{"id":9262,"date":"2017-09-13T06:45:57","date_gmt":"2017-09-13T14:45:57","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/13\/news-3035\/"},"modified":"2017-09-13T06:45:57","modified_gmt":"2017-09-13T14:45:57","slug":"news-3035","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/13\/news-3035\/","title":{"rendered":"Startup That Sells Zero-Days to Governments Is Offering $1 Million For Tor Hacks"},"content":{"rendered":"<p><strong>Credit to Author: Lorenzo Franceschi-Bicchierai| Date: Wed, 13 Sep 2017 14:18:31 +0000<\/strong><\/p>\n<p>A notorious startup is offering up to $1 million in rewards to security researchers who can find bugs and develop techniques to exploit the anonymous web surfing tool the Tor Browser.<\/p>\n<p>On Wednesday, <a href=\"https:\/\/motherboard.vice.com\/en_us\/topic\/zerodium\">Zerodium<\/a>, a US-based company that buys exploits from researchers and sells them exclusively to government customers, <a href=\"https:\/\/zerodium.com\/tor.html\" target=\"_blank\">announced the new bounty<\/a>. The highest bounty is $250,000 for an exploit that allows the attacker to hack a target who&#8217;s using the Tor Browser with high security settings on Linux Tails and Windows, giving the attacker the highest kind of privileges on the target&#8217;s computer. Other bounties range between $75,000 (for exploits that only work for either Windows or Tails, and work only with Javascript allowed, for example, making them easier to develop) and $200,000.<\/p>\n<p class=\"article__blockquote\"><b> Read more: <\/b><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/gybppx\/iphone-bugs-are-too-valuable-to-report-to-apple\"><b> iPhone Bugs Are Too Valuable to Report to Apple<\/b><\/a><\/p>\n<p>&#8220;We need many exploits as we have many customers with many ongoing operations against illegal activities undertaken on Tor,&#8221; Chaouki Bekrar, the CEO and founder of Zerodium, told Motherboard in an online chat. &#8220;We have a higher demand for Tor exploits from our government customers as they are facing higher illegal activities on Tor and they must take action.&#8221;<\/p>\n<div class=\"article__media\"><picture class=\"article__image\"><source media=\"(max-width: 25em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=400:*, https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=600:* 2x\"><source media=\"(max-width: 40.625em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=650:*, https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=975:* 2x\"><source media=\"(max-width: 53.125em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=850:*, https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=1275:* 2x\"><source media=\"(max-width: 65.625em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=1050:*, https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=1575:* 2x\"><source media=\"(min-width: 65.625em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=1050:*, https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png?resize=1575:* 2x\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/_uncategorized\/1505311956974-Screen-Shot-2017-09-13-at-93423-AM.png\" alt=\"\"><\/picture>\n<div class=\"article__image-caption\">A table showing the different Tor Browser bounties. Image: Zerodium<\/div>\n<\/div>\n<p>In the announcement, Zerodium specifically pointed to &#8220;drug trafficking or child abuse&#8221; as examples of how &#8220;ugly people&#8221; use Tor. The bounty is open until November 30 unless payouts reach $1 million before then, the company said. Usually, bug bounty programs don&#8217;t have an expiration date. <\/p>\n<p>Zerodium has gained notoriety for offering high payouts and bounties for targets such as the iPhone. In 2015, shortly after its launch, Zerodium <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/539nz8\/theres-now-a-1-million-bounty-for-hacking-the-new-iphone\">offered $1 million for anyone who could develop a technique to hack an iPhone remotely<\/a>. When the challenged ended, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/yp3mx5\/somebody-just-won-1-million-bounty-for-hacking-the-iphone\">the company claimed<\/a> that a team of hackers was able to claim the bounty. Zerodium always declines to discuss the identities of its customers or the researches it deals with. <\/p>\n<p>Undoubtedly, there&#8217;s demand among intelligence and law enforcement agencies for such exploits. Last year, European cops hacked users of a child pornography website called The GiftBox Exchange using an unknown Firefox vulnerability\u2014or <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/mg79v4\/hacking-glossary\">zero-day<\/a>. But some believe that Zerodium&#8217;s headline-grabbing prices are just a marketing stunt. <\/p>\n<p>&#8220;I don&#8217;t think [the prices] are accurate reflections of Tor Browser as a secure system,&#8221; a security researcher with knowledge of the exploit market, who asked to remain anonymous, told Motherboard. &#8220;Those prices are marketing.&#8221;<\/p>\n<p>Last month, when Zerodium announced new rates and bounties, <a href=\"https:\/\/twitter.com\/isislovecruft\/status\/902968690613899264\" target=\"_blank\">offering the same amount of money<\/a> ($100,000) for similar Tor Browser and Chrome exploits, Tor developer and cryptographer Isis Lovecruft told Motherboard that &#8220;maybe this is all a PR stunt to get people like us to pay attention to their silly 0day-hoarding startup :).&#8221;<\/p>\n<p>In response to this criticism, Bekrar said that the &#8220;prices are high as exploitation without JavaScript is difficult and [Local Privilege Escalation] is required for the highest payouts.&#8221; <\/p>\n<p>&#8220;Hard research work = big bounty,&#8221; he told me.<\/p>\n<p>The Tor Project, which develops and maintains the Tor Browser, did not immediately respond to a request for comment. <\/p>\n<p><i>This story has been updated to include a comment from Chaouki Bekrar.<\/i><\/p>\n<p class=\"article__blockquote\"><b> <i> Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at lorenzo@jabber.ccc.de, or email <\/i><\/b><a href=\"mailto:lorenzo@motherboard.tv\" target=\"_blank\"><b> <i> lorenzo@motherboard.tv<\/i><\/b><\/a><\/p>\n<p><b> <i> Get six of our favorite Motherboard stories every day <\/i><\/b><a href=\"http:\/\/motherboard.club\/\" target=\"_blank\"><b> <i> by signing up for our newsletter.<\/i><\/b><\/a><\/p>\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/7xkp8q\/startup-that-sells-zero-days-to-governments-is-offering-dollar1-million-for-tor-hacks\" target=\"bwo\" >https:\/\/motherboard.vice.com\/en_us\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/59b93c9d8695d9314ede84cd\/lede\/1505312272001-tbb.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Lorenzo Franceschi-Bicchierai| Date: Wed, 13 Sep 2017 14:18:31 +0000<\/strong><\/p>\n<p>A startup that sells exploits to governments says it wants hacks for the browser used by activists, protesters, journalists, and criminals.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,13328,10378],"tags":[4500,10987,3919,13408,10573,10618,14709,11584,14710],"class_list":["post-9262","post","type-post","status-publish","format-standard","hentry","category-independent","category-motherboard","category-security","tag-cybersecurity","tag-exploits","tag-hacking","tag-information-security","tag-infosec","tag-tor","tag-tor-browser","tag-zero-days","tag-zerodium"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9262"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9262\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9262"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}