cross-posted from !android@lemdro.id

  • Operation Zero, a Russian company, has increased its bounty for zero-day exploits on iPhones and Android devices from $200,000 to $20 million.
  • The company sells these exploits exclusively to Russian private and government organizations, specifying that the end user is a non-NATO country.
  • The high bounties may be temporary and are a reflection of market demand and the difficulty of hacking iOS and Android platforms.
  • Unlike traditional bug bounty platforms, Operation Zero sells vulnerabilities to governments without alerting the affected vendors.
  • The zero-day market is largely unregulated, but affected by geopolitics, such as new regulations in China that aim to corner the market for intelligence purposes.
  • tony@lemmy.hoyle.me.uk
    link
    fedilink
    English
    arrow-up
    24
    ·
    9 months ago

    Surely someone with that kind of money and need would start with a $5 wrench attack. You can buy a lot of persuasion for $20m.

    • Arbiter@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      ·
      9 months ago

      It depends on what you’re trying to do.

      It’s hard to use the $5 wrench on millions of people at a time.

      • Otter@lemmy.ca
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        9 months ago

        Which then makes me wonder what they’re looking for, which they couldn’t get otherwise. Data is cheap and we let companies get away with so much

        Maybe they can’t use the wrench on the target without an international incident? So they need to cloud the search by hitting a larger group of people

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    4
    ·
    9 months ago

    This is the best summary I could come up with:


    Operation Zero, which is based in Russia and launched in 2021, also added that “as always, the end user is a non-NATO country.” On its official website, the company says that “our clients are Russian private and government organizations only.”

    Zelenyuk also said that the bounties Operation Zero offer right now may be temporary, and a reflection of a particular time in the market, and the difficulty of hacking iOS and Android.

    “The price formation of specific items is heavily dependent on availability of the product on the zero-day market,” Zelenyuk said in an email.

    For at least a decade, various companies around the world have offered bounties to security researchers willing to sell the bugs and hacking techniques to exploit those flaws.

    Unlike traditional bug bounty platforms like Hacker One or Bugcrowd, companies like Operation Zero don’t alert the vendors whose products are vulnerable, but instead sell them to government customers.

    Crowdfense, a competitor based in the United Arab Emirates, offers up to $3 million for the same kind of chain of bugs on Android and iOS.


    The original article contains 721 words, the summary contains 178 words. Saved 75%. I’m a bot and I’m open source!