Insight Into the Zero-Day Vulnerability Business
August 14, 2015
An ironic security breach grants a rare glimpse into the workings of an outfit that sells information on security vulnerabilities, we learn from “Hacking Team: a Zero-Day Market Case Study” at Vlad Tsyrklevich’s blog. Software weak spots have become big business. From accessing sensitive data to installing secret surveillance software, hackers hunt for chinks in the armor and sell that information to the highest (acceptable) bidder. It seems to be governments, mostly, that purchase this information, but corporations and other organizations can be in the market, as well. The practice is, so far, perfectly legal, and vendors swear they only sell to the good guys. One of these vulnerability vendors is Italian firm Hacking Team, known for its spying tools. Hacking Team itself was recently hacked, its email archives exposed.
Blogger Vlad Tsyrklevich combs the revealed emails for information on the market for zero-day (or 0day) vulnerabilities. These security gaps are so named because once the secret is out, the exposed party has “zero days” to fix the vulnerability before damage is done. Some may find it odd just how prosaic the procedure for selling zero-days appears. The article reveals:
“Buyers follow standard technology purchasing practices around testing, delivery, and acceptance. Warranty and requirements negotiations become necessary in purchasing a product intrinsically predicated on the existence of information asymmetry between the buyer and the seller. Requirements—like targeted software configurations—are important to negotiate ahead of time because adding support for new targets might be impossible or not worth the effort. Likewise warranty provisions for buyers are common so they can minimize risk by parceling out payments over a set timeframe and terminating payments early if the vulnerability is patched before that timeframe is complete. Payments are typically made after a 0day exploit has been delivered and tested against requirements, necessitating sellers to trust buyers to act in good faith. Similarly, buyers purchasing exploits must trust the sellers not to expose the vulnerability or share it with others if it’s sold on an exclusive basis.”
The post goes on to discuss pricing, product reliability, and the sources of Hacking Team’s offerings. Tsyrklevich compiles specifics on dealings between Hacking Team and several of its suppliers, including the companies Netragard, Qavar, VUPEN, Vulnerabilities Brokerage International, and COSEINC, as well as a couple of freelancing individuals. See the article for more on each of these (and a few more under “miscellaneous”). Tsyrklevich notes that, though the exposure of Hacking Team’s emails has prompted changes to the international export-control agreement known as the Wassenaar Arrangement, the company itself seems to be weathering the exposure just fine. In fact, their sales are reportedly climbing.
Cynthia Murrell, August 14, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
CounterTack Partners with ManTech Cyber Solutions for a More Comprehensive Platform
August 13, 2015
A new acquisition by CounterTack brings predictive capability to that company’s security offerings, we learn from “CounterTack Acquires ManTech Cyber Solutions” at eWeek. Specifically, it is a division of ManTech International, dubbed ManTech Cyber Solutions International (MCSI), that has been snapped up under undisclosed terms by the private security firm.
CounterTack president and CEO Neal Chreighton says the beauty of the deal lies in the lack of overlap between their tech and what MCSI brings to the table; while their existing products can tell users what is happening or has already happened, MCSI’s can tell them what to watch out for going forward. Writer Sean Michael Kerner elaborates:
“MCSI’s technology provides a lot of predictive capabilities around malware that can help enterprises determine how dangerous a malicious payload might be, Creighton said. Organizations often use the MCSI Responder Pro product after an attack has occurred to figure out what has happened. In contrast, the MCSI Active Defense product looks at issues in real time to make predictions, he said. A big area of concern for many security vendors is the risk of false positives for security alerts. With the Digital DNA technology, CounterTack will now have a predictive capability to be able to better determine the risk with a given malicious payload. The ability to understand the potential capabilities of a piece of malware will enable organizations to properly provide a risk score for a security event. With a risk score in place, organizations can then prioritize malware events to organize resources to handle remediation, he said.”
Incorporation of the open-source Hadoop means CounterTack can scale to fit any organization, and the products can be deployed on-premises or in the cloud. Cleighton notes his company’s primary competitor is security vendor CrowdStrike; we’ll be keeping an eye on both these promising firms.
Based in Waltham, Massachusetts, CounterTack was founded in 2007. The company declares their Sentinel platform to be the only in-progress attack intelligence and response solution on the market (for now.) Founded way back in 1968, ManTech International develops and manages solutions for cyber security, C4ISR, systems engineering, and global logistics from their headquarters in Washington, DC. Both companies are currently hiring; click here for opportunities at CounterTack, and here for ManTech’s careers page.
Cynthia Murrell, August 13, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
ZeroFox: New Products Available
August 10, 2015
ZeroFOX is a social media centric cyber security firm. The company announced several new products which enable the company to provide end to end social media cyber security solutions.
The products are:
ZeroFOX Enterprise is now powered by FoxScript. FoxScript is a customizable, javascript-based language that allows security analysts to write unique rules for ZeroFOX’s data collection and analysis engines within ZeroFOX Enterprise. FoxScript makes security teams their own greatest innovators: professionals will have a tool at their disposal to track custom security threats and address the issues that matter most to their specific organization. ZeroFOX’s FoxScript will enable security teams to address targeted employee exploitation on social networks and social engineering in particular, cited by 46% of this year’s Black Hat attendees as their greatest cyber security concern.
ZeroFOX Recon, a social media vulnerability and phishing assessment application, enables organizations to discover their social assets and test their vulnerabilities with a comprehensive assessment.
ZeroFOX Threat Feed is an easily-digestible URL feed that provides real-time visibility into global phishing and malware attacks delivered via social media. Threat Feed integrates seamlessly into existing security technology to supercharge organization’s Threat Intelligence Platforms (TIP) or SIEMs with threats from where their people are most vulnerable. Threat Feed can also be directly integrated into leading firewall, web security and email security platforms.
The announcement included two interesting items in its announcement:
- Facebook scams are an effective method to breach an organization’s network.
- Twitter is a popular attack vector used by “Russian government backed hackers.”
Why search when one can copy “interesting” digital information?
Stephen E Arnold, August 10, 2015
YouTube Consumer: Do You Want a Pet RAT?
August 10, 2015
Because information access is shifting from the dinosaur approach (human figures out a query) to the couch potatoes’ approach (just consume what a click and an algorithm deliver), I will be adding more coverage of “enhanced” search and retrieval.
Today, we do RATs.
Navigate to “Google Profits from YouTube RAT Infestation, Says Consumer Group.” The idea is that you learn how to embed remote access tools on another couch potato’s computing device. There are quite a few folks into the RAT game.
The article suggests that the GOOG profits from instructional videos which teach folks how to use RATs. According to the write up, the Digital Citizens Alliance (DCA) has
called on YouTube to stop monetizing videos that promote the use and dissemination of RATs, saying in a release that there’s “no reason” why major brands should be running adverts alongside these videos:
No company - especially one as big as Google - should make even a penny from videos that show the faces of victims and IP addresses.
The BBC reports that Adam Benson, deputy director of the DCA, said that the trade in stolen webcam footage was “troubling” and called on Google to stop relying on computer-based methods to find and remove the videos.
Intrigued? There are industrial strength tools available to build your own RAT colony. To get the details, you will have to wait until my new study “Dark Web Basics” is available.
Stephen E Arnold, August 10, 2015
A Technical Shift in Banking Security
July 23, 2015
Banks may soon transition from asking for your mother’s maiden name to tracking your physical behavior in the name of keeping you (and their assets) safe. IT ProPortal examines “Fraud Prevention: Knowledge-Based Ananlytics in Steep Decline.” Writer Lara Lackie cites a recent report from the Aite Group that indicates a shift from knowledge-based analytics to behavioral analytics for virtual security checkpoints. Apparently, “behavioral analytics” is basically biometrics without the legal implications. Lackie writes:
“Examples of behavioural analytics/biometrics can include the way someone types, holds their device or otherwise interacts with it. When combined, continuous behavioural analysis, and compiled behavioural biometric data, deliver far more intelligence than traditionally available without interrupting the user’s experience….
Julie Conroy, research director, Aite Group, said in the report “When the biometric is paired with strong device authentication, it is even more difficult to defeat. Many biometric solutions also include liveliness checks, to ensure it’s a human being on the other end.’
“NuData Security’s NuDetect online fraud engine, which uses continuous behavioural analysis and compiled behavioral biometric data, is able to predict fraud as early as 15 days before a fraud attempt is made. The early detection offered by NuDetect provides organisations the time to monitor, understand and prevent fraudulent transactions from taking place.”
The Aite report shows over half the banks surveyed plan to move away from traditional security questions over the next year, and six of the 19 institutions plan to enable mobile-banking biometrics by the end of this year. Proponents of the approach laud behavioral analytics as the height of fraud detection. Are Swype patterns and indicators of “liveliness” covered by privacy rights? That seems like a philosophical question to me.
Cynthia Murrell, July 23, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Another the End of Article with Some Trivial Omissions
July 19, 2015
Far be it from me to find fault with an economics essay published by the British open source, online hip newspaper The Guardian. I want to point you at “The End of Capitalism Has Begun.” Like Francis Fukuyama’s end of book, the end seems to be unwilling to arrive. Note: if you find that the article has disappeared online, you may have to sign up to access the nuggets generated by The Guardian. Another alternative, which is pretty tough in rural Kentucky, is to visit your local convenience store and purchase a dead tree edition. Do not complain to me about a dead link, which in this blog are little tombstones marking online failures.
There is some rugby and polo club references in the article. The one that I circled was the reference to Karl Marx’s “The Fragment on Machines” from his thriller The Grundrisse, which connoted to me “floor plans.” But, my German like my math skills are not what they used to be. Anyway, who am I kidding. I know you have read that document. If not, you can get a sniff at this link.
According to the Guardian, the point of the fragment is:
he [Marx] had imagined something close to the information economy in which we live. And, he wrote, its existence would “blow capitalism sky high.
The end of capitalism?
Another interesting item in the essay is the vision of the future. At my age, I do not worry too much about the future beyond waking each morning and recognizing my surroundings. The Guardian worries about 20175. Here’s the passage I highlighted:
I don’t mean this as a way to avoid the question: the general economic parameters of a post capitalist society by, for example, the year 2075, can be outlined. But if such a society is structured around human liberation, not economics, unpredictable things will begin to shape it.
Why raise the issue?
Now to the omission. I know this is almost as irrelevant as the emergence of a monitored environment. What about the growing IS/ISIS/Daesh movement? The Greek matter is interesting to me because if the state keeps on trucking down the interstate highway its has been following, the trucks will be loaded with folks eager to take advantage of the beach front property and nice views Greece affords.
I noted a number of other points away from which the essay steered its speeding Russian Zil. How does one find information in the end of world?
I think about information access more than I ponder the differences between Horatio in Hamlet and Daniel Doyce in Little Dorrit. To get up to speed on Daniel Doyce, check out this link.
Like Fukuyama’s social analysis, this end of may point to speaking engagements and consulting work. The hope is that the author may want these to be never-ending. Forget the information access and the implications and impacts of IS/ISIS/Daesh.
Let’s hope online search works unless it is now the end of that too.
Stephen E Arnold, July 19, 2015
dtSearch and Encrypted PDFs
July 18, 2015
Short honk: The Little Engine That Could information access system is dtSearch. Long a fave with Microsoft centric folks looking for an alternative for keyword search, dtSearch has added some oomph. “New dtSearch Release Enhances Support for Encrypted PDFs.” According to the write up:
The release expands these document filters to directly support a broader range of encrypted PDFs, covering PDF files encrypted with an owner password up to 128-bit RC4 and 128-bit and 256-bit AES.
For more information about what can be processed, navigate to www.dtsearch.com.
Stephen E Arnold, July 18, 2015
Search the Snowden Documents
July 16, 2015
This cat has long since forgotten what the inside of the bag looked like. Have you perused the documents that were released by Edward Snowden, beginning in 2013? A website simply titled “Snowden Doc Search” will let you do just that through a user-friendly search system. The project’s Description page states:
“The search is based upon the most complete archive of Snowden documents to date. It is meant to encourage users to explore the documents through its extensive filtering capabilities. While users are able to search specifically by title, description, document, document date, and release date, categories also allow filtering by agency, codeword, document topic, countries mentioned, SIGADS, classification, and countries shared with. Results contain not only full document text, pdf, and description, but also links to relevant articles and basic document data, such as codewords used and countries mentioned within the document.”
The result of teamwork between the Courage Foundation and Transparency Toolkit, the searchable site is built upon the document/ news story archive maintained by the Edward Snowden Defense Fund. The sites Description page also supplies links to the raw dataset and to Transparency Toolkit’s Github page, for anyone who would care to take a look. Just remember, “going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.” (Chrome)
Cynthia Murrell, July 16 , 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
How Not to Drive Users Away from a Website
July 15, 2015
Writer and web psychologist Liraz Margalit at the Next Web has some important advice for websites in “The Psychology Behind Web Browsing.” Apparently, paying attention to human behavioral tendencies can help webmasters avoid certain pitfalls that could damage their brands. Imagine that!
The article cites a problem an unspecified news site encountered when it tried to build interest in its videos by making them play automatically when a user navigated to their homepage. I suspect I know who they’re talking about, and I recall thinking at the time, “how rude!” I thought it was just because I didn’t want to be chastised by people near me for suddenly blaring a news video. According to Margalit, though, my problem goes much deeper: It’s an issue of control rooted in pre-history. She writes:
“The first humans had to be constantly on alert for changes in their environment, because unexpected sounds or sights meant only one thing: danger. When we click on a website hoping to read an article and instead are confronted with a loud, bright video, the automatic response is not so different from that our prehistoric ancestors, walking in the forest and stumbling upon a bear or a saber-toothed hyena.”
This need for safety has morphed into a need for control; we do not like to be startled or lost. When browsing the Web, we want to encounter what we expect to encounter (perhaps not in terms of content, but certainly in terms of format.) The name for this is the “expectation factor,” and an abrupt assault on the senses is not the only pitfall to be avoided. Getting lost in an endless scroll can also be disturbing; that’s why those floating menus, that follow you as you move down the page, were invented. Margalit notes:
“Visitors like to think they are in charge of their actions. When a video plays without visitors initiating any interaction, they feel the opposite. If a visitor feels that a website is trying to ‘sell’ them something, or push them into viewing certain content without permission, they will resist by trying to take back the interaction and intentionally avoid that content.”
And that, of course, is the opposite of what websites want, so giving users the control they expect is a smart business move. Besides, it’s only polite to ask before engaging a visitor’s Adobe Flash or, especially, speakers.
Cynthia Murrell, July 15, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Skin Search
July 15, 2015
We reported on how billboards in Russia were getting smarter by using facial recognition software to hide ads advertising illegal products when they recognized police walking by. Now the US government might be working on technology that can identify patterns on tattoos, reports Quartz in, “The US Government Wants Software That Can Detect And Interpret Your Tattoos.”
The Department of Justice, Department of Defense, and the FBI sponsored a competition that the National Institute of Standards and Technology (NIST) recently held on June 8 to research ways to identify ink:
“The six teams that entered the competition—from universities, government entities, and consulting firms—had to develop an algorithm that would be able to detect whether an image had a tattoo in it, compare similarities in multiple tattoos, and compare sketches with photographs of tattoos. Some of the things the National Institute of Standards and Technology (NIST), the competition’s organizers, were looking to interpret in images of tattoos include swastikas, snakes, drags, guns, unicorns, knights, and witches.”
The idea is to use visual technology to track tattoos among crime suspects and relational patterns. Vision technology, however, is still being perfected. Companies like Google and major universities are researching ways to make headway in the technology.
While the visual technology can be used to track suspected criminals, it can also be used for other purposes. One implication is responding to accidents as they happen instead of recording them. Tattoo recognition is the perfect place to start given the inked variety available and correlation to gangs and crime. The question remains, what will they call the new technology, skin search?
Whitney Grace, July 15, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

