Exploit as a service

Last updated

Exploit as a service (EaaS) is a scheme of cybercriminals whereby zero-day vulnerabilities are leased to hackers. [1] EaaS is typically offered as a cloud service. [2] By the end of 2021, EaaS became more of a trend among ransomware groups. [3]

Contents

In the past, zero-day vulnerabilities were often sold on the dark web, but this was usually at very high prices, millions of US dollars per zero-day. [4] A leasing model makes such vulnerabilities more affordable for many hackers. [5] Even if such zero-day vulnerabilities will later be sold at high prices, they can be leased for some time. [6]

The scheme can be compared with similar schemes like Ransomware as a Service (RaaS), Phishing as a Service and Hacking as a Service (HaaS). [7] [8] The latter includes such services as DoS and DDoS and botnets that are maintained for hackers who use these services.

Parties who offer exploit-as-a-service need to address various challenges. Payment is usually done in cryptocurrencies like Bitcoin. Anonymity is not always guaranteed when cryptocurrencies are used, and the police have been able to seize criminals on various occasions. [9] [10] Zero day vulnerabilities that are leased could be discovered and the software that is used to exploit them could be reverse engineered.

It is as yet uncertain how profitable the exploit-as-a-service business model will be. If it turns out to be profitable, probably the amount of threat actors that will offer this service will increase. [11] Sources of information on exploit-as-a-Service include discussions on the Dark Web, which reveal an increased interest in this kind of service. [12]

See also

Notes

  1. "Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities". 16 November 2021. Archived from the original on 2021-11-23.
  2. "New type of cloud: Exploits as a Service (EaaS)". 2021-01-19. Archived from the original on 2021-01-19. Retrieved 2023-08-11.
  3. "Zero-day Flaws and Exploit-as-a-Service Trending Among Ransomware Groups | Cyware Alerts - Hacker News". 2021-12-01. Archived from the original on 2021-12-01. Retrieved 2023-08-11.
  4. "Zero-day Flaws and Exploit-as-a-Service Trending Among Ransomware Groups | Cyware Alerts - Hacker News". 2021-12-01. Archived from the original on 2021-12-01. Retrieved 2023-08-11.
  5. "What is hacking as a service (HaaS)? - Definition from WhatIs.com". whatis.techtarget.com. Archived from the original on 11 August 2021. Retrieved 13 January 2022.
  6. "Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities". 16 November 2021. Archived from the original on 2021-11-23.
  7. "What is hacking as a service (HaaS)? - Definition from WhatIs.com". 2021-08-11. Archived from the original on 2021-08-11. Retrieved 2023-08-11.
  8. "Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities". 16 November 2021. Archived from the original on 2021-11-23.
  9. "Lincolnshire boy has £2m of cryptocurrency seized by police - BBC News". 2021-11-29. Archived from the original on 2021-11-29. Retrieved 2023-08-11.
  10. "Met police seize nearly £180m of bitcoin in money laundering investigation | Bitcoin | The Guardian". TheGuardian.com . 2021-10-21. Archived from the original on 2021-10-21. Retrieved 2023-08-11.
  11. "Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities". 16 November 2021. Archived from the original on 2021-11-23.
  12. "New criminal tactics: exploit-as-a-service and buying zero-day flaws". 2021-11-17. Archived from the original on 2021-11-17. Retrieved 2023-08-11.

Related Research Articles

An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic. Such behavior frequently includes gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. In lay terms, some exploit is akin to a 'hack'.

Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

A blended threat is a software exploit that involves a combination of attacks against different vulnerabilities. Blended threats can be any software that exploits techniques to attack and propagate threats, for example worms, trojan horses, and computer viruses.

<span class="mw-page-title-main">Cryptocurrency</span> Digital currency not reliant on a central authority

A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.

Monero is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories.

A cryptocurrency tumbler or cryptocurrency mixing service is a service that mixes potentially identifiable or "tainted" cryptocurrency funds with others, so as to obscure the trail back to the fund's original source. This is usually done by pooling together source funds from multiple inputs for a large and random period of time, and then spitting them back out to destination addresses. As all the funds are lumped together and then distributed at random times, it is very difficult to trace exact coins. Tumblers have arisen to improve the anonymity of cryptocurrencies, usually bitcoin, since the digital currencies provide a public ledger of all transactions. Due to its goal of anonymity, tumblers have been used to money launder cryptocurrency.

"X as a service" is a phrasal template for any business model in which a product use is offered as a subscription-based service rather than as an artifact owned and maintained by the customer. Originating from the software as a service concept that appeared in the 2010s with the advent of cloud computing, the template has expanded to numerous offerings in the field of information technology and beyond it. The term XaaS can mean "anything as a service".

Lazarus Group is a hacker group made up of an unknown number of individuals, alleged to be run by the government of North Korea. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra and ZINC or Diamond Sleet. According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.

In blockchain, a fork is defined variously as:

Cryptocurrency and crime describe notable examples of cybercrime related to theft of cryptocurrencies and some methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that have been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrency.

The Zealot Campaign is a cryptocurrency mining malware collected from a series of stolen National Security Agency (NSA) exploits, released by the Shadow Brokers group on both Windows and Linux machines to mine cryptocurrency, specifically Monero. Discovered in December 2017, these exploits appeared in the Zealot suite include EternalBlue, EternalSynergy, and Apache Struts Jakarta Multipart Parser attack exploit, or CVE-2017-5638. The other notable exploit within the Zealot vulnerabilities includes vulnerability CVE-2017-9822, known as DotNetNuke (DNN) which exploits a content management system so that the user can install a Monero miner software. An estimated USD $8,500 of Monero having been mined on a single targeted computer. The campaign was discovered and studied extensively by F5 Networks in December 2017.

Blockchain analysis is the process of inspecting, identifying, clustering, modeling and visually representing data on a cryptographic distributed-ledger known as a blockchain. The goal of blockchain analysis is to discover useful information about different actors transacting in cryptocurrency. Analysis of public blockchains such as Bitcoin and Ethereum is typically conducted by private companies like Chainalysis, TRM Labs, Elliptic, Nansen, CipherTrace, Elementus, Dune Analytics, CryptoQuant, and Ormi Labs.

A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. As of 9 March 2021, it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom, as well as the European Banking Authority, the Norwegian Parliament, and Chile's Commission for the Financial Market (CMF).

Cryptojacking is the act of exploiting a computer to mine cryptocurrencies, often through websites, against the user's will or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown. The cryptocurrencies mined the most often are privacy coins—coins with hidden transaction histories—such as Monero and Zcash.

DarkSide is a cybercriminal hacking group, believed to be based in Russia, that targets victims using ransomware and extortion; it is believed to be behind the Colonial Pipeline cyberattack. It is thought that they have been able to hack and extort money from around 90 companies in the USA alone. The group provides ransomware as a service.

On 2 July 2021, a number of managed service providers (MSPs) and their customers became victims of a ransomware attack perpetrated by the REvil group, causing widespread downtime for over 1,000 companies. The attack was carried out by exploiting a vulnerability in VSA, a remote monitoring and management software package developed by Kaseya.

Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. The vulnerability had existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud's security team on 24 November 2021. Before an official CVE identifier was made available on 10 December 2021, the vulnerability circulated with the name "Log4Shell", given by Free Wortley of the LunaSec team, which was initially used to track the issue online. Apache gave Log4Shell a CVSS severity rating of 10, the highest available score. The exploit was simple to execute and is estimated to have had the potential to affect hundreds of millions of devices.

Clop is a cybercriminal organization known for its multilevel extortion techniques and global malware distribution. It has extorted more than $500 million in ransom payments, targeting major organizations worldwide. Clop gained notoriety in 2019 and has since conducted high-profile attacks, using large-scale phishing campaigns and sophisticated malware to infiltrate networks and demand ransom, threatening to expose data if demands are not met.

BlackCat, also known as ALPHV and Noberus, is a ransomware family written in Rust. It made its first appearance in November 2021. By extension, it is also the name of the threat actor(s) who exploit it.