ExploitHub admits 'embarrassing oversight' led to hack
The vulnerability marketplace was hacked by the Inj3ct0r Team, which also runs its own vulnerability marketplace
IDG News Service - A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable.
ExploitHub, based in Austin, Texas, has an online marketplace with details of exploits, or attack code that could be used to take advantage of a software vulnerability. A group calling itself the "Inj3ct0r Team" claimed responsibility for the attack, ExploitHub said in a statement posted to Facebook.
The Inj3ct0r Team, which also runs its own vulnerability and exploit marketplace, posted descriptions of some of the data on a website, which included software products from major IT companies include Oracle, Adobe Systems, HP, Citrix and Trend Micro. The group claimed the information is worth $242,333 and said it hacked ExploitHub to show it had poor security.
The Inj3ct0r Team's hack took advantage of "an accessible install script that was left on the system rather than being removed after installation, which was an embarrassing oversight on our part," ExploitHub said. The problem allowed the Inj3ct0r Team to extract the exploit information from ExploitHub's SQL database.
ExploitHub said it had architected its public-facing web application server in a way to limit the damage if it was compromised. "Being a high profile target, the ExploitHub endures attacks daily," it added.
The marketplace said the hackers only accessed information that was already publicly available by searching through its online catalog. The information included exploit names, prices and the names of researchers but not any actual exploit code, which could be used in attacks.
"The product data is stored elsewhere, and there is currently no evidence that the storage location was accessed by any unauthorized party or that any of the exploit code or other product data has been compromised or stolen as has been claimed," ExploitHub said. "However, our investigation is ongoing."
ExploitHub does not allow zero-day exploits to be included in its marketplace. Zero-day exploits are considered the most dangerous type of attack since it means the software manufacturer has not patched the vulnerability and the exploit is actively being used in attacks.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!