Microsoft boots Chinese firm for leaking Windows exploit
Kicks Hangzhou DPTech out of MAPP after tracing proof-of-concept code leak
Computerworld - Microsoft on Thursday identified a Chinese security partner as the source of a leak last March in its highly restricted vulnerability information-sharing program.
The company, Hangzhou DPTech Technologies, was tossed out of the Microsoft Active Protection Program (MAPP) for leaking the proof-of-concept exploit.
"During our investigation into the disclosure of confidential data shared with our Microsoft Active Protections Program (MAPP) partners, we determined that a member ... Hangzhou DPTech Technologies Co., Ltd., had breached our non-disclosure agreement (NDA)," Yunsun Wee, director of Microsoft's Trustworthy Computing group, wrote in a post to a company blog. "Microsoft takes breaches of our NDAs very seriously and has removed this partner from the MAPP Program."
He did not elaborate on the steps Microsoft has taken to prevent another leak or explain why the company decided DPTech was the source of the leak.
DPTech is based in Hangzhou, a major city in eastern China southwest of Shanghai. According to the company's website, it develops and sells network security products that include UTM (unified threat management) systems, IPS (intrusion prevention systems) appliances, application firewalls and vulnerability scanning software.
Andrew Storms, director of security operations at nCircle Security, was stunned that Microsoft named DPTech.
"It's not like [Microsoft] to call out someone," Storms said. "I'm not surprised they cut the offender out of the program [but] I would have expected it happen silently."
Microsoft launched its investigation in mid-March after Italian security researcher Luigi Auriemma said code in an exploit circulating on a Chinese website was identical to what he had provided HP TippingPoint's bug bounty program to qualify for a reward.
Auriemma had uncovered a vulnerability in Windows' Remote Desktop Protocol (RDP) in May 2011, then reported it to TippingPoint. His code was used by the Zero Day Initiative to create a working exploit as part of the bounty program's bug verification work. ZDI passed along the exploit and other information about the RDP vulnerability to Microsoft.
Microsoft patched the RDP vulnerability in its March Patch Tuesday update, and rated the fix "critical," the highest threat ranking in its four-step system.
Later on the same day that Auriemma claimed the leak had given hackers a head start on a worm, Microsoft confirmed that the leak had likely originated with MAPP.
Under MAPP, Microsoft provides select security vendors with technical information and a proof-of-concept exploit before patches go public. MAPP is meant to give the security companies time to craft detection signatures.
MAPP counts 73 companies as members, including several other vendors based in China. Six weeks ago, MAPP's rolls listed 78 firms.
When asked if Microsoft had kicked other partners from the program, a Microsoft spokeswoman declined to comment. Instead, she pointed to another Thursday blog post in which Maarten Van Horenbeeck, the senior program manager whose team runs MAPP, defended the information-sharing practice.
In the post, Van Horenbeeck alluded to culling the MAPP membership.
"We routinely evaluate MAPP partners to ensure they are adhering to program guidelines, taking action to correct any partner deviations from our program charter," said Van Horenbeeck. That action, he continued, could include "removing the partner from our program," as Microsoft did with DPTech.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- SIP Migration: Addressing CIOs' Concerns Recent data from IDG Research shows that many IT executives are counting on SIP to help them meet employee efficiency and customer experience...
- SBIC: Transforming Information Security This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- InfoTech: Cloud File Sharing Organizations are increasingly turning to cloud file sharing solutions to meet end-user's needs for a lightweight and effective collaboration tool. In this report,...
- Rethinking Backup and Recovery As enterprises continue to transform their data centers, and virtualization plays an increasing role in their IT infrastructures, the way data is backed...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate. All Malware and Vulnerabilities White Papers | Webcasts
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.