Soghoian in his recent keynote speech at the Virus Bulletin 2012 conference in Dallas, titled, "The trade in security exploits: free speech or weapons in need of regulation?"

Recently, there's been a recent shift away from the old way of selling bugs, via "bug bounties and compensated responsible disclosure through firms like ZDI and TippingPoint," said Soghoian, principal technologist and a senior policy analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union. Instead, valuable bugs are now being resold by firms such as Endgame Systems and Vupen, who make no bones about the possibility that vulnerabilities might be used for espionage or even offensive operations.

[ Read So You Want To Be A Zero Day Exploit Millionaire? ]

What's a good bug worth? Earlier this year, Forbes profiled The Grugq, who's based in Bangkok and acts as a broker between vulnerability buyers and sellers. The Grugq, who takes a 15% commission, says he generally won't touch a bug unless it's worth at least $50,000, and six-figure deals aren't uncommon.

Security expert Charlie Miller, a former National Security Agency employee, said that he sold a Linux operating system Samba server software vulnerability in 2005 to the U.S. government for $80,000, after he was told to name a price. Although Miller now says he wished he'd asked for more money, he did admit to getting a fabulous new kitchen out of the deal.

That revelation, cited by Soghoian as the first publicly known sale of a vulnerability to the U.S. government, led to somewhat predictable banter, with The Grugq proposing via Twitter that henceforth, "[vulnerabilities] should be rated based on the number of kitchen remodeling projects they could sponsor," offering a baseline of "3 kitchens" for any malware signed with the digital certificates recently stolen from Adobe.




By many accounts, however, bug-selling remains a relatively exclusive arena, meaning it shouldn't be tough to regulate. Furthermore, that's unlikely to change, as it's difficult to turn zero-day millionaire, given fierce competition from other bug hunters, as well as the risk that a vendor might already have discovered a zero-day vulnerability, and have a fix in development.

Still, the price paid for some vulnerabilities suggests that ethically speaking, sellers might be up to no good. As Microsoft threat analyst Terri Forslof has said, "If I'm paying $50,000 for a vulnerability, what am I doing with it? I'm likely not trying to get it patched."

Vulnerabilities are hot in part because they can be weaponized and put to work quite quickly. "It doesn't take much time at all to commoditize a vulnerability into an exploit," said Sean Sullivan, security advisor at F-Secure Labs, in a blog post. For example, he found that the Adobe Flash Player security update (CVE-2012-1535) released Aug. 14, 2012, was followed the very next day by the appearance of in-the-wild attacks that used Microsoft Office Word documents with embedded exploits of the Flash vulnerability. Interestingly, one of the decoy Word documents that employed the Flash exploit was apparently targeting people interested in atomic weapons programs. And by Aug. 17, the exploit was part of the open-source Metasploit vulnerability testing toolkit.

Given the shift from bug bounties to vulnerabilities being used to power digital espionage or offensive operations, why not regulate the sale of dangerous bugs? Of course, new government regulations aren't the solution to every problem. But most governments do regulate the sales of arms so average Joes can't buy rocket launchers or fighter attack jets, unless, of course, they are Larry Ellison. Furthermore, because "cyber warfare" is meant to be the new military frontier, there's no reason not to regulate the buying and selling of zero-day vulnerabilities, at least to ensure they're not being used for nefarious purposes.

Currently, there are no laws against the buying or selling of bugs. "It's important to realize that, however much of an unpleasant taste this might or might not leave in your mouth, none of these people are acting illegally," says Graham Cluley, senior technology consultant at Sophos, in a blog post. "They've worked hard, using their skills to discover vulnerabilities in software systems. They are not exploiting these security holes themselves, and they aren't breaking the law."

What vexes many security experts is that the details of the bug remain hidden to all but the buyer, thus potentially putting everyone else at risk. Furthermore, what if an unscrupulous third party or foreign government gets its hands on the zero-day and begins using it to attack American businesses or government systems?

According to Soghoian, vulnerability sellers argue that the buying and selling of vulnerabilities should be left to free-market forces. But as he said in his keynote, once other governments begin snapping up zero-days and using them to attack the United States, the U.S. government might suddenly find itself arguing for regulating bug sales on the grounds of self defense. For consumers and businesses that rely on PCs and who don't want to find themselves at the receiving end of an undetectable, zero-day-driven targeted attack, that would be welcome news.

Cybercriminals are taking aim at your website. Is your security strategy up to the challenge? Also in the new, all-digital 10 Steps To E-Commerce Security issue of Dark Reading: About half of the traffic to e-commerce sites is machine generated--and much of it is malicious. (Free registration required.)