{"id":8242,"date":"2017-07-06T07:00:01","date_gmt":"2017-07-06T15:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2017\/"},"modified":"2017-07-06T07:00:01","modified_gmt":"2017-07-06T15:00:01","slug":"news-2017","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2017\/","title":{"rendered":"The Real-World Impact of Bug Bounties and Vulnerability Research"},"content":{"rendered":"<p><strong>Credit to Author: Brian Gorenc| Date: Thu, 06 Jul 2017 16:31:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Running the world\u2019s largest vendor agnostic bug bounty program has afforded us the unique opportunity to purchase bugs of all varieties. The submissions to the Zero Day Initiative (ZDI) program range in severity from slightly annoying to hugely impactful. We wouldn\u2019t have it any other way. Generally speaking, the goal of a bug bounty program is to acquire as many bugs as possible. What happens with the bugs once acquired changes depending on the bounty program. At the ZDI, we work not just to kill bugs, which is something we do at a higher rate than other <a href=\"http:\/\/newsroom.trendmicro.com\/press-release\/awards\/trend-micro-zero-day-initiative-recognized-leading-vulnerability-research-organ\">organizations<\/a>, but we also aim to disrupt the use of exploits used in advanced attacks.<\/p>\n<p>Of course, detecting and defending against advanced persistent threats provides its own challenges. It\u2019s rare that real-world scenarios are laid bare without a time of crisis response. Recently, the WikiLeaks dump of tools reportedly used by U.S. government agencies offered a prime example of the ZDI program altering attack methods. In fact, if the data provided by WikiLeaks is to be believed, the Central Intelligence Agency was forced to change their operational toolset for exploiting targets based on actions taken by the ZDI.<\/p>\n<p>In 2010, the world was introduced to the Stuxnet virus after it caused substantial damage to centrifuges in the Iranian nuclear program. At its core, Stuxnet had three parts: a rootkit to hide itself, a worm to execute the main payload of its attack, and a link file that automatically executed to spread copies of the worm. Microsoft released several different security patches in response, including <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms10-046.aspx\">MS10-046<\/a>, to address the vulnerability in link files. The patch enabled a whitelist check to ensure only approved files could be used, and many thought the implementation succeeded. However, according to the documents published on WikiLeaks, a tool called \u201cEZCheese\u201d exploited a similar bug in link files until 2015. That change resulted from a set of bugs coming through the <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/ZDI-15-086\/\">ZDI program<\/a> that showed the MS10-046 patch had <a href=\"https:\/\/community.saas.hpe.com\/t5\/Security-Research\/Full-details-on-CVE-2015-0096-and-the-failed-MS10-046-Stuxnet\/ba-p\/251257#.WVQScdPytgc\">failed<\/a>. This forced a change of operational tactics to what was then an \u201cunknown link file vulnerability (Lachesis\/RiverJack) related to the library-ms functionality of the operating system.\u201d Although not explicitly stated by Microsoft, this other link file bug was likely corrected with the release of <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8464\">CVE-2017-8464<\/a>.<\/p>\n<p>According to the released documents, both EZCheese and its successor Brutal Kangaroo were designed to attack air-gapped networks similar to Stuxnet. What some may not realize is that the link file could also be hosted on a remote drive viewable by the target.<\/p>\n<p>When the ZDI acquires a bug, it isn\u2019t just reported to the vendor for remediation. Information about the bug is provided to Digital Vaccine\u00ae Labs (DVLabs) within Trend Micro. They produce a DV filter for the vulnerability that allows TippingPoint customers to protect themselves while the vendor develops a patch for broader release. And yes, after deploying this filter (Digital Vaccine Filter 19340), hits were seen in Europe, South America, and Singapore. While it\u2019s impossible to know the intent or full circumstances surrounding these filters being triggered, the low quantity indicates these were likely targeted attacks.<\/p>\n<p>Earlier dumps from ShadowBrokers show this isn\u2019t the first case of this happening. The vulnerability used by the exploit referred to as \u201cEwok Frenzy\u201d was submitted to the ZDI program back in <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/ZDI-07-011\/\">2007<\/a>. Even though a patch was made available for the exploit, it was reportedly used for almost a decade after our initial disclosure. Bug bounties show their value when they successfully kill vulnerabilities. Without a doubt, the ZDI program kills bugs. In fact, we\u2019ve released 452 advisories this year (as of July 5) with 413 more in our upcoming queue. Each one represents a bug exposed to the light. In some cases, the exploit techniques required to exploit a bug can also be filtered. For example, another vulnerability listed in the documents, EasyBee, worked in the same manner as Ewok Frenzy, so the implemented DV filter covered both attacks.<\/p>\n<p>You can question the veracity of these dumps or whether these exploits were ever actually in the wild, but the scramble by vendors to produce patches has been undeniable. The dumps show adversaries have a complexity and sophistication that requires constant vigilance from network defenders. It also shows how dedicated vulnerability research combined with a world-class bug bounty program increases security for everyone by changing the attack surface. While it\u2019s true there is a difference between zero-day vulnerabilities and zero-day attacks, the value of having protection against bugs prior to their disclosure can\u2019t be measured. The number of software bugs disclosed globally continues to increase year after year. The Zero Day Initiative will continue acquiring and researching zero-day vulnerabilities and working with vendors to increase the overall security posture of their products. We might not ever eliminate all government sponsored, marsupial-based exploits, but we sure can make it harder on them.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/real-world-impact-bug-bounties-vulnerability-research\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Brian Gorenc| Date: Thu, 06 Jul 2017 16:31:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/linux-mint-hack.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Running the world\u2019s largest vendor agnostic bug bounty program has afforded us the unique opportunity to purchase bugs of all varieties. The submissions to the Zero Day Initiative (ZDI) program range in severity from slightly annoying to hugely impactful. We wouldn\u2019t have it any other way. Generally speaking, the goal of a bug bounty program&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10415],"class_list":["post-8242","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8242"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8242\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}