Vista Zero-Day Exploit For Sale 233
Snakepit Bit writes "Underground hackers are hawking a zero-day exploit for Windows Vista at $50,000 a pop, according to computer security researchers at Trend Micro. The Windows Vista exploit, which has not been independently verified, was just one of many zero-days available for sale at an auction-style marketplace infiltrated by the anti-virus vendor. Prices for exploits for unpatched code execution flaws are in the $20,000 to $30,000 range. Bots and Trojan downloaders that typically hijack Windows machines for use in botnets were being sold for about $5,000." From the article: "According to [Trend Micro CTO Raimund] Genes, the typical price of a destructive exploit has increased dramatically, driving an underground market that could exceed the value of the legitimate security software business. 'I think the malware industry is making more money than the anti-malware industry,' Genes said."
There's a patch available (Score:1, Funny)
WinXP Security Configuration Guide (Score:3, Informative)
http://download.microsoft.com/download/5/3/b/53b5
If you have the patience to follow that guide, then your WinXP will be locked down and secure.
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
Windows 2000 may have it's advantages but I don't think security is one of them.
I'm a big fat Unix geek, but in reality I've never had a virus with XP or 2000 in 6 years of on again off again usage. Honest.
I stay behind a firewall, use Avast or AVG, used Netscape and now Fire
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Since then they have lost it again but thankfully fixing it was quicker second time around.
On the other hand all our Raq550's and RaqXTR's run linux and have not given me any trouble in that regard yet. We also have a pair of win 2003 servers and they seem to do ok too.
The idea of putting win2000 or Winxp in a mission critical role strikes me as asking for trouble. I wouldn't go near vista in a server role for the
Re: (Score:2)
And you're proudly proclaiming this on Slashdot? I admire your courage
Ah... (Score:5, Funny)
Thank you, Captain Obvious.
*salute*
Re: (Score:1, Funny)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re:Ah... (Score:5, Insightful)
Re: (Score:3, Funny)
The malware industry doesn't exactly report their numbers,
http://www.microsoft.com/msft/earnings/ [microsoft.com]
keep offices,
Their headquarters is here [google.com]
or publish a trade rag.
http://www.microsoft.com/technet/technetmag/ [microsoft.com]
Re: (Score:2)
What isn't quite so obvious is which side should be considered more malicious here: the malware industry, which looks for security holes to profit the Russian mafia and other zombie network controllers but may also end up compromising Vista's DRM - by, say, find an arbitrary code execution hole from Media Player - or the security industry which will inevitably end up defending the
Re: (Score:3, Informative)
Auctions (Score:5, Interesting)
Re:Auctions (Score:5, Funny)
Re: (Score:2, Funny)
closed systems (Score:4, Interesting)
I think it is a good thing: it goes to show that having closed systems puts information access at a premium instead of service and real, tangible results for your customers. Open source systems don't have this problem (they have others, 'bot' not this one).
Re:closed systems (Score:5, Insightful)
Re: (Score:2, Insightful)
Re:closed systems (Score:4, Insightful)
A big server with lots of bandwidth will stand out like a honeymooner's dick (thanks Billy Birmingham) and be rapidly blacklisted. See: RBL, ORBS, etc
Re:closed systems (Score:4, Insightful)
1. Linux servers do not have a higher marketshare than windows servers, check your facts.
2. Servers be linux or windows, typically have people that are more computer literate, hence are alrady better protected, monitored, and locked away.
3. millions of unmonitored desktops, with careless users, with broadband connections will always be a better target.
Re: (Score:2)
Re: (Score:2)
Vista (Score:2)
Vista Market Share? Re: closed systems (Score:2)
If Linux/bsd/osx were at 90% market share, I am sure these &#@%$! will still be selling/buying vulnerabilities at these prices.
So why is anyone buying Vista exploits? To answer that question you have to admit either that M$ does not fix problems for months and years or that the "popularity" argument is bogus. People traffic Windoze exploits because they work today and keep working tomorrow. Non free is a broken development model.
Re: (Score:2)
For all the paid to post marketdroid lusers, obey, conform and bow to your M$ masters (sucks to be you :-( ).
Don't let the marketdroids fool you, forums are all about expressing yourself creatively, so if something like M$=B$ makes sence and is understood, use it, the same as windoze and windrones an
Re: (Score:2)
Re: (Score:2)
But that will never happen, where BSD and Linux are concerned. In fact, it's designed not to happen. The fact of the matter is that people in the FOSS world recognise that monoculture is a dangerous thing, and actually built the entire system to contain as few monolithic elements as possible.
See, the Toolkit Approach doesn't just make the systems integration task easier, it'
As example (Score:2)
As an actual example to your arguments, one may cite the discussion that was featured a few days ago about Red Hat wanting to clean and improve their RPM system.
There was quite a few users complaining about alleged dependency hell that they linked to the RPM format it self, when in fact those problems are due to the fact that several different distribution use the RPM format and one size won't fit all. A single RPM package will only work with a small subset of distribution flavors, featuri
Re: (Score:2)
Re: (Score:2)
But jokes aside, you can bet that once housewives and average Joes start running Linux, it will be worthwhile to develop such exploits, and you will start seeing them.
Re: (Score:2)
I tried pretty much the same thing (both with a tar'd shell script and an RPM package) under KDE 3.5.x (I forget which exact version, it's been a few weeks ago and I've upgraded to FC6 now) on Fedora Core 5, emailed to myself via Thunderbird. It appears that Thunderbird strips the executable flag coming back in, so I have to upgrade my privileges to be able to execute a shell script, even when sending and receiving under the same user account.
* * * * * *
I am still learning.
--Michelangelo
I misspoke... (Score:2)
It will allow me to save the archive to disk, then extract the shell script and run it without altering permissions. What Thunderbird won't allow me to do is execute the embedded shell script directly; it will pass it off to the default archive manager but my manager will only allow me save the script or look at it in my default text editor. I could certainly configure the manager to run the script but that's not the default behavior out of the box.
This, however, is a far cry from the last few Windows mal
Price increasing (Score:1)
Re: (Score:2, Funny)
Not just harder, but longer and thicker, according to the zombie e-mail I receive.
Re:Price increasing - Publicity stunt (Score:2)
Think again. Vista has not yet been put on the market. Right now, it is available to bulk purchases by enterprises, but there is no indication that these enterprises are engaging in massive upgrades. It is also available for download by MSDN subscribers. All in all, there are probably a m
Re: (Score:2)
Re: (Score:2)
According to [Trend Micro CTO Raimund] Genes
Anti-virus software makers, concerned at the visage that MS has put up of a more secure Vista, trying to ensure sales of anti-virus products on new boxes.
Simple as that.
Re: (Score:2)
l33t hax0r (Score:5, Funny)
Sounds like I need to switch jobs. Finally, a job where discovering Windows bugs will pay off instead of just generating more work for me.
Re:l33t hax0r (Score:5, Interesting)
Re: (Score:2)
Please define "zero-day" (Score:3)
Re:Please define "zero-day" (Score:4, Informative)
No, it's an exploit released before there's a patch that fixes the hole the exploit exploits.
zero-day warez are cracked (i.e. DRM removed) versions of programs available on the same day or before the commercial versions are released.
Re: (Score:2)
So then how is it different from an exploit for an "unpatched" vulnerability?
Methinks it's a recently-made-up scare word.
Re:Please define "zero-day" (Score:5, Informative)
Then security vendors tried to use it to mean any vulnerability without a patch, known or unknown because then they could rightly claim that their software mitigated a 0-day vulnerability, which really meant thier software could mitigate a known vulnerability. That's where the media idiots jumped in because 0-day sound cool and scary.
There is no point in trying to correct them. That ship has sailed. Just like "hacker" now means criminal when the original definition was a badge of honor.
Now that the vulnerability is known, it is just an unpatched vulnerability.
"Hacker" (Score:2)
Re: (Score:2)
Zero-day exploits - exploit to unpatched vulnerablity.
DDR RAM isn't a dance training device either.
Re: (Score:1)
Re: (Score:1, Informative)
What do Linux virii cost? (Score:3, Funny)
Open source does not equal free beer (Score:2)
Economy (Score:3, Funny)
Kidding, of course.
Re:Economy (Score:5, Insightful)
Re: (Score:2, Insightful)
I was under the impression that libertarians were the embodiment of capitalism.
That's neo-liberalism you're confusing with old fashioned liberalism. With neo-liberalism the emphasis is on freedom of the market, based on an article of faith that the market is some magical entity that'll solve all admisitrative problems. With old fashioned liberalism the freedom of one person is balanced against the freedom of another, the consequence of which is a system of legislation to protect those freedoms.
Social and economic liberalism (Score:2)
With neo-liberalism the emphasis is on freedom of the market, based on an article of faith that the market is some magical entity that'll solve all admisitrative problems.
You're mistaking social liberalism with economic liberalism. Liberals, liberalism are/is about both. I'd go as far as arguing that you can't in reality have one without the other, which is why our freedoms are being squashed the world over. Neither the Democrats, nor the Republicans, the Tories or New Labour are Liberal.
Liberalism in America has come to mean socially liberal and economically restrictive. It's an incorrect definition of the word liberalism, and as such you've had to invent a new word to mea
Re: (Score:2)
Re: (Score:2)
a capitalist system demands respect for tangible and intangible property.
almost everything is ultimately reduced to pieces of papers. mere tokens. an entry in a ledger. a bill of lading.
abstraction demands literacy. competence in math.
a capitalist system demands a mechanism for the enforcement of contracts.
a capitalist system needs reliable weights and measures.
standard time. stable currencies. defenses against highwaymen,
Re: (Score:2)
Re: (Score:2)
None of the things you mention require government (Score:2)
Nope (Score:2)
Well, Duh! (Score:3, Informative)
Malware is a profit-making industry. Anti-malware is aimed at eliminating profits, not making them. It doesn't take an economic genius to understand the implications.
How many times have
Re: (Score:2)
Thank you Sherlock for telling us that companies exist to make profit. Next thing you know you'll be telling us that people work for companies to get a salary.
Here's a big cluestick to knock that tinfoil off your head: there is a world of difference between the goal of generating profit legally and ethically, and the goal of generating profit by any means whatsover.
Duh.
Oh come on now... (Score:5, Insightful)
It isnt smart to assume that there are zero day exploits for Vista available just because some reporter says he heard there is someone who wants to anonymously sell you an exploit he promises is really good. Even if these exploits are real (big if) noone said anything about how big of a security hole we are talking about here.
How about if I tell you that I heard someone offered to sell an Linux exploit of an unknown nature for 50 grand? Should we all run around talking about how Linux is insecure now?
This seems like a journalist trying to come up with something good to write about and slashdot forwarding it on as anti-ms fud.
Re: (Score:2)
Re:Oh come on now... (Score:5, Insightful)
True. We don't know it's real. (Score:2)
Yeah, right (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
You must not have looked very hard. Actually there have been substantive changes as regards security, not the least of which is that the user is *not*, by default, running with administrator privileges. This is the #1 reason *nix types criticize Windows as insecure and it has been fixed. Now, I'm sure with all the bloat and "rushed" schedules, problems will creep in, but the very fact that the average home use
Re: (Score:2)
Re: (Score:2)
On this we can agree, though I would probably say "Microsoft will never be as secure as a server-based OS". As you know there are degrees of security, so making a blanket statement without qualifying what you mean by secure is fairly meaningless. Anyhow, a desktop that is as locked down as a hardened server would be extremely annoying to use, even for technically saavy users. For the typic
Re: (Score:2)
Re: (Score:2)
You must not have looked very hard. Actually there have been substantive changes as regards security, not the least of which is that the user is *not*, by default, running with administrator privileges. This is the #1 reason *nix types criticize Windows as insecure and it has been fixed. Now, I'm sure with all the bloat and "rushed" schedules, problems will creep in, but the very fact that the average home user is no longer an admin should have a huge effect on overall security.
It won't.
Well, it probably
Hi, welcome to... (Score:4, Funny)
Today, we have on offer a few jolly nice samples of the finest goods, what do you think of:
* Evil worm 2 - Dr.Evil himself would promote this one, if he were a real person, but alas: this Evil worm 2 does not come with frickin' lasers on its head. Made in China, this worm can eat away the fumbly firewalls of most present day Windows machines !
All that, at a price of just $30.000 !
* Glasnost x-ploit - Oh my, in the Western world we make the x-ploit, but in Russia - where this lovely piece of software was born - they x-ploit you ! Just like in the old days of Gorbatchov, this Glasnost worm certainly opens
For just the measle amount of $15.000, you could have your very own Glasnost'ed Windows botnet in no time !
Last but not least, we wouldn't want to forget our bestseller, our hitman, our top product in the fine world of Windows Redecorating Software : Yoghurt Trojan !
Not the milk-product, but you could say it's milky white cream covers most Windows PC's pretty well ! It has no aftertaste like some worms, and definitely likes to morph into different appearances ! It can definitely lighten the spirits of whoever is at the controls and includes a lovely "MAD"-button in case some law enforcement officer decides to peak into your operation : no more evidence, because no more Trojaned PC's survive the Mutually Assured Deletion of this king of kings !
All that, for just $50.000, it's a bargain !
Where's the Popularity Argument Now? (Score:4, Insightful)
Oh, ho ho. All the apologists are quick to argue that, "The only reason the bad guys target Windoze is because it's popular." What bullshit that is.
Vista has what market share now? Less than Mac or Linux I'm sure and everyone knows that it's going to stay that way for years. Yet there's already a market for exploits. What this should tell you is that the value of an exploit it's ability to work, regardless of market share. The bad guys know that M$ security sucks and that the holes they buy today will be good for months if not years to come. No one bothers with GNU/Linux exploits because the GNU/Linux market is fragmented and quick healing. Linux exploits don't take down every distribution but just about every distribution is quick to fix problems. GNU/Linux exploits, relative to Windoze, don't work or last long.
Most people are not experts (Score:2)
They would probably using a 2.2 kernel, a very old build of KDE, and so on.
The fact is: Smart users don't get infected, naive users do. Some smart users use Linux, some smart users use Windows. Most naive users use Windows.
Target the naive users and ignore the smart. No matter what OS the smart people use.
So? Re:Most people are not experts (Score:2)
If the same people that use Windows for Powerpoint and Word and have a gazillion worms in their system used Linux, their systems would be as infected as they are now. They would probably using a 2.2 kernel, a very old build of KDE, and so on. The fact is: Smart users don't get infected, naive users do.
No, everyone who uses Windoze gets infected. It's not something you can do anything about because only M$ can "improve" the system. See here [slashdot.org] for well documented facts about the ongoing M$ security dissa
The odds are against you. (Score:2)
I run XP SP2, Kapersky, and run an antivirus/antispyware (Avast and Spybot) about once every month. I've never had a virus infection on this machine or my previous machine.
Like 75% of Windows users, you probably rate your machine as "moderately" to "very" secure. Yet more than 80% of windows computers are part of the botnet. What do you think you know that 90% of windows users don't? It's all well laid out here [slashdot.org] in stunning and referenced detail.
Re: (Score:2)
HAHAHAHAHAHAHAHAHAHAHAHA!
HAHAHAHAHAHAHAHA! HAAAAAAAAAAAAAAHAHAHAHAAHAHAAHAHAHA!!!
You make up statistics (80%?! please) and then babble on about "the botnet", this presumably being the same botnet that posts nasty things about you on Slashdot, sends spam emails, DDOSs websites and brought the Third Reich to power which you so lovingly reference all the time.
Really, I have no idea how you have any credibility. Oh wait, you don't. Sorry.
We Need Vista To Ship & Stay #1... (Score:2)
How much damage from 'fake' security holes? (Score:2)
Similar to how millions now have to take off our shoes in the airport b/c ONE guy tried to light his shoes on an airplane.
Legality (Score:2)
I'll Believe It When It's Confirmed (Score:2)
But Vista has a lot of features [wikipedia.org] that makes the inevitable bugs much, much harder to take advantage of.
The single most common attack vector in Windows is IE. Virtually all the malware installed on machines today was likely installed by a drive-by-download caused by one of the many, many holes in IE.
But users running Vista have Protected Mode [msdn.com], which effectively isolates IE and prevents it from doing damage. It's possi
Re: (Score:2)
Vista has a lot of features that makes the inevitable bugs much, much harder to take advantage of.
Yes, and I'll bet that each one of those features has it's own bugs which can be exploited - which makes the entire computer easier to exploit, not harder.
It's possible that protected mode has a flaw, but judging by how it works I find that unlikely.
I see you've already considered the possibility that the features will have their own bugs. However, unlike you, I will decide to err on the side of historical evidence.
Historically, MS doesn't know how to write secure software, and takes several attempts to get it right. Why would these new features be any different?
Vista users aren't running as admin
You're claiming that the OS enfor
Re: (Score:2)
The features I was referring to are things like ASLR. Even a flawed implementation of ASLR will make the computer harder to exploit, not easier. To assume that any new feature will automatically result in a more vulnerable computer is a flawed assumption. It completely depends on the feature in question.
Re: (Score:2)
To assume that any new feature will automatically result in a more vulnerable computer is a flawed assumption.
Bullshit. You said it yourself:
No non-trivial software is bug free.
The more features (code) you add, the larger the bug count. It's a well-known axiom in security circles that every bug is a potential security vulnerability. Therefore, every feature you add makes your software more vulnerable. By definition.
Perhaps if you understood general computer security a little better, it might be helpful for you to understand my arguments. You seem to have done some reading on MS security, but there's a whole world outside of MS. There's a
Capitalism at it's Finest (Score:2)
Microsoft has been very lax in the area of security, enabling a market to evolve around exploiting it's weaknesses. Microsoft got it's self into this position by maintaining a monopoly. Absent a monopoly, M$ would have had to compete on quality an
Hm (Score:2)
Re:Why doesn't Microsoft buy those out? (Score:4, Insightful)
Why do?
After a user buys a copy of Vista, Microsoft receives no more money from the user.
It would probably be economically wise to spend time in developing another product.
Re: (Score:2)
It would probably be economically wise to spend time in developing another product.
Not to mention, if you never fix the bugs, the customers just might be willing to pay for your next OS.
Re: (Score:2)
I really don't get it. To me it seems it would be economically wise to buy these out and then fix the bugs.
1. This could be due to the legal implication
I'm not sure law will look kindly at a company that fund illegal activities to improve their business. And if it comes from a security company, just having your name attached that kind of illegal activity could kill your credibility big time ( like 'they did that to fix the bug, yeah sure like petrol in irak is just a coincidence' whatever true or false that may be )
2. Buying would just drive the prices up, hence increase the prices and therefore maybe get the i
Re: (Score:2)
Re: (Score:2)
Microsoft buying them would be giving in to blackmail.
And, these hackers clearly have zero scruples, so what's to prevent them from selling the exploits to others after Microsoft bought them?
Get real.