• Latest
  • Trending
Threat Actors Discuss Leasing Zero-Day Exploits

Threat Actors Discuss Leasing Zero-Day Exploits

November 18, 2021
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Tuesday, 7 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Threat Actors Discuss Leasing Zero-Day Exploits

by ITECHNEWS
November 18, 2021
in Infosec
0 0
0
Threat Actors Discuss Leasing Zero-Day Exploits

Ransomware gangs can now afford to pay as much as $10m for zero-day exploits, but for those without the money, developers have discussed renting out malicious code, according to Digital Shadows.

The threat intelligence firm’s new report ⁠–⁠ Vulnerability Intelligence, Do You Know Where Your Flaws Are? ⁠–⁠ is based on a detailed analysis of the cybercrime underground.

YOU MAY ALSO LIKE

Instagram fined €405m over children’s data privacy

5.7bn data entries found exposed on Chinese VPN

It confirmed that ransomware actors are now wealthy enough to compete with state-backed operatives in buying zero-days.

“These prices can appear enormous but there‘s a key aspect to keep in mind. Whatever legitimate bug bounty programs offer — and we’ve often seen them offering multimillion-dollar bounties before ⁠–⁠ cyber-criminals must offer more in order to compete with them, given the risks (jail time) and additional requirements needed during illicit activity (i.e. money laundering),” the report claimed.

However, while there are easy pickings from exploiting exposed RDP appliances and phishing users, these actors are unlikely to spend big at present, it added.

For those without that kind of money, there’s another option ⁠–⁠ Digital Shadows also observed cyber-criminals discussing a potential “exploit-as-a-service” model.

“This model would allow capable threat actors to ‘lease’ zero-day exploits to other cyber-criminals to conduct cyber-attacks. In fact, while a developer can generate large profits when selling a zero-day exploit, it often takes them a significant amount of time to complete such a sale,” it explained.

“However, this model enables zero-day developers to generate substantial earnings by renting the zero-day out while waiting for a definitive buyer. Additionally, with this model, renting parties could test the proposed zero-day and later decide whether to purchase the exploit on an exclusive or non-exclusive basis.”

That said, legacy vulnerabilities still offer fertile hunting ground for most threat actors, who are even sharing databases of target organizations that have not patched specific systems such as Microsoft Exchange.

According to the report, the cybercrime community is adept at information sharing in this regard, with older members imparting wisdom to help novice threat actors.

“Besides sharing tutorials, experienced, trusted users often provide reviews of their preferred (or least favorite) tool on the market, just like any other good consumer would,” the report claimed.

“Reviews cover everything from vulnerability-scanning tools to online bulletproof-hosting services, and many include detailed descriptions of how they work. These diligent reviewers are helping their peers identify relevant products for exploitation and make more informed decisions.”

However, there’s no honor among thieves, with Digital Shadows also observing threat actors attempting to troll or scam fellow forum members.

Phil Muncaster UK / EMEA News Reporter, Infosecurity Magazine

ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version