Mobile security firm offers cash to hackers for their old exploits

The company hopes to bring old exploits into the open and encourage better patching in the mobile ecosystem

Mobile security firm Zimperium has launched an exploit acquisition program that aims to bring undisclosed attack code for already patched vulnerabilities out in the open.

Paying for old exploits might seem like a waste of money, but there are technical and business arguments to justify such an acquisition system and they ultimately have to do with the difference between exploits and vulnerabilities.

A vulnerability is a software defect with potential security implications, while an exploit is the actual code that takes advantage of that bug to achieve a specific malicious goal, often by bypassing other security barriers along the way.

In practice, many vulnerabilities that get reported to vendors are not accompanied by working exploits. Showing that a programming error can lead to memory corruption is typically enough for the vendor to understand its potential implications -- for example, arbitrary code execution.

If the software vendor understands the bug and commits to patching it, there's usually no point in taking the time to write a full-blown exploit that also bypasses sandboxes or OS security mechanisms like SELinux, DEP and ASLR in order to prove malicious code execution.

That's not the case, though, for the so-called weaponized exploits that are being sold behind closed doors to malicious hackers or to government agencies for a lot of money. These need to be fully functional and reliable and, in most cases, target unpatched vulnerabilities that users have no defense for, which is why they're known as zero-day exploits.

But what happens when exploits lose their zero-day status because the vulnerabilities they use are discovered independently and get patched by vendors? Does that attack code become public? Not always.

There's really no way to know how many zero-day exploits have been burned by vendor fixes over the years, and have remained private to this day. Or how many exploit writers hang on to what were previously zero-day exploits in hopes that they might still have some value against older devices.

It's worth keeping in mind that not every hacker is a bug hunter and not every bug hunter is an exploit writer. These are actions that require different skill sets. There are many successful bug hunters that don't have the necessary programming skills to write full-blown exploit chains that work reliably on various OS versions.

"Security research and exploitation is in our heart and what led Zimperium to this point," Zimperium's founder and CTO Zuk Avraham said in a blog post Tuesday. "We appreciate the art of exploitation, and appreciate cool tricks in order to write an exploit development, bypass ASLR/KASLR, achieve persistency, etc. We humbly believe that we can learn from any exploit and as a result offer better security for our customers and partners."

The company's mobile security technology is used by carriers and handset vendors for very large deployments of tens of millions of users and needs to offer protection even for older mobile devices that are no longer supported and don't receive security updates. It's on such devices where the older "N-days" exploits, as Zimperium calls them, can still have value for attackers.

"For us, supporting old devices is a key decision to help where the update policy have failed the consumers," Avraham said.

The company will acquire exploits for both remotely and locally exploitable vulnerabilities, as well as for bugs that can lead to information disclosure. The exploits can target any version of Android or iOS aside from the latest ones.

Zimperium has not disclosed prices for the different types of exploits it plans to acquire, as each one will be evaluated individually by a special committee. However, the company has allocated $1.5 million for the program.

Exploit developers can even analyze the monthly patches of mobile OS makers, write working exploits for the patched vulnerabilities and submit them to the program, because the existence of working exploits could drive patch adoption in the ecosystem.

"Multiple Zimperium Handset Alliance (ZHA) partners explained to us that without proof of exploitability, it’s hard to convince the security teams to allocate resources needed for a complete patch cycle, even for known issues," Avraham said.

Zimperium will use the exploits to enhance its z9 mobile protection engine, which  uses machine learning to detect and block network, local and application attacks. It  will also share the exploits with the ZHA, which includes security team members from more than 30 global device manufacturers and carriers.

Zimperiuym also plans to release the exploits publicly after three months unless their authors specifically asks the company not to.

"Our goal is to help the community, penetration testers, mobility and IT Admins to better evaluate their security and protect their devices," Avraham said.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Lucian Constantin

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?