Last week NSS Labs launched an online site for selling exploits. To anyone with a vague grasp of the way IT security works, that might sound like a very bad idea. In fact it’s a good one – and fairly well established.
The NSS Labs Exploit Hub will let people buy working exploit code – software that can break into IT systems through vulnerabilities which exist in the operating systems and apps running on them.
Software has vulnerabilities, and the security game is usually seen as a race between hackers and security researchers, to find those flaws and create code that exploits them (hackers) or patches which seal the vulnerability (researchers). If security is a contest between exploits and vulnerabilities, why increase the flow of exploits?
Where do they get those exploits? They can use the malicious code which is found in the wild and labelled by the anti-malware firms, or they can write their own. It’s better if they can choose from a set of fully documented exploits which are tested and shared.
Exploits on the site are designed to meet well-documented flaws, for which fixes already exist. So it won’t add new dangers to the online world. And users of the site will be vetted. This might be a potential weakness as vetting processes can be subverted – but from all accounts, the existing online underground market for exploits is probably an easier source for anyone with malicious intent.
The fact that pen-testers can now pay for those exploits in a public marketplace should also mean that the security researchers’ work gets the recognition it deserves, and provides an incentive for future work.
In fact, the legitimate market for exploits has been in existence for a while, and flaw brokers have included TippingPoint, iDefense Labs, Immunity and Netragard.
For some of us, NSS Labs’ marketplace brings back memories of a short-lived auction site launched in 2007 by Swiss researchers WabiSabiLabi. The site got a ton of criticism because as well as fully-documented exploits, it also aimed to sell exploits for newly-discovered, unpatched, “zero day” weaknesses.
WabiSabiLabi claimed that this merely increased the urgency with which CSOs would deal with the exploits (and the value given to the security researchers’ work) but others argued that a visible online marketplace would simply increase the rate at which exploits circulated and boost the damage caused by zero day bugs.
“A perfect marketplace of software vulnerabilities was too forward looking for the imperfect world we live in,” the WSLabs site now says. “The international group had to stop trading its knowledge after controversy and legal threats surfaced from third parts and competitors.”
Founder Robert Preatoni was charged with industrial espionage in 2008, although colleagues in the security field defended his reputation.
The publicity around WabiSabiLabi probably set back online exploit trading. but the security community – like the hacker world – is continually evolving into a more mature and business-like environment. The world is certainly happy now, with the idea.
European Commission says it will review Apple's iPad compliance with DMA rules as it seeks…
James Dyson delivers most high-profile criticism so far of Labour's first Budget that raises £40bn…
Nvidia, Meta bring cases before US Supreme Court this month seeking tighter limits on investors'…
Nvidia to replace Intel this week on Dow Jones Industrial Average after years of turmoil…
Joby Aviation and Toyota Motor complete demonstration flight in Shizuoka as companies prepare to bring…
SK Hynix says Nvidia chief executive Jensen Huang asked if production of next-gen HBM4 memory…