Last week I discussed about the necessity to define a model for "cyber conflict" to qualify the principal issues related to the use of cyber tools and cyber weapons in an Information Warfare context, today I decided to give more info to the readers on cyber arsenals of governments.SCADA within a critical infrastructure) or they could be used for large scale operations infecting thousand of machines exploiting zero-day in common application (e.g. Java platform, Adobe software).
The zero-day flaw are the most important component for the design of an efficient cyber weapon, governments have recently created dedicated cyber units to the discovery and exploitation of unknown vulnerabilities, but in many cases this precious knowledge is sold by private entities on the underground, consider that governments are the primary buyers of the growing market of zero-day. But governments aren't unique buyers, exploit kits including zero-day are acquired also by non government actors buying, it has been estimated that the market is able to provide 85 exploits per day, a concerning number for the security industry.
Zero-day hunters are independent hackers but in the majority of cases are structured security firms that analyze every kind of software to discover flaws exploitable during a cyber attack and resell their knowledge to the highest bidder, no matter if it is a private company that will use it against a competitor of a foreign government.
The NSS Labs have recently issued an interesting study study titled "The Known Unknowns", it reports that every day during a period of observation lasted three years, high-paying buyers have had access to at least 60 vulnerabilities targeting common software produced by Adobe, Apple, Microsoft and Oracle.
"NSS Labs have analyzed ten years of data from two major vulnerability purchase programs, and the results reveal that on any given day over the past three years, privileged groups have had access to at least 58 vulnerabilities targeting Microsoft, Apple, Oracle, or Adobe. Further, it has been found that these vulnerabilities remain private for an averagfe of 151 days. These numbers are considered a minimum estimate of the "known unknowns", as it is unlikely that cyber criminals, brokers, or government agencies will ever share data about their operations.
Specialized companies are offering zero-day vulnerabilities for subscription fees that are well within the budget of. A determined attacker (for example, 25 zero-days per year for USD $2.5 million); this has broken the monopoly that nation states historically have held regarding ownership of the latest cyber weapon technology. Jointly, half a dozen boutique exploits providers have the capacity to offer more than 100 exploits per year. "
It has been estimated that every year zero-day hunters develop combined 100 exploits resulting in 85 privately known exploits at the ready on any particular day. Consider that this is a row estimation that not consider the data related to an independent group of hackers which activities are poorly known.
On the black market an exploit for a Windows OS sells for up to $250,000 according the BusinessWeek , a good incentive for hackers to focus their efforts in the discovery of zero-day.
What is very concerning is that in many cases the entity that discovers the zero-day, to maximize the gains offers its knowledge to hostile governments, governments that use it also to persecute dissidents or to attack adversary states.
The zero-day market follows its own rules, the commodities are high deperible, the transactions are instantaneous and the agreement between buyers and sellers is very sensitive.
"According to a recent article in The"New"York"Times, firms such as VUPEN (France), ReVuln (Malta), Netragard, Endgame Systems, and Exodus Intelligence (US) advertise that they sell knowledge of security vulnerabilities for cyber espionage. The average price lies between USD $40,000 and USD $160,000. Although some firms restrict their clientele, either based on country of origin or on decisions to sell to specific governments only, the ability to bypass this restriction through proxies seems entirely possible for determining cyber criminals. Based on service brochures and public reports, these providers can deliver at least 100 exclusive exploits per year."
In particular the US contractor Endgame Systems reportedly offer customers 25 exploits a year for $2.5 million.
The knowledge on the zero-day vulnerability could be bought on the underground market or it could be acquired through open "bug bounty" processes, following some interesting data on the principal programs:
- Google paid approximately USD $580,000 over three years for 501 vulnerabilities discovered in the Chrome browser (= 28 percent of the patched vulnerabilities in the same period)
- Mozilla paid approximately USD $570,00 over three years for 190 vulnerabilities discovered in its Firefox browser (= 24 percent of the patched vulnerabilities in the same period)
- Facebook has paid approximately USD $1 million since the 2011 inception of its program.
- Microsoft has paid approximately USD $100,000 since the June 2013 inception of its program for reporting new exploitation techniques
I've found the report very interesting, but we have to consider the lack of reliable information to further quantify "known unknowns" "that are in the hands of cyber criminals or that are privately developed through consulting contracts, the assertion that there are 100 exploits available to privileged groups on any given day must be considered a reasonable minimum estimate those privileged category.
The uncontrolled and unregulated sale of zero-day pose a real and present threat to the security of government organizations and private corporations and software users, it's quite impossible to imagine a future scenario.