- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
CSO - The U.S. government is contributing to the Internet's underground economy by scooping up hacker tools to incorporate into offensive cyber weapons, a report from Reuters says.
The feds have become the biggest buyer in a growing gray market where hackers and defense contractors sell tools to compromise computers, the report said.
[ALSO: The worst data breaches so far]
A major concern about the government's actions is that it's using what it buys for offensive weapons at the expense of not only the country's cyber defenses but the private sector's as well.
That's because cyber weapons typically exploit vulnerabilities in commercial software, vulnerabilities that the government wants to hide behind a veil of secrecy where vendors can't patch the flaws to make their products more secure.
Start-up companies in the offensive exploit field are not wanting for customers in government and the private sector, said Jeffrey Carr, CEO of Taia Global and author of "Inside Cyber Warfare: Mapping the Cyber Underworld."
"It's pretty much if you have the cash and you meet the parameters, you can get an offensive exploit developed for you," Carr told CSO. "That's where the growth industry is for cyber."
"Just as we've created a military-industrial complex for traditional arms," he said. "I believe we'll see a similar development for cyber-related weapons."
While the government may be spending money on cyber weapon research, it's doubtful hackers-for-hire are contributing much to it, said John Bumgarner, chief technology officer for the U.S. Cyber Consequences Unit, a non-profit research group that studies cyber warfare.
The CIA, NSA and all the major defense contractors have the technical capabilities to uncover software vulnerabilities and write exploits. "Multiple U.S. government agencies have access to extremely large repositories of malware," Carr said. "These agencies can easily dissect and reuse components from any of these malware samples."
[Also see: U.S. rattles preemptive cyberattack saber]
"The U.S. government didn't buy zero-day exploits on the black market to embed in this offensive cyber weapon," Bumgarner said in an email. "These complex zero-day exploits were written by government geeks working in total secrecy."
A problem with paying for vulnerabilities and keeping them on the shelf is you never know when someone else is going to discover the flaw independently, Carr said.
One researcher may sell a vulnerability to the government for half a million dollars, while another might sell the same vulnerability to a software company for thousands. "In which case, the government that paid six figures for it is out the money because it's useless," Carr said.
The scenarios can get as complicated as a spy novel by John le Carré. An enterprising hacker could decide to do a double dip on a sale -- sell to the government, then turn around and sell to the vendor affected by the vulnerability.