Menu
Exploit broker places $100k bounty on bypassing Flash Player's latest defenses

Exploit broker places $100k bounty on bypassing Flash Player's latest defenses

Flash Player's new heap isolation is under attack

A little over two weeks have passed since Adobe strengthened Flash Player with new security defenses, and there's already interest in the commercial exploit market for ways around them.

Zerodium, a company that buys unpatched and unreported exploits from third-party researchers, announced on Twitter that it is offering $100,000 for exploits that bypass Flash Player's latest "heap isolation" protection. This memory defense mechanism makes exploiting certain types of security flaws much harder. These account for a large portion of the Flash Player flaws exploited by hackers in recent years to infect computers with malware.

Adobe started working on the heap isolation defense earlier this year with help from Google's Project Zero vulnerability research team, whose members reported about a third of all Flash Player flaws patched in 2015.

Google Project Zero contributed heap isolation for vectors and then Adobe extended that protection to ByteArrays, said Peleus Uhley, Adobe's principal scientist, in a blog post on Dec. 21. "In last week’s release, Adobe deployed a rewrite of our memory manager to create the foundation for widespread heap isolation which we will build on, going forward."

Throughout this month, Zerodium will pay $100,000 for every Flash Player exploit that bypasses the new heap isolation defense, as well as the program's sandbox mechanism. Exploit chains that don't include a sandbox bypass, but defeat heap isolation, will be rewarded with $65,000, the company said.

Zerodium was set up last year by Chaouki Bekrar, the founder of now defunct French vulnerability research firm Vupen Security, which was known for creating and selling exploits to governments. The company's goal is similar to that of Vupen, but instead of creating its own exploits, it acquires them from third-party researchers.

Zerodium is only interested in high-risk vulnerabilities accompanied by reliable exploits affecting modern operating systems, software and devices, and which haven't been reported to the affected vendors.

The company claims to provide the acquired vulnerability information, along with protective measures and security recommendations, to clients who subscribe to its security research service. These clients include "major corporations in defense, technology, and finance, in need of advanced zero-day protection, as well as government organizations in need of specific and tailored cybersecurity capabilities."

The high payouts offered by exploit acquisition companies like Zerodium provide a hard-to-resist incentive for researchers to not report the vulnerabilities they find to affected vendors, delaying their patching and keeping users insecure for longer times. Very few software makers can match the same rewards through their own bug bounty programs.

In September, Zerodium offered $1 million for a browser-based exploit that could compromise Apple's newly released iOS 9 mobile operating system. In November, the company announced that a team of researchers qualified for the prize.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments