And many exploit providers simply wait for Microsoft Corp.’s monthly patches, which they then reverse-engineer to develop new exploit code against the disclosed vulnerabilities, Ollmann said.
While investigating a Trojan horse named Gozi recently, Jackson discovered that it was designed to steal data from encrypted Secure Sockets Layer streams and send it to a server in St. Petersburg, Russia. A customer query returning three passwords for a small retailer might cost 100 WMZ, while a query for 10 passwords for an international bank might fetch 2,500 WMZ or more. Customers could also choose how they wanted their search results delivered — as compressed files in e-mails or via FTP. In addition to the original Trojan horse, the server also hosted two ready-to-deploy variants in a separate staging area.
Often, groups such as the HangUp Team also offer a detection monitoring service with which they keep an eye on antivirus vendors to know exactly when signatures are available that can detect their malware.
The actual server hardware that the 76Service used was being managed by another entity called Russian Business Network (RBN), which provided Simple Network Management Protocol-based management and back-up services.
“We are not talking about kids doing it for kicks over the weekend anymore,” said Yuval Ben-Itzhak, chief technology officer at Finjan Inc., a San Jose-based security vendor. That report said that cybercriminals hold “vulnerability auctions” in which they sell information on freshly discovered software flaws to the highest bidder.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9015588&taxonomyId=17&intsrc=kc_top