Jump to content

Exploit as a service

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Carol Fenijn (talk | contribs) at 11:23, 5 December 2021 (+Cloud Service). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Exploit-as-a-service or EaaS is a scheme of cybercriminals whereby zero-day vulnerabilities are leased to hackers.[1][2] EaaS is typically offered as a Cloud Service.[3]

In the past, zero-day vulnerabilities were often sold on the Dark Web, but this was usually at very high prices. A leasing model makes such vulnerabilities more affordable for many hackers.[4] Even if such zero-day vulnerabilities will ever be sold at high prices, they can be leased for some time.[5]

The scheme can be compared with similar schemes like Ransomware-as-a-Service (RaaS), Phishing-as-a-Service and Hacking-as-a-Service (HaaS).[6] [7] The latter includes such services as DoS and DDoS and botnets that are maintained for hackers who use these services.

Parties who offer Exploit-as-a-service need to address various challenges. Payment is usually done in cryptocurrencies like the bitcoin. Anonimity is not always guaranteed when cryptocurrencies are used, and the police have been able to seize criminals on various occasions.[8][9] Zero day vulnerabilities that are leased could be discovered and the software that is used to exploit them could be reverse engineered.

It is as yet uncertain how profitable the exploit-as-a-service business model will be. If it turns out to be profitable, probably the amount of threat actors that will offer this service will increase.[10]

See also

Notes

  1. ^ https://web.archive.org/web/20211123034031/https://portswigger.net/daily-swig/exploit-as-a-service-cybercriminals-exploring-potential-of-leasing-out-zero-day-vulnerabilities
  2. ^ https://web.archive.org/web/20211128180425/https://www.cybertalk.org/2021/11/17/exploit-as-a-service-high-rollers-and-zero-day-criminal-tactics/
  3. ^ https://web.archive.org/web/20210119022451/https://www.trendmicro.com/en_us/research/11/d/new-type-of-cloud-emerges-exploits-as-a-service-eaas.html New type of cloud: Exploits as a Service (EaaS)
  4. ^ https://web.archive.org/web/20210811091611/https://whatis.techtarget.com/definition/hacking-as-a-service-HaaS
  5. ^ https://web.archive.org/web/20211123034031/https://portswigger.net/daily-swig/exploit-as-a-service-cybercriminals-exploring-potential-of-leasing-out-zero-day-vulnerabilities
  6. ^ https://web.archive.org/web/20210811091611/https://whatis.techtarget.com/definition/hacking-as-a-service-HaaS Hacking as a Service as saved in the Internet Archive
  7. ^ https://web.archive.org/web/20211123034031/https://portswigger.net/daily-swig/exploit-as-a-service-cybercriminals-exploring-potential-of-leasing-out-zero-day-vulnerabilities
  8. ^ https://web.archive.org/web/20211129101836/https://www.bbc.com/news/uk-england-lincolnshire-59054033 Lincolnshire boy has £2m of cryptocurrency seized by police
  9. ^ https://web.archive.org/web/20211021001236/https://www.theguardian.com/technology/2021/jul/13/met-police-bitcoin-money-laundering-cryptocurrency Met police seize nearly £180m of bitcoin in money laundering investigation
  10. ^ https://web.archive.org/web/20211123034031/https://portswigger.net/daily-swig/exploit-as-a-service-cybercriminals-exploring-potential-of-leasing-out-zero-day-vulnerabilities