BreachExchange mailing list archives
NSA Paid French Hacker Company For Software Exploits, Contract Reveals
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 17 Sep 2013 23:13:38 -0600
http://www.slate.com/blogs/future_tense/2013/09/17/nsa_paid_french_hacker_company_vupen_for_software_exploits.html France was one of several countries in Europe whose people are outraged<http://www.france24.com/en/20130630-france-demands-usa-explain-spying-allegations-europe> by revelations about the National Security Agency’s surveillance programs. But it turns out that a French company has quietly bolstered the NSA’s capabilities. According to a contract newly released<https://www.muckrock.com/foi/united-states-of-america-10/vupen-contracts-with-nsa-6593/#787525-responsive-documents> in response to a Freedom of Information request, last year the NSA purchased a 12-month subscription to a “binary analysis and exploits service” sold by Vupen, a company based in Montpelier, France. These exploits, sometimes described as “zero days,” are complex codes custom-written by hackers to target undisclosed security weaknesses in widely used operating systems like Windows and software programs like Google Chrome, Internet Explorer, Java, and Flash. A spy agency can use exploits to help infiltrate targets’ computers in espionage operations or to strengthen its own computer networks as part of cybersecurity efforts. It is unclear how much money the NSA spent on the Vupen exploits package because the cost has been redacted in the released contract. Vupen CEO Chaouki Bekrar declined to answer questions about his deal with the NSA, but told me in an emailed statement that his company’s binary analysis and exploits service includes “highly technical documentation and private exploits written by Vupen’s team of researchers for critical vulnerabilities affecting major software and operating systems.” Bekrar added that the aim of the service was to “to allow customers protect their systems against sophisticated attacks.” It seems possible that the NSA purchased the Vupen service for defensive reasons, with the purpose being to secure U.S. government infrastructure from adversaries. However, the NSA is believed to use zero days in * offensive* hacking operations, too. A *Washington Post* scoop<http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html> in August detailed how the NSA has apparently turned to exploits as part of its covert attempts to spy on foreign computer networks. The *Post* reported that the NSA designs most of its own “implants” used for this purpose, but set aside $25.1 million in 2013 for “additional covert purchases of software vulnerabilities” from private providers. Internationally, the zero-day marketplace is growing and largely unregulated. Many of the larger sellers are based in the United States, and reportedly include companies such as Raytheon, Endgame Systems, Harris Corp., and Northrop Grumman. But the market is also burgeoning in Europe, with Vupen leading the field. As I reported here back in January<http://www.slate.com/articles/technology/future_tense/2013/01/zero_day_exploits_should_the_hacker_gray_market_be_regulated.html>, Vupen’s latest financial accounts show that it generated revenue of about $1.2 million in 2011, 86 percent of which was earned from exports outside France. Lawmakers in Europe, concerned about how the technology could be abused if in the wrong hands, are pushing for the introduction of new restrictions that would limit sales. Last week, Dutch Member of the European Parliament Marietje Schaake argued<http://www.marietjeschaake.eu/2013/09/plenary-speech-on-cyber-security-and-digital-arms-trade/> that Europe should take the lead in reining in the industry. “We must end the export and proliferation of digital arms now,” Schaake said. “We have to close the regulatory vacuum, and that includes curbing the trade in zero-day exploits.”
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: # OWASP http://www.appsecusa.org # Builders, Breakers and Defenders # Time Square, NYC 20-21 Nov o()xxxx[{::::::::::::::::::::::::::::::::::::::::> Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- NSA Paid French Hacker Company For Software Exploits, Contract Reveals Audrey McNeil (Sep 23)