Jump to content

Vupen

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by BinaryTalker (talk | contribs) at 15:29, 6 April 2016 (Added link.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Vupen Security
Company typeSociété anonyme
Industrycomputer programming Edit this on Wikidata
Founded2004 (2004)
FounderChaouki Bekrar
Headquarters,
Area served
Information security, Espionage
Websitewww.vupen.com

Vupen Security was a French information security company founded in 2004 and based in Montpellier with a U.S. branch based in Annapolis, Maryland. Its specialty was in discovering zero-day vulnerabilities in software from major vendors in order to sell them to law enforcement and intelligence agencies which use them to achieve both defensive and offensive cyber-operations.[1] Vupen ceased trading in 2015, and the founders created a new company Zerodium.

Work

In 2011, 2012, 2013 and 2014 Vupen won first prize in the hacking contest Pwn2Own, most notably in 2012 by exploiting a bug in Google Chrome. Their decision not to reveal the details of the vulnerability to Google, but rather to sell them, was controversial.[2] Unlike 2012, during Pwn2Own 2014, Vupen has accepted to reveal to the affected vendors, including Google, all its exploits and technical details regarding the discovered vulnerabilities, which led to the release of various security updates from Adobe, Microsoft, Apple, Mozilla, and Google to address the reported flaws.[3]

According to the French registrar of companies,[4] Vupen earned a net profit of €1,283,000 in 2014. Some years ago Vupen was still providing information about vulnerabilities in software for free, but then decided to earn money with its services. "The software companies had their chance", said Vupen-founder Chaouki Bekrar according to the article, "now it's too late".[5] On 15 September 2013, it was revealed that the NSA was a client of Vupen and had a subscription to its exploit service.[6] On 9 November 2014, the German magazine Der Spiegel reported that the German intelligence agency BND was also a client of Vupen.[7] On 22 July 2015, it was revealed that Vupen provided exploits to Hacking Team between 2010 and 2011.[8]

On 5 May 2015, Vupen headquarters filed documents ceasing its operations.[9]

Zerodium

On 23 July 2015, Vupen's founders launched a new US cybersecurity company named Zerodium and having a different business model as it acquires exclusive zero-day discoveries from independent researchers and reports them, along with protective measures and security recommendations, to its corporate and government clients.[10]

References

  1. ^ Andy Greenberg (21 March 2012). "Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)". Forbes.
  2. ^ Kim Zetter (3 September 2012). "How to Pwn the Pwn2Own Contest". Wired.
  3. ^ Google (14 March 2014). "Chrome Stable Channel Update". {{cite news}}: |author= has generic name (help)
  4. ^ Registre des sociétés, Infogreffe
  5. ^ Philipp Alvares de Souza Soares: Cyberspionage: Durch die Hintertuer, in: Die Zeit October 2nd 2013.
  6. ^ NSA Contracted With Zero-Day Vendor Vupen, Darkreading
  7. ^ BND will Informationen ueber Software-Sicherheitsluecken einkaufen, in: Der Spiegel November 9th 2014.
  8. ^ Hacking Team: a zero-day market case study, Vlad Tsyrklevich's blog
  9. ^ Registre des sociétés, Societe.com
  10. ^ Fisher, Dennis (July 24, 2015). "VUPEN Founder Launches New Zero-Day Acquisition Firm Zerodium". ThreatPost.com. Retrieved November 3, 2015.