Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Apple

Hack iOS 10, Get $1.5 Million 32

Reader Trailrunner7 writes: The stakes in the vulnerability acquisition and bug bounty game have just gone up several notches, with a well-known security startup now offering $1.5 million for a remote jailbreak in iOS 10.The payout was put on the table Thursday by Zerodium, a company that buys vulnerabilities and exploits for high-value target platforms and applications. The company has a set of standing prices for the information it will buy, which includes bugs and exploits for iOS, Android, Flash, Windows, and the major browsers, and the top tier of that list has been $500,000 for an iOS jailbreak. But that all changed on Thursday when Zerodium announced that the company has tripled the standing price for iOS to $1.5 million.
This discussion has been archived. No new comments can be posted.

Hack iOS 10, Get $1.5 Million

Comments Filter:
  • Just give me the source code first! :)

  • that gov't intelligence services are putting up that money.

    • by npslider ( 4555045 ) on Friday September 30, 2016 @01:14PM (#52990405)

      The question is: which ones?

      CIA? NSA? FBI?

      KGB?

      • Re: (Score:3, Insightful)

        by Anonymous Coward

        Short answer: ALL of them. Governments are become the Great Enemy.

      • by swb ( 14022 )

        Those are just the lesser branches of government. The parent government of all them wants it.

      • obviously.

        It doesn't even matter since they will share/steal from each other anyway.

    • by NotInHere ( 3654617 ) on Friday September 30, 2016 @01:25PM (#52990511)

      Its pretty obvious that some of their customers are governments. Who else would be interested in tor browser exploits:

      https://www.zerodium.com/image... [zerodium.com]

    • Why wouldn't they? At a minimum, modern governments have an obligation to protect their constituents from espionage, and in some cases that means using software exploitation to gain the upper hand. Of course, such powers can be abused, but all to often we choose to ignore their necessity.
      • Re: (Score:2, Insightful)

        by Anonymous Coward

        Why wouldn't they? At a minimum, modern governments have an obligation to protect their constituents from espionage, and in some cases that means using software exploitation to gain the upper hand.

        If the goal is to protect constituents from espionage, I argue that they'd be more effective in this task if they took exploits to the various vendors and convinced/helped them close the holes.

  • Spoiler alert: the bad guys will win, as buying exploits is the only way they can do their business, while apple still sells iphones when there is a super secret vulnerability that gets used three times and thats it. They don't really care and only do the bug bounty program for PR reasons. And you can make more money with breaking into stuff than with selling stuff. Just look at the recent heists where part of the attack was social engineering, part of it was to manufacture emails to look like coming from m

    • Yes but I don't risk going to jail selling the exploit. So if I could find this, I'd happily take the $1.5 million selling it legally rather than risk going to jail in order to try to get more. Hopefully by selling it, it would actually get fixed. I'd prefer to sell it a bug bounty program administered by the vendor, though, so I don't have to worry about the moral consequences of the sale.
  • Sell you soul (Score:4, Insightful)

    by mseeger ( 40923 ) on Friday September 30, 2016 @01:16PM (#52990415)

    If you sell to them, you're a weapon dealer of the shadier kind. You'll help oppressive regimes to jail dissidents.

    • Re:Sell you soul (Score:4, Insightful)

      by ilsaloving ( 1534307 ) on Friday September 30, 2016 @01:25PM (#52990507)

      At least until Apple patches the flaw. In the meantime, it's amazing how a large stack of cash can assuage one's guilt.

    • They are setting a price. You don't have to sell to them. But it gives you a starting point in negotiations. You could go to Apple and say you've found a remote jailbreak and the price on offer is $1.5 million but you want to take the moral high road so you'll sell it to them for $1.4 million. If they come back and offer you a measly $100k, you know they aren't negotiating in good faith.
  • I wonder who is funding this startup?
  • Is this proof of iOS's security or does this correlate with the value of the holders of the iPhones? I could see it either way or both.

    The harder a platform is to crack, the higher the value of the exploit. But only if the users of that platform are valuable or there are economies of scale in play.

    iPhone is certainly not the most widespread platform, so then it must be the value of the targets... right?

    • by TopSpin ( 753 )

      Is this proof of iOS's security or does this correlate with the value of the holders of the iPhones?

      It's both. Apple has apparently hardened devices that are popular with high value targets to the point where remote exploits are now costly to obtain. The market is factoring in both of these properties.

      • Then you look at the bottom of the list, and see how little they'll pay for exploits of pretty much ANY web-content management system (Drupal, Joomla, Wordpress)... and, if you're unfortunate enough to be responsible for any of these, you go weep softly in a corner somewhere.

  • by swb ( 14022 ) on Friday September 30, 2016 @01:48PM (#52990629)

    Given the FBI complaining about its encryption, this bug bounty, etc, the general impression (and yes, it might be wrong) is that the iOS platform is pretty secure.

    So how secure is Apple in terms of physical security, employee security, etc?

    You would think the next level of attack would be the HQ itself -- getting somebody inside, either secret agent style or compromising an Apple employee somehow.

    Are people who work on iOS device security watched 24/7 by security themselves? Do they work in some kind of high security vault? Is the guy pushing the mail cart actually a deep cover FSB agent?

    If you work for Apple on iOS security do you think twice when some pretty girl at the bar starts talking to you, especially if she says her name is Natasha?

  • You now have my attention; damn, where's my white hat?

Programmers do it bit by bit.

Working...