{"id":6137,"date":"2021-11-18T19:13:18","date_gmt":"2021-11-18T19:13:18","guid":{"rendered":"https:\/\/blog.gridinsoft.com\/?p=6137"},"modified":"2021-12-06T12:31:43","modified_gmt":"2021-12-06T12:31:43","slug":"researchers-noticed-that-the-darknet-is-discussing-exploits-as-a-service","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/researchers-noticed-that-the-darknet-is-discussing-exploits-as-a-service\/","title":{"rendered":"Researchers noticed that the darknet is discussing exploits as a service"},"content":{"rendered":"<h4>Analysts at Digital Shadows have prepared <a href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/vulnerability-intelligence-whats-the-word-in-dark-web-forums\/\" rel=\"noopener nofollow\" target=\"_blank\">a report<\/a> on the exploit market on the darknet &#8211; it is noticed that the criminals have come up with an &#8220;exploits as a service&#8221; scheme. Some cybercriminals have multimillion-dollar budgets to acquire 0-day exploits.<\/h4>\n<p>The researchers explain that attackers, financially motivated cybercriminals and &#8220;government hackers&#8221; are rapidly adopting new attack methods and are constantly on the lookout for new exploits.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">This scene is filled with many well-known criminals who boast a range of technical expertise and motives.<span class=\"su-quote-cite\"><a href=\"https:\/\/\" target=\"_blank\">the report says.<\/a><\/span><\/div><\/div>\n<p>The researchers write that although most often buying and selling exploits occurs in private conversations, sometimes vulnerabilities are bought and sold directly on hacker forums. For example, in early May 2021, a hacker openly offered <strong>$25,000<\/strong> for a PoC exploit for the <strong>CVE-2021-22893<\/strong> critical vulnerability affecting Pulse Secure VPN. This problem <a href=\"https:\/\/trustcoyote.com\/blog\/0-day-in-pulse-secure-vpn\" rel=\"noopener nofollow\" target=\"_blank\">has been used<\/a> by Chinese hackers since at least April of this year.<\/p>\n<p><a href=\"\/blogs\/wp-content\/uploads\/2021\/11\/exploit_01.jpg\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2021\/11\/exploit_01.jpg\" alt=\"exploits as a service on the darknet\" width=\"920\" height=\"346\" class=\"alignnone size-full wp-image-6140\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_01.jpg 920w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_01-300x113.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_01-768x289.jpg 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><\/p>\n<p>Another hacker even stated that he was ready to pay up to <strong>$3,000,000<\/strong> for exploits for RCE vulnerabilities in Windows 10 and Linux, the use of which does not require any user interaction. The same user was offering up to <strong>$150,000<\/strong> for previously unused methods of running malware on Windows 10, which would allow malware to remain active on every system boot. <\/p>\n<p><a href=\"\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02.jpg\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02-1024x274.jpg\" alt=\"exploits as a service on the darknet\" width=\"1024\" height=\"274\" class=\"alignnone size-large wp-image-6141\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02-1024x274.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02-300x80.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02-768x206.jpg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/exploit_02.jpg 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>For comparison, the well-known exploit broker Zerodium offers up to <strong>$1,000,000<\/strong> for zero-click RCE in Windows 10. And most of all, up to <strong>$2,500,000<\/strong>, the company is ready to pay for a chain of persistent zero-click exploits for Android, and <strong>$2,000,000<\/strong> for the iOS equivalent of such an attack.<\/p>\n<p>Researchers at Digital Shadows say they have seen some hackers negotiate exploits for zero-day vulnerabilities at a cost of <strong>$10,000,000<\/strong>. Moreover, not only &#8220;government hackers&#8221;, but also by other cybercriminals, especially ransomware operators, can afford such deals.<\/p>\n<p>However, this type of transactions are not easy and can be time-consuming. In this case, the developers of the exploit may lose the chance to make money, because if their competitors can offer their own version of the exploit and reduce the price. Digital Shadows writes that for this reason cybercriminals are actively discussing an &#8220;exploit as a service&#8221; scheme that would allow developers to lease such exploits to several parties at once.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">In addition, using such a model, tenants will be able to test the proposed 0-day and then decide whether to buy the exploit on exclusive or non-exclusive terms.<span class=\"su-quote-cite\"><a href=\"https:\/\/\" target=\"_blank\">experts say.<\/a><\/span><\/div><\/div>\n<p>As part of the report, experts from Digital Shadows divided the criminals into several groups, noting that there may be serious intersections between them.<\/p>\n<ul>\n<li><strong>Major players:<\/strong> cybercriminals who buy and sell 0-day exploits at prices starting at $1,000,000. They can be sponsored by governments or successful entrepreneurs.<\/li>\n<li><strong>Regular Vendors:<\/strong> Vendors selling non-critical vulnerabilities, exploit kits, and databases of information (names and IP addresses) of companies with open vulnerabilities.<\/li>\n<li><strong>Regular Buyers:<\/strong> People with technical skills who are interested in buying exploits, but rarely have the means to make such a purchase. They usually wait for prices to fall.<\/li>\n<li><strong>Code Promoters:<\/strong> Criminals who publish and advertise their exploits on GitHub.<\/li>\n<li><strong>Demonstration Performances:<\/strong> Highly specialized forum members who discuss bugs, take part in competitions, and share some knowledge about how exploits work.<\/li>\n<li><strong>Newbies:<\/strong> The least trained users who learn from the more experienced forum members. Sometimes they apply the knowledge gained in practice and share information in other forums in order to earn a reputation, or in the framework of \u201csocial activities\u201d.<\/li>\n<li><strong>Newsfeeds:<\/strong> Forum members who share articles and news about recently discovered vulnerabilities with other articles and news.<\/li>\n<\/ul>\n<p>Let me remind you that I also wrote that <a href=\"\/blogs\/most-attacked-vulnerabilities-in-2020-2021\/\">Experts published a list of the most attacked vulnerabilities in 2020-2021<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysts at Digital Shadows have prepared a report on the exploit market on the darknet &#8211; it is noticed that the criminals have come up with an &#8220;exploits as a service&#8221; scheme. Some cybercriminals have multimillion-dollar budgets to acquire 0-day exploits. The researchers explain that attackers, financially motivated cybercriminals and &#8220;government hackers&#8221; are rapidly adopting [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6143,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[416,242,315],"class_list":{"0":"post-6137","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-darknet","9":"tag-digital-shadows","10":"tag-exploit"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/11\/darknet.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=6137"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6137\/revisions"}],"predecessor-version":[{"id":6572,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6137\/revisions\/6572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/6143"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=6137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=6137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=6137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}