Security Research and Blackmail 307
harryjohnston alerts us to a story picked up by a few bloggers in the security space. A Russian security research company, Gleg, has discovered a zero-day in the latest version of RealPlayer 11. But they won't reveal details to Real, or to CERT, despite repeated requests. Details are available only to their clients who pay a lot of money for early access to such knowledge. To describe Gleg's business model Daniweb rather cautiously puts forward the word "blackmail." The story was first exposed in Ryan Nariane's Securitywach blog.
Intellectual Property (Score:5, Interesting)
Re: (Score:3, Insightful)
I'm sure that you'd easily come up with a lot of reasons why it isn't cool.
On certain superficial moral levels, sure - proprietary closed-source shops would have it coming in a fashion. They make money from hidden information, so hiding information from them until a fee is paid sounds a bit like karma.
OTOH, that's not how we're supposed to work as a community, for one simple reason:
Re: (Score:2, Insightful)
Re: (Score:2)
How does your argument differ from the profession of a lock smith?
I don't have a locksmith soliciting me out of the blue, demanding payment for his knowledge?
Your locksmith is more akin to a security contractor or consultant - you specifically hire the guy to utilize his knowledge in order to fill a need which you yourself have (e.g. you locked yourself outside of the house or car). Y
Re:Intellectual Property (Score:5, Insightful)
For some reason when I first read the summary I was thinking of this company's clients as benign, but a second reading made me rethink
Re:Intellectual Property (Score:5, Insightful)
If the company knows of an exploit and wants to sell the information about it to the vendor that's perfectly fine as long as they aren't threatening to tell others about it.
It's much list noticing my neighbor has an open wifi point advertising his file shares. Nothing wrong with offering to show them exactly what the problem is for a fee. If he doesn't want to pay for my expertise -- well, I told him his wifi point is leaving him open to hackers, so he has been warned. Now if I say I'm going to sell the information to others if he doesn't pay me -- that's extortion.
I couldn't tell with certainty from the article whether or not the firm is showing the actual exploit to their subscribers or not. They may just be informing their clients of the existence of the exploit and giving guidelines about the severity and potential impact to business operations. If that's all they're doing, I'd say they are playing to win, but playing by the rules.
On the other hand, if they sold the actual exploit to their subscribers then they're criminals.
Re: (Score:3, Insightful)
Well, that's an interesting argument. I'm not sure I agree, but I'm not sure I disagree either.
On one hand, making sure the vulnerability is explained in detail to
Re: (Score:3, Insightful)
Great analagy! Lets work with that.
Can you pay a locksmith to open someone elses house for you? Can you pay him to show you how so you can do it yourself?
Of course not.
But it goes further than that... locksmiths are both Licensed, and Bonded in most civilised countries to help prevent exactly these sorts of activities, as well as any other sort of unethical a
Re:Intellectual Property (Score:5, Funny)
Re: (Score:3, Funny)
In Soviet Russia, security bonds you !
Re:Intellectual Property (Score:5, Insightful)
Here's a better analogy for a legal activity: auto makers who sell SUVs to whomever wants them, then tell the rest of us we need one to keep our families safe in the event of being hit by one. It's a classic arms race, the only real winner is the arms dealer.
Re: (Score:2)
Go ahead and advertise a "locksmith" service to open the doors on anybody's home, without the owner's consent, for a fee. Then have fun in jail.
FWIW, there are security firms that specialize in exactly that. House being one of a personal residence, a corporate office, a warehouse, or any secured facility that a company wants audited. What better way to audit one's security than to hire people with technical knowledge on how to enter establishments they shouldn't be in? It's one of those niche businesses that savvy reformed criminals tend to start up because they're the ones with the unique skill sets to do so.
Here's a better analogy for a legal activity: auto makers who sell SUVs to whomever wants them, then tell the rest of us we need one to keep our families safe in the event of being hit by one. It's a classic arms race, the only real winner is the arms dealer.
Ahh, a car analogy. Auto manufactur
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
See rock meet glass. See glass break. Break glass break !
Have you eve tried to break a modern car window?
I have, and:
1) it's not easy. It takes a LOT of force to crack the window.
2) You get little pieces of glass with shard edges EVERYWHERE. They're not long jagged pieces like you would get from a non-laminated glass, but they can still cut you up pretty well.
It is possible with the right kind of tools (heavy blow, small area) to crack the window without blasting pieces everywhere, but with a simple rock, that result is not likely.
Shattering a window with a sm
Re: (Score:3, Informative)
Improvised side-auto glass breaking 101:
1.) Get an antenna from your car or the nearest one. Break it off.
2.) Make it into a U - hold both free ends in your one hand.
3.) Place this hand just outside the one corner of the window (your hand on the body of the car) with the rest of your "u" going across the window at an angle. Try to get the tip to hit in the bottom right or left corner of the window, about an inch or 2 from the edge.
4.) Pull the tip back with your other hand. Let go.
Re:Intellectual Property (Score:5, Insightful)
Honestly, I couldn't. I am sure there are security experts out there who would be able to improve security of my house but I certainly wouldn't expect them to do it for free. This idea that if you find bugs in a software product, you have the responsibility to give that information to the company that makes it, and therefore help them improve their product, for free is completely bogus.
Sorry, but there's a distinct lack of responsibility and ethics going on here, no matter how much you think the primary target may deserve it.
I don't see any ethical problems here and its completely irrelevant who the party involved is. I would actually argue that there is more of an ethical problem with testing a company's product for free, as it devalues the work of their own QA personnel, and it encourages companies to release shoddy products too early, with expectation that paying customers will help them fix the bugs.
Re: (Score:2)
Therein lies the problem. It's like some guy showing up at your house, saying that he knows exactly how he could break into that house, but he'll tell you how if you only pay him some money.
In short, nobody asked them to research the bug. They did the research unbidden.
If it's a question of fixing bugs for free, then quite simply they could just not do the research.
Re: (Score:2)
* Intrusion Detection Systems.
* Malware.
* Anti-Malware, and Anti-virus software.
* A rule that says you are not allowed to reverse engineer your own home.
oh, and all the vulgarity of copyright law.
This is why reasoning by analogy is not only stupid, but also pointless.
Re: (Score:2)
Re: (Score:2)
If I want my house to be secure, I can either secure it myself or I can pay someone to tell me where the vulnerabilities are.
Re: (Score:2)
BS. That is exactly what security analysts do. They research security problems. Whether it is how to break into your house or how to break into your computer is no different.
So if someone came up to you unannounced, and said they know exactly how to break into your house, but won't tell you unless you pay them some money, you'd have no problems with it?
If I want my house to be secure, I can either secure it myself or I can pay someone to tell me where the vulnerabilities are.
I don't argue against that. It's the unsolicited nature of it that irks.
Re: (Score:2)
Re:Intellectual Property (Score:4, Informative)
That in itself is a fair point. I mean what if you are working in the security industry and are trying to secure someones business. You certainly aren't going to do it for free.
The issue here is more like after the home owner saying they don't have the money or can't pay that you sell the information to whoever wants it. That I am pretty sure is illegal.
Re: (Score:2)
By selling to whoever pays, they are in effect blackmailing Real- "we are going to sell this info to lot
Re: (Score:2)
But in any case, what can we say about a company that makes its living by finding security vulnerabilities and offering to sell their findings to interested parties?
1) If they sell their findings to people who want to exploit them (rather than fix them), they are scum.
2) If they do not do (1), these companies are useful, as they do make it easier for flaws to be fixed, even if they do charge money (and won't help if you don't pay them).
3) It's *mean*. It's not nice to solicit someone and say "I could fix your problems (and it wouldn't even take me any work!), but you have to pay me a lot."
Couldn't we just consider this a public service, let the software giants and consumers learn a lesson from all of this and move along?
Our society has become so focused on instant gratification that it's built itself into the production models of physical products and software packages alike. "Release it now! Damn the QA! Mush! Mush!" is the battle cry of the upper management and bean counters.
Well what if we delayed releases of products until they were right and let the people learn to wait? What if p
Re: (Score:2)
I'd start cleaning your shoes and grab a knife and fork, just in case. From the article:
Indeed, there appears to be a legitimate concern over what benefit the customers of Gleg, who were informed about the problem, would get by having such client side exploit information before the vendor can patch it.
If my reading is correct, they're passing that information off to their "customers". Anyone who pays them, basically.
If Gleg offered to
Blackmail eh? (Score:4, Insightful)
Re:Blackmail eh? (Score:5, Insightful)
Re: (Score:2)
http://www.google.com/search?hl=en&q=define%3AExtortion [google.com]
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And so we face, in the twenty-first century, a very basic moral question. If you could make as many loaves of bread as it took to feed the world, by baking one loaf and pressing a button, how could you justify charging more for bread than the poorest people could afford to pay? If the marginal cost of bread is zero, then the competitive market price should be zero too. But leaving aside any question of microeconomic theory, the moral question, "What should be the price of what keeps someone else alive if it costs you nothing to provide it to them", has only one unique answer. There is no moral justification for charging more for bread that costs nothing than the starving can pay. Every death from too little bread under those circumstances is murder. We just don't know who to charge for the crime.
- Eben Moglen
Re: (Score:2)
Moglen, like Stallman, believes we should all live in a barter-based society where we trade stuffed animals for steaks and toilet papers for C compilers. It's a nice vision that has never been proven to work beyond small social structures.
I think he says it better than you:
We wanted freedom of knowledge in a world that didn't give it, which burned people for their relegious or scientific beliefs. We wanted democracy, by which we meant originally the rule of the many by the many, and the subjection of today's rulers to the force of law. And we wanted a world in which distinctions among persons were based not on the color of skin, or even the content of character, but just the choices that people make in their own lives. We wanted the poor to have enough, and the rich to cease to suffer from the diseases of too much. We wanted a world in which everybody had a roof, and everybody had enough to eat, and all the children went to school. And we were told, always, that it was impossible.
- Eben Moglen
Re: (Score:2, Informative)
You mean [google.com] like [google.com] Mozilla [209.85.173.104]? I'm not sure if private security mailing lists [mozilla.org], "confidential bugs" and all that are reprehensible, but they might be. Or do you mean another type of "reprehensible"?
Their existence may be repulsive
You mean like Mozilla [mozilla.org], or do you mean ano
it's tough (Score:3, Interesting)
It is sleazy, don't get me wrong, because what other reason would someone other than Real want to purchase the information except to do no good? But I'm having a hard time feeling sorry for Real, because they suck so fucking bad. I keep trying to replace them in my mind with some company I like to analyze the situation, but it just keeps switching back to Real.
I mean, it's not like someone's going to get killed or anything. Unless, of course, Putin wants that done.
Re: (Score:2, Informative)
Re: (Score:2)
To elaborate, Evgeny is threatening damage to Real (by this exploit) unless they pay up a sizable sum of money to purchase the exploit (whether or not he'd sell it to Real is another matter, although Real could always pose as a client and then purchase it).
I know Real has got a pretty scummy reputation, but that's no excuse to condone this behavior.
Re: (Score:2)
Re: (Score:2)
I understand where you're coming from; the only ones who seem to be directly affected are the poor end-users. However, if people stop using RealPlayer because of the exploits, and IT departments start uninstalling it because all there machines are getting owned, and it affects RealMedia's bottom-line, you can be sure as hell that's damage.
Re: (Score:2)
In the mean time, there's people who sell anti-malware. There's people who sell intrusion detection systems. There's people who get paid to maintain the security of corporate networks. All of these other people are willing to pay for information about the exploit.. some of them are even willing to pay for exclusivity - to the exte
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
I thought Real was dead...
I had no idea they were still in business till today.
this is racketeering, and it's wrong. That said, I wish there was a culture of "Hey thanks for finding that whopper of a bug, here's a couple grand" for bugs that can be exploits, because should such a culture arise, your average geek would go for the bounty.
-nB
Re: (Score:2)
The part where the prosecutor pulls magic number out of the air, goes 'should have, would have, could have' and the jury are suddenly lobotomized?
Re: (Score:2)
Re: (Score:3, Insightful)
Think of it as "we guarantee value for your money" rather than "give us money or we guarantee you'll wish you had," which, if you consi
Re: (Score:2)
Re: (Score:2)
What is the greater good? For me it's pretty clear: software without security vulnerabilities. Is it reasonable to expect security researchers not to make money off their knowledge? Is it reasonable to expect software not to have secur
Re: (Score:2)
I would still support Evgeny even if the product belonged to Apple.
BECAUSE, Evgeny spent x amount of money to discover the bug, which should have been first discovered by Real.
Now, after spending money and effort, you expect Real to be given that information Free, because Real made the defective product in the first place?
That is not capitalism. Real is practising Fascism.
The assumption is that Real with its army of lawyers could scam the legal and legislative system of russia and force Evg
Re: (Score:2)
Well, there are malware blocking programs that deal with plugging holes in other programs. Windows, and the various VB running Office programs are one source of bugs. I could see an antimalware company advertising itself as fixing holes in Real/Flash/Other malformed content.
Re: (Score:2)
Re: (Score:2)
IANAL. If I had a security exploit that if used could get someone killed and I refused to hand it over and instead sold it to a third party who then used it and killed someone I am pretty sure I would be liable in that instance.
Where are the small children and cute kittens and puppies in your sentiment? I mean, while we're going out on a limb and all ...
We're talking one of a million software exploits out there in the great wilds of commercial software packages.
Where, BTW, is the liability for the company who released the defective product in the first place? If this exploit can "get somebody killed" (or whatever actual damages can take place as a result of its use) why shouldn't RealMedia be held liable?
There's no fiduciary duty here (Score:2)
Re: (Score:2)
It's called capitalism (Score:5, Insightful)
Re: (Score:3, Interesting)
"In unregulated areas (i.e. new markets) they have a much more "rapacious" concept of it than the west. The public good is an inconvenient idea."
FTFY
Re: (Score:2)
Re:It's called capitalism (Score:5, Interesting)
Re: (Score:2)
Yes, it's a pipe dream for now, but that sort of security and performance flaw is partly why the GPL exists: to get the source, patches, and feature additions out into the open.
Re: (Score:2)
Recently I had issues with a game I purchased. I finally figured out that the reason it refused to play was the machine I had this game on was not networked in an expected way and the game's DRM wanted to handshake with the company to let me play it. In the process of figuring this out I also figured out a crack for the DRM they were using and passed on my discovery to the company. I paid for the game, I like th
Re: (Score:2)
"The public good" is the motivating factor behind both socialism and capitalism. The difference is that socialism tries to address the public good through conditioning people to act with less regard to their own interests, where capitalism believes that providing personal rewards for people who are productive will increase the value of the society as a whole.
Couldn't this lead to a betterment for society, though? Wouldn't you think software vendors would prefer to concentrate more on getting security right in the first place and releasing software of a higher calibre rather than finding themselves on a list of "Exploits For A Buck"? If that were the case, hey, I think this Internet thing might just be a safer place to be.
Besides all that; don't you think this has been going on for years already? Of course it has! This is just the first company with the cajo
chilling effects of free market capitalism (Score:5, Interesting)
Companies have a financial incentive for keeping their products secure, open source projects have less of an issue because the money just isn't in it.
All this is - is one company spending real money, hiring well paid analysis to plow through machine code or source code and analyse vulnerabilities.
The reason they can afford to do this is because the market is full of companies willing to pay for this stuff...
Thats where your code of ethics goes out of the window!
With open-source projects, there is still a market of companies using that software but at the same time there's a limited timespan before it's usually discovered by somebody else.
You know very well that if you advertise you've found a security flaw in open source XX product you're going to have hundereds of people scrutinising it and to develop a fix - because it's benificial to everybody (so the code of ethics lives strong).
It doesn't help that `Real' has a bad reputation, but by doing this and with holding it, Gleg are doing exactly what they set out to do in the first place and doing as any successful business man/woman does: identifying the market and targeting it appropriately.
This happens every day not just in software security, but in every other industry yet people just consider it a normal day in the office and maybe grumble a bit about it.
In an ideal situation ethics and social benifit would come first though... yet this is in practice incompatible with the free market, just for the reasons above.
Blackmail? (Score:5, Insightful)
Re: (Score:3, Insightful)
Just imagine if Microsoft was
Re:Blackmail? (Score:4, Insightful)
If I was running a large company with lots of finantual backing, and thought I was in the right (or to be more specific, if my legal team thought i was in the right) then I would definatly go to court to fight it.
However being an individual, there is no way in hell I would willingly expose myself to that type of risk.
Selling to everyone else however can't possibly be blackmail, since they can just say no and nothing bad happens to them. It doesn't match either the legal or english definition of the word.
It's very smart from a legal point of view. Offer your services and 'IP' to everyone that you know wont sue you for it, and avoid the one person/company that could.
If the laws were different and more sane, then they COULD sell to everyone including the vendor, or perhaps it would be at a price where they can afford to sell to ONLY the vendor.
Sadly, they arnt.
Capitalists gotta eat after all!
Vista (Score:3, Interesting)
Not that I would ever install Realplayer outside of a locked down VM anyway. Assume I had a seizure or something and wanted to put this on my host OS.
Advice for free (Score:2)
Uninstall RealPlayer.
blackmail? product defect! (Score:2, Interesting)
Why does this remind me of Fermat's Last Theorem? (Score:3, Insightful)
This is a shade of Fermat's last theorem. Wiles, after he finally proved it, said that he doubted Fermat actually knew a viable proof.
We don't know what these guys have. Whether it's blackmail or not, it still smells bad. I think the money would be better spent on real security researchers who disclose what they find.
What is Real good for anyway? (Score:2)
So to make some on topic comment I will say that I fully support this form of capitalism. Real could pay them for the information - it's a better deal than hir
Why? (Score:2, Insightful)
1. They are planning to sell the information to (criminal) third parties.
2. They are planning to sell the information to Real.
3. They are trying to sell services to Real.
The fact that they offer it
Fight fire with fire (Score:4, Insightful)
RP can legally subscribe to be a "customer" of this security firm, and then just take all information they deliver, and pass it on to all parties involved (in other words, send flaws to all companies whose code has a vulnerability the relevant information). Several companies can team up and split the "subscription fee".
Consider this to be the security (and legal) version of ripping a pay porn site and dumping the contents on eMule. The Russian company won't go far with a single paying subscriber.
I don't use Real... (Score:2)
Re: (Score:2)
Capitalism's heart (Score:2)
Russia has taken Capitalism to their hearts--principles be damned, everything has a price. It's funny how most of slashdot is lamenting good vs evil, while a clear profit is to be had. What happened to American business spirit? We should be proud that we expo
Re: (Score:2)
Ah!, the down side to proprietry software (Score:5, Interesting)
Like it or not, this was bound to happen (Score:2)
Re: (Score:2)
Re: (Score:2)
Wow that sucks... (Score:2)
Come on! Who doesn't hate that pile of garbage?
Not trying to be a smart-ass, but... (Score:5, Interesting)
Re: (Score:2)
Nothing's free... (Score:5, Interesting)
If the prevailing logic (that the Russian company should cough up the goods for free) is applied, all pharma companies would be non-profit charities...
Work for free, but be ethical? (Score:2)
Why not compromise (Score:3, Informative)
Sure these researches should get money/credit, but what if they become greedy or irresponsible?
Common Business Model! (Score:5, Insightful)
I am in the lawn care business. I know why your lawn is dying. I will make it green, for a fee.
I am in the computer tech business. I know why your sound card has a problem. I will fix it... for a fee.
I am in the computer tech business. I know how to fix the virus(es) in your computer. For a fee.
I am a chef. I know how to cook your dinner. Do you expect the recipe for free?
And so on. It would be "giving to the community" to give them the information for free, but this kind of business model *IS* all around us. No point in singling them out.
Real has all the information already (Score:3, Insightful)
$10,000 for periodic updates (Score:3, Insightful)
If we assume that $10,000 is for a year: that is the cost of one tenth of a full time internally hired security expert.
I think Real should consider subscribing to the services of Gleg.
How else are they... (Score:3, Interesting)
Re: (Score:2)
What if this article concerned 'VLC' and 'daresay others' ?
Re: (Score:2)
Re:But... (Score:5, Informative)
All the Aunt Tillies out there who use Windows because it came installed on their computers and have no idea what an operating system is. They use IE for the same reason, and when they want to hear an audio file, guess what IE tells them to install? One hint: it won't be VLC.
Re:I for one ... (Score:5, Insightful)
Not blackmail. But poorly designed software tends to have security bugs.
These bugs pose a problem for users of the software. It makes sense that third party services exist that scour software for bugs like this, for the benefit of the software's users and prospective users.
So they can know whether to use the software or whether to take extra precautions/refrain from using it.
The cost of performing this type of analysis is high. Much time and energy is required.
It makes sense that you need to pay to review their findings in detail, or to review them before they are publicly released (for free).
If they merely submit their findings to the software vendor, then they have provided the vendor with high-quality, costly labor for free.
Why should the software vendor get free labor from security researchers, and be able to freely follow poor design practices in the design of their software, while relying on the public to find and report the issues gradually? (For them to lazily fix _after_ the defect is drawn to their attention)
If the security researcher wishes to serve the community, then they have the option of practicing full disclosure, but they may be more fairly compensated for their work by providing paying customers with key information in advance, so their customers can mitigate the problem, before it has become public (and known to the bad guys).
One way you mitigate the problem is very simple: uninstall the defective real player 11. Re-install the fixed version, when it becomes available.
Re:I for one ... (Score:5, Interesting)
There are three classes of potential customers: product owners, users, and criminals. If the researcher makes it clear they are willing to sell their information to the third class - criminals - then it matters little if they are also willing to sell to the other two classes or not.
Clearly, the implication is they do not want to sell to the product owner class as that would be a single sale. By selling the information to users and criminals they ensure that they have a substantial number of potential sales as well as motivating the users to buy rapidly or else they will be victims of the criminal class.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
nothing (Score:2, Interesting)
The fact that they're not releasing it into the wild is a problem. Until it gets released (or Real pays up or finds it themselves) it will be a nasty weapon used for nefarious deeds.