ExploitHub admits 'embarrassing oversight' led to hack
The vulnerability marketplace was hacked by the Inj3ct0r Team, which also runs its own vulnerability marketplace
IDG News Service - A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable.
ExploitHub, based in Austin, Texas, has an online marketplace with details of exploits, or attack code that could be used to take advantage of a software vulnerability. A group calling itself the "Inj3ct0r Team" claimed responsibility for the attack, ExploitHub said in a statement posted to Facebook.
The Inj3ct0r Team, which also runs its own vulnerability and exploit marketplace, posted descriptions of some of the data on a website, which included software products from major IT companies include Oracle, Adobe Systems, HP, Citrix and Trend Micro. The group claimed the information is worth $242,333 and said it hacked ExploitHub to show it had poor security.
The Inj3ct0r Team's hack took advantage of "an accessible install script that was left on the system rather than being removed after installation, which was an embarrassing oversight on our part," ExploitHub said. The problem allowed the Inj3ct0r Team to extract the exploit information from ExploitHub's SQL database.
ExploitHub said it had architected its public-facing web application server in a way to limit the damage if it was compromised. "Being a high profile target, the ExploitHub endures attacks daily," it added.
The marketplace said the hackers only accessed information that was already publicly available by searching through its online catalog. The information included exploit names, prices and the names of researchers but not any actual exploit code, which could be used in attacks.
"The product data is stored elsewhere, and there is currently no evidence that the storage location was accessed by any unauthorized party or that any of the exploit code or other product data has been compromised or stolen as has been claimed," ExploitHub said. "However, our investigation is ongoing."
ExploitHub does not allow zero-day exploits to be included in its marketplace. Zero-day exploits are considered the most dangerous type of attack since it means the software manufacturer has not patched the vulnerability and the exploit is actively being used in attacks.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts