SlideShare a Scribd company logo
Modern Day Entomology
Examining the Inner Workings of the Bug Bazaar
2 Copyright 2018 Trend Micro Inc.
Director of Vulnerability Research at Trend Micro
Leads the Zero Day Initiative
Organizes Pwn2Own
Approver of Payments
Past Experiences
Lead Developer at Lockheed Martin
Bug Hunter
Past research:
Microsoft Bounty submission
Patents on Exploit Mitigation Technologies
Bug hunting in many products
Twitter: @MaliciousInput
Brian Gorenc
Copyright 2018 Trend Micro Inc.3
4 Copyright 2018 Trend Micro Inc.
How it works
Trend Micro Customers Protected Ahead of Patch
Other Network Security Vendor’s Customers at Risk
Vulnerability
submitted to the
ZDI program
Vendor Notified
Digital Vaccine®
Filter Created
Vendor Response
Window
Vulnerability is
Patched or
Remains Unfixed
Public Disclosure
Exploit Economy
6 Copyright 2018 Trend Micro Inc.
Economy in Action
Researchers
Finds Bugs
Bug Bounty
Program
Report to
Vendor
Sell Report
$1K - $25K
Signatures
Exploit Kit Creator
$10K - $100K
Vuln Broker
Government
$10K - $1000K
$10K - $1000K
Bot HerderBotnet Creator
Compromises PCs
Sells Kit Rents Botnet
Spammer DDoS Extortion Credential
Harvesting
Smart Criminal Make
One Big Purchase
Sells Stolen Creds
Dumb Criminal Buys
Beer & Chips
Re-Sells Stolen
Creds
Used
Against??
7 Copyright 2018 Trend Micro Inc.
0
100
200
300
400
500
600
700
800
900
1000
Qtr4
2013
Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
Qtr2
Active economy
8 Copyright 2018 Trend Micro Inc.
Variety
High-Profile
SCADA/IIoT
Infrastructure
Virtualization
IoT
Enterprise
Security
Misc
Open Source
Web
Other
Mobile
Top Vendors
9 Copyright 2018 Trend Micro Inc.
Global economy
10 Copyright 2018 Trend Micro Inc.
Highly-deployed software submissions
11 Copyright 2018 Trend Micro Inc.
SCADA submissions
12 Copyright 2018 Trend Micro Inc.
Lessons learned from Hacking Team
13 Copyright 2018 Trend Micro Inc.
Lucrative business
14 Copyright 2018 Trend Micro Inc.
How to buy 0-day: Consultancy Services
15 Copyright 2018 Trend Micro Inc.
How to buy 0-day: Vulnerability Brokers
16 Copyright 2018 Trend Micro Inc.
Payments and Pay Schedules
17 Copyright 2018 Trend Micro Inc.
Exploit Inventory
Market Factors
and Trends
19 Copyright 2018 Trend Micro Inc.
0
5
10
15
20
25
30
35
40
Qtr1
2011
Qtr2 Qtr3 Qtr4 Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4
Browser Click-to-Play Intervention
20 Copyright 2018 Trend Micro Inc.
0
10
20
30
40
50
60
70
80
90
100
Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
New Mitigations
21 Copyright 2018 Trend Micro Inc.
0
10
20
30
40
50
60
70
80
90
100
Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
New Mitigations
22 Copyright 2018 Trend Micro Inc.
0
5
10
15
20
25
30
35
40
Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
End of Life Announcements
23 Copyright 2018 Trend Micro Inc.
0
20
40
60
80
100
120
140
160
Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
Unchecked
24 Copyright 2018 Trend Micro Inc.
0
50
100
150
200
Qtr1
2012
Qtr2 Qtr3 Qtr4 Qtr1
2013
Qtr2 Qtr3 Qtr4 Qtr1
2014
Qtr2 Qtr3 Qtr4 Qtr1
2015
Qtr2 Qtr3 Qtr4 Qtr1
2016
Qtr2 Qtr3 Qtr4 Qtr1
2017
Qtr2 Qtr3 Qtr4 Qtr1
2018
Predicting the Next
25 Copyright 2018 Trend Micro Inc.
New Regulations
26 Copyright 2018 Trend Micro Inc.
Pwn2Own
War Stories
27
28 Copyright 2018 Trend Micro Inc.
Shades of Stuxnet
29 Copyright 2018 Trend Micro Inc.
Killing CIA’s Closed Network Infiltration Tool
30 Copyright 2018 Trend Micro Inc. 30
Disrupting BlackEnergy
31 Copyright 2018 Trend Micro Inc.
CVE-2018-8174 used in targeted attacks
1. Victim opens a malicious Microsoft Word doc
2. Malicious doc downloads HTML page containing VBScript
3. VBScript triggers Use-After-Free vulnerability
VBScript Double Kill Vulnerability ITW
32 Copyright 2018 Trend Micro Inc.
Matches Trending Data
ZDI Pre-disclosure Guidance Catches CVE-2018-8373
CVE-2018-8373 ITW
Conclusion
34 Copyright 2018 Trend Micro Inc.
Conclusion
35 Copyright 2018 Trend Micro Inc.
https://www.zerodayinitiative.com/blog
Plugging In
https://www.zerodayinitiative.com
@thezdi
PGP https://www.zerodayinitiative.com/documents/zdi-pgp-key.asc
Fingerprint: 743F 60DB 46EA C4A0 1F7D B545 8088 FEDF 9A5F D228
zdi@trendmicro.com
Questions
Thank you for your time and attention

More Related Content

PDF
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
PDF
Automatizovaná bezpečnost – nadstandard nebo nutnost?
PDF
Issa jason dablow
PPTX
Stopping the Adobe, Apple and Java Software Updater Insanity
PPTX
Real Business Threats!
PPTX
CheckPoint: Anatomy of an evolving bot
PDF
Bug Bounty Guide Tools and Resource.pdf
PDF
"Vulnerabilities for Sale - The Good, the Bad and the Ugly" - Udo Schneider
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Issa jason dablow
Stopping the Adobe, Apple and Java Software Updater Insanity
Real Business Threats!
CheckPoint: Anatomy of an evolving bot
Bug Bounty Guide Tools and Resource.pdf
"Vulnerabilities for Sale - The Good, the Bad and the Ugly" - Udo Schneider

Similar to Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings of the Bug Bazaar”. (20)

PDF
Maximize Computer Security With Limited Ressources
PPTX
Making Sense of Threat Reports
PDF
Trend Micro Solutions Overview
PDF
Check point presentation june 2014
PDF
Stopping zero day threats
PDF
Declaration of malWARe
PPTX
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
PDF
Trend Micro 10 Minute Overview
PDF
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
PPTX
Kaspersky North American Virus Analyst Summit
PDF
Symantec (ISTR) Internet Security Threat Report Volume 22
PPTX
null Bangalore meet Feb 2010 - news Bytes
PPTX
Securing your Cloud Environment v2
PDF
Common Malware Types Vulnerability Management
PDF
Ht seminar uniten-cyber security threat landscape
PPT
Information security in todays world
PPTX
Ransomware - what is it, how to protect against it
PPT
Paul Henry’s 2011 Malware Trends
PDF
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
PDF
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Maximize Computer Security With Limited Ressources
Making Sense of Threat Reports
Trend Micro Solutions Overview
Check point presentation june 2014
Stopping zero day threats
Declaration of malWARe
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
Trend Micro 10 Minute Overview
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
Kaspersky North American Virus Analyst Summit
Symantec (ISTR) Internet Security Threat Report Volume 22
null Bangalore meet Feb 2010 - news Bytes
Securing your Cloud Environment v2
Common Malware Types Vulnerability Management
Ht seminar uniten-cyber security threat landscape
Information security in todays world
Ransomware - what is it, how to protect against it
Paul Henry’s 2011 Malware Trends
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Ad

More from Hacken_Ecosystem (13)

PDF
Peter Todd - Hardware Wallets - Threats and Vulnerabilities
PPTX
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
PDF
Walter Belgers - Lockpicking and IT security
PDF
Dima kovalenko - Is ARMv8.3 the end of ROP?
PPTX
Tomi Wen - The Blockchain Built for Real World Apps
PDF
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
PPTX
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
PPTX
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
PPTX
John Graham-Cumming - Helping to build a better Internet
PPTX
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
PPTX
Max Keidun - How to build a Bitcoin exchange and not burn in hell
PPTX
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
PPTX
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Peter Todd - Hardware Wallets - Threats and Vulnerabilities
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Walter Belgers - Lockpicking and IT security
Dima kovalenko - Is ARMv8.3 the end of ROP?
Tomi Wen - The Blockchain Built for Real World Apps
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
John Graham-Cumming - Helping to build a better Internet
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Max Keidun - How to build a Bitcoin exchange and not burn in hell
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Ad

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
project resource management chapter-09.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Modernising the Digital Integration Hub
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
STKI Israel Market Study 2025 version august
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
Getting started with AI Agents and Multi-Agent Systems
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
project resource management chapter-09.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
observCloud-Native Containerability and monitoring.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Web App vs Mobile App What Should You Build First.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Modernising the Digital Integration Hub
A novel scalable deep ensemble learning framework for big data classification...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hindi spoken digit analysis for native and non-native speakers
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings of the Bug Bazaar”.

  • 1. Modern Day Entomology Examining the Inner Workings of the Bug Bazaar
  • 2. 2 Copyright 2018 Trend Micro Inc. Director of Vulnerability Research at Trend Micro Leads the Zero Day Initiative Organizes Pwn2Own Approver of Payments Past Experiences Lead Developer at Lockheed Martin Bug Hunter Past research: Microsoft Bounty submission Patents on Exploit Mitigation Technologies Bug hunting in many products Twitter: @MaliciousInput Brian Gorenc
  • 3. Copyright 2018 Trend Micro Inc.3
  • 4. 4 Copyright 2018 Trend Micro Inc. How it works Trend Micro Customers Protected Ahead of Patch Other Network Security Vendor’s Customers at Risk Vulnerability submitted to the ZDI program Vendor Notified Digital Vaccine® Filter Created Vendor Response Window Vulnerability is Patched or Remains Unfixed Public Disclosure
  • 6. 6 Copyright 2018 Trend Micro Inc. Economy in Action Researchers Finds Bugs Bug Bounty Program Report to Vendor Sell Report $1K - $25K Signatures Exploit Kit Creator $10K - $100K Vuln Broker Government $10K - $1000K $10K - $1000K Bot HerderBotnet Creator Compromises PCs Sells Kit Rents Botnet Spammer DDoS Extortion Credential Harvesting Smart Criminal Make One Big Purchase Sells Stolen Creds Dumb Criminal Buys Beer & Chips Re-Sells Stolen Creds Used Against??
  • 7. 7 Copyright 2018 Trend Micro Inc. 0 100 200 300 400 500 600 700 800 900 1000 Qtr4 2013 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 Qtr2 Active economy
  • 8. 8 Copyright 2018 Trend Micro Inc. Variety High-Profile SCADA/IIoT Infrastructure Virtualization IoT Enterprise Security Misc Open Source Web Other Mobile Top Vendors
  • 9. 9 Copyright 2018 Trend Micro Inc. Global economy
  • 10. 10 Copyright 2018 Trend Micro Inc. Highly-deployed software submissions
  • 11. 11 Copyright 2018 Trend Micro Inc. SCADA submissions
  • 12. 12 Copyright 2018 Trend Micro Inc. Lessons learned from Hacking Team
  • 13. 13 Copyright 2018 Trend Micro Inc. Lucrative business
  • 14. 14 Copyright 2018 Trend Micro Inc. How to buy 0-day: Consultancy Services
  • 15. 15 Copyright 2018 Trend Micro Inc. How to buy 0-day: Vulnerability Brokers
  • 16. 16 Copyright 2018 Trend Micro Inc. Payments and Pay Schedules
  • 17. 17 Copyright 2018 Trend Micro Inc. Exploit Inventory
  • 19. 19 Copyright 2018 Trend Micro Inc. 0 5 10 15 20 25 30 35 40 Qtr1 2011 Qtr2 Qtr3 Qtr4 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Browser Click-to-Play Intervention
  • 20. 20 Copyright 2018 Trend Micro Inc. 0 10 20 30 40 50 60 70 80 90 100 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 New Mitigations
  • 21. 21 Copyright 2018 Trend Micro Inc. 0 10 20 30 40 50 60 70 80 90 100 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 New Mitigations
  • 22. 22 Copyright 2018 Trend Micro Inc. 0 5 10 15 20 25 30 35 40 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 End of Life Announcements
  • 23. 23 Copyright 2018 Trend Micro Inc. 0 20 40 60 80 100 120 140 160 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 Unchecked
  • 24. 24 Copyright 2018 Trend Micro Inc. 0 50 100 150 200 Qtr1 2012 Qtr2 Qtr3 Qtr4 Qtr1 2013 Qtr2 Qtr3 Qtr4 Qtr1 2014 Qtr2 Qtr3 Qtr4 Qtr1 2015 Qtr2 Qtr3 Qtr4 Qtr1 2016 Qtr2 Qtr3 Qtr4 Qtr1 2017 Qtr2 Qtr3 Qtr4 Qtr1 2018 Predicting the Next
  • 25. 25 Copyright 2018 Trend Micro Inc. New Regulations
  • 26. 26 Copyright 2018 Trend Micro Inc. Pwn2Own
  • 28. 28 Copyright 2018 Trend Micro Inc. Shades of Stuxnet
  • 29. 29 Copyright 2018 Trend Micro Inc. Killing CIA’s Closed Network Infiltration Tool
  • 30. 30 Copyright 2018 Trend Micro Inc. 30 Disrupting BlackEnergy
  • 31. 31 Copyright 2018 Trend Micro Inc. CVE-2018-8174 used in targeted attacks 1. Victim opens a malicious Microsoft Word doc 2. Malicious doc downloads HTML page containing VBScript 3. VBScript triggers Use-After-Free vulnerability VBScript Double Kill Vulnerability ITW
  • 32. 32 Copyright 2018 Trend Micro Inc. Matches Trending Data ZDI Pre-disclosure Guidance Catches CVE-2018-8373 CVE-2018-8373 ITW
  • 34. 34 Copyright 2018 Trend Micro Inc. Conclusion
  • 35. 35 Copyright 2018 Trend Micro Inc. https://www.zerodayinitiative.com/blog Plugging In https://www.zerodayinitiative.com @thezdi PGP https://www.zerodayinitiative.com/documents/zdi-pgp-key.asc Fingerprint: 743F 60DB 46EA C4A0 1F7D B545 8088 FEDF 9A5F D228 zdi@trendmicro.com
  • 36. Questions Thank you for your time and attention

Editor's Notes

  • #5: Vulnerability Submitted: A researcher submits a previously unpatched vulnerability to the Zero Day Initiative, who validates the vulnerability, determines its worth, and makes a monetary offer to the researcher. Vendor Notified: The Zero Day Initiative responsibly and promptly notifies the appropriate product vendor of a security flaw with their product(s) or service(s). Digital Vaccine® Filter Created: Simultaneously with the vendor being notified, Trend Micro TippingPoint works to create a Digital Vaccine filter to protect customers from the unpatched vulnerability. Vendor Response: The Zero Day Initiative allows the vendor four months to address the vulnerability. Vulnerability is Patched or Remains Unfixed: The vendor will either release a patch for the vulnerability or indicate to the Zero Day Initiative that it is unable to, or chooses not to, patch the vulnerability. Public Disclosure: The Zero Day Initiative will publicly and responsibly disclose the details of the vulnerability on its Web site in accordance with its vulnerability disclosure policy.
  • #11: Adobe, Apple, Foxit, Google, Microsoft, Mozilla, Oracle, WebKit
  • #12: 3S Pocketnet Tech, ABB, Advantech, ARRIS, Codesys, Cogent Real-Time Systems, Ecava, GE, Honeywell, Indusoft, MICROSYS, Proface, PTC, Rockwell Automation, Schneider Electric, Tibbo, Trihedral Engineering Ltd, Unitronics, WellinTech
  • #13: Now, when Hacking Team happened most in the industry poured over the evidence look for 0-day. Not ZDI. We looked for financial data. Who was buying, Who was selling, What were the prices? Are we making a impact in the shady grey market? Hacking Team dumps give us solid evidence here…and it is quite lucrative. RAV service 90,000 E to Czech Republic Similar service to Kazazkhstan for 180,000 E Additional buyers: Guatemala Lebanon Mongolia Russia Egypt Vietnam Malaysia Federal police of brazil Bangladesh Police - Rapid Action Battalion Republic of South Korea - Army Saudi Arabia Cyprus UAE Mexico Republic of Hungary And Small company called Cyberpoint in MD< USA
  • #14: Information from their Board of Directors meeting leads to other interesting insights into the marketplace 10 million in revue Expected >30% growth Paid employees $80,000 on average Other Personal Cost 500,000 Grow by 50% next year What is the category? Could it be consultancy fees and the broker costs. Highly likely. To make this money, you need in this business you need 0-day exploits. Via FTE or from the free market… How do they do they engage in the free market?
  • #15: Go directly to the researchers. But you have to be good… For example, take Vitaliy Toropov
  • #16: Next option is Vulnerability Brokers to keeps the remote access product working is brokers. Here we have an Adobe Flash exploit for sale The most interesting here is the asset availability. Why buy exclusive or non-exclusive? Stealthiness, of course. For highly target attacks, a “fire-and-forget” model is the only real option. The more it is out there, the more likely it will get caught. But what does that benefit cost?
  • #17: Much better then the consultancy rate. $95,000 Paid out over a 3 month period. Why is this done? 0-day is only as good as long as it is 0-day. Fees are paid out over time so the original researcher does not burn the bug after the payment.
  • #18: What is being avilable? Browsers, Kernel, Mobile, Security Software, Core Software like PHP So how does ZDI fair in the what it is attracting from the marketplace? Are we buying and fixing bugs that will impact the grey market and protect customers? The answer is YES But where is the evidence of our impact in this market place?
  • #20: Jan 2013 - https://blog.mozilla.org/security/2013/01/29/putting-users-in-control-of-plugins/
  • #21: JIT (Bound Checking, Type Confusion) UAF due to MemGC failed as a mitigation Issue in JavaScript Array Implementation
  • #22: JIT (Bound Checking, Type Confusion) UAF due to MemGC failed as a mitigation Issue in JavaScript Array Implementation
  • #23: Adobe End of life announcement - https://theblog.adobe.com/adobe-flash-update/
  • #24: JIT (Bound Checking, Type Confusion) UAF due to MemGC failed as a mitigation Issue in JavaScript Array Implementation
  • #25: JIT (Bound Checking, Type Confusion) UAF due to MemGC failed as a mitigation Issue in JavaScript Array Implementation
  • #26: December 2013 The purpose of the amendments was to prevent Western technology companies from selling surveillance technology to governments known to abuse human rights.  The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilizing accumulations. Participating states seek, through their national policies, to ensure that transfers of these items do not contribute to the development or enhancement of military capabilities which undermine these goals, and are not diverted to support such capabilities. https://www.wassenaar.org/app/uploads/2018/01/WA-DOC-17-PUB-006-Public-Docs-Vol.II-2017-List-of-DU-Goods-and-Technologies-and-Munitions-List.pdf
  • #27: Starting in 2007, the Pwn2Own hacking competition has grown into the world’s premier hacking contest. 2017 was the 10th anniversary of the contest, and more than $1 million dollars was made available to contestants. It’s only a slight hyperbole to refer to Pwn2Own as the root of all research. When we announce a new category for Pwn2Own, we don’t expect to see any entries in that category that year. However, history has shown that once we announce a new target at Pwn2Own, researchers start working in that area and submit entries the following year. That happened in 2016 when we announce VMWare as a target. As expected, we didn’t get any entries in 2016, but we did get two successful VMWare escapes in 2017. This was also our first year with Hyper-V and Apache web server as a target, and again, we didn’t receive any attempts on these targets. Next year’s conference should prove interesting.