📜 ⬆️ ⬇️

Exploit a million

Yesterday, information appeared on the network that independent merchants of software exploits assigned a reward of one million US dollars to those who provide information about the working zero-day vulnerability in iOS 9.

image

The award for security professionals and hackers who will be able to find a 0day-vulnerability was announced by the startup Zerodium this Monday.
')
Zerodium will pay one million US dollars ( $ 1,000,000.00 ) to each specialist or team who will provide us with exclusive information about the vulnerability based on the browser or untethered jailbreak in the latest Apple operating system - iOS 9.

The offer is valid until October 31, 2015, 6:00 p.m. East Coast Time. The program can be closed ahead of time if the amount of payments exceeds the budget allocated for it at $ 3,000,000.00 US.

Technology giants such as Google or Facebook have long offered generous rewards to those who report bugs and vulnerabilities in their products. Microsoft should also be on this list, who recently conducted the Bug Bounty Program to search for vulnerabilities in its new EDGE browser (then Spartan).

At the same time, Apple does not practice Bug Bounty-programs, sometimes only pointing out a user or a group of users who have found a “hole” in their official text of a patch laptop for iOS, the patch of which closes these holes. For example, this was done with iOS 7.1, where the company indicated the evad3rs hacker group as the user who discovered the error. The irony of the situation is that evad3rs are creating a jailbreak for iOS, including the very iOS 7.0, later patched to iOS 7.1.

image

But there is a flip side of the market where medium-sized companies like Zerodium mentioned buy information about vulnerabilities in software in order to resell it for a lot of money on the so-called gray market, for example, to special services . According to the requirements set by Zeroduim, the exploit should allow an attacker to remotely install arbitrary software on devices running iOS 9, that is, including on the new iPhone 6s and iPad. In addition, the attack must pass through browsers Safari, Chrome, via text or multimedia message, bluetooth and NFC. The exploit should bypass iOS 9 protection mechanisms, such as secure bootchain, rootless, ASLR, sandboxing, code signing.

“Ehu! someone nevertheless determined how much a unicorn costs, ”joked information security specialist Pedro Vilaca (Pedro Vilaça), who also conducted research on the security of“ apple ”operating systems.

Apple is constantly patching security holes in its devices, preventing users from exiting the “cage” of their ecosystem and installing pirated software. 2007 can be taken as a point of reference, when, after the release of the new firmware 1.1.1 for iPhone, the devices that were unlocked by their owners turned into literally bricks. Hackers helped thousands of iPhone owners roll back to firmware 1.0.2, resurrect their pumpkin-like “iBricks” and safely upgrade to version 1.1.1.

Since then, Apple has repeatedly “tightened” the loop and patched holes in its operating systems so that users could not pass by the app store and use something “for free”. A separate paranoia deserves the project jailbreakme.com, whose address at some point began to block in wi-fi networks and in Apple stores.

The current offer of Zerodium can be called the most generous in history. The last time the “gray” exploit vendors offered a comparable amount ($ 500,000.00) in 2013, and also for undisclosed vulnerability in one of the iOS versions.

Source: https://habr.com/ru/post/267465/


All Articles