Mysterious hackers offer Windows zero-day vulnerabilities to the world's most dangerous cyber criminals
A mysterious hacker with alias Volodya or BuggiCorp is trying to sell zero-day vulnerabilities on WIndows to the world's most dangerous hacker groups.
It is known that since 2016, this hacker has sold zero-day vulnerabilities through an ad on an online public forum, the highest price ever offered is $ 95,000. Since then, Volodya is known as a seller of hacking tools and zero-day vulnerabilities.
When more known, this hacker also raised product prices, up to $ 200,000.
The team of Costin Raiu, Director of Global Research and Analysis Group (GReAT) specializes in hunting for APT (Advanced Persistent Threads) at Kaspersky, has followed Volodya since 2015. Raiu said, GReAT's documents show that Volodya may be originally from Ukraine, speak Russian fluently, and his name is abbreviated from Volodimir - a nickname that appears in some of his "works".
This hacker audience is Russian and Middle Eastern hacker groups, including notorious groups that are suspected government-sponsored hacker groups such as SandCat, FruityArmor (the group has targeted the Middle East and Asia) and Fancy Bear (the group is said to have participated in many attacks on the US in the 2016 election).
All three APT groups regularly purchase hacking tools from reputable cyber criminals.
According to Kaspersky researchers, a group of hackers recently used a bug called CVE-2019-0859 developed by Volodya. CVE-2019-0859 is not the only flaw Volodya has ever created and sold. To find potential customers, the hacker works alongside APT groups as well as other less-known cyber criminals.
Currently, it is still impossible to determine whether Volodya is a "lone wolf" or a group specializing in developing, promoting, and selling security holes. However, Volodya's screaming price of $ 200,000 for zero-day vulnerabilities suggests that the black market specializes in dealing with security holes that have never been hot.
You should read it
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Do you know who white hat hackers are and how their lives are?
- Good hackers find and patch the vulnerability for more than 100,000 other routers
- More than 40 Windows drivers contain dangerous privilege escalation vulnerabilities
- Patches of dangerous vulnerabilities being exploited by hackers contain dangerous holes and then continue to be exploited by hackers
- The leading site to learn hacking skills
- Trojan attacks on dangerous errors in Windows
- How to Become a Teen Hacker
May be interested
- Customer data collected during Capital 14's 14 years was stolenthis may be considered the biggest data theft ever recorded in the us.
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computersa serious flaw in the bittorrent application of transmission was discovered by tavis ormandy, a leading security expert at google. if successfully exploited, hackers can take full control of computers running linux or windows.
- Warning: Dangerous security holes in Wordpress platform, hackers can take advantage to take control of the websiteaccording to the experts at cystack network security company, a dangerous vulnerability exists in the deleting function of all versions of wordpress, a popular website building platform.
- The virus shoots the video clipthe explosion of video clips of 'homegrown' made hackers and cyber criminals unable to ignore. security vendors have recorded a number of 'disguised' windows codecs - or file compression software - while providing software.
- How dangerous is IP address exposure?you may not know that there is always some danger if someone knows your ip address. hackers can use your ip address to conduct cyber attacks or scam yourself or others.
- Hackers publish Windows attack codemicrosoft on october 28 has advised its customers that the vulnerabilities that attack the windows operating system are released by hackers.
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computerthis is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
- Four Windows vulnerabilities can be exploited in the perfect attack chainthe vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computerthe research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
- 5 tips to prevent SIM swappingthe sim card number is a 'fat prey' for cyber criminals. with this series of simple digits, hackers can quickly make your bank account empty.