• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Hacker making up money by revealing client vulnerability through stock market

September 14, 2016 by Vaibhav Shukla 3 Comments

How can the market players play with security vulnerabilities of different firms…Ill share the news
There is always a pact between a cybersecurity researchers and the companies that when a cyberSec. firm finds a vulnerability in an organization they will report it to the organization directly and get the money in reward or as per the deal.
But a strange thing somehow happened a Cybersecurity Firm- MED SEC found alleged bug in the St. Jude Medical company implantable heart equipment.
MedSec rather than approaching the medical company it went to the shortseller firm MUDDY WATER.
The investment firm Muddy Water would make the vulnerabilities public in exchange for giving the cybersecurity firm a cut of the profits Muddy Waters made from betting against the medical device maker’s stock.
http://www.denverpost.com/2016/09/04/cybersecurity-strategy-insecure-companies-wall-street/

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. BIlaal Williams says

    September 15, 2016 at 4:51 pm

    Interesting article..It will be interesting to see if this becomes a more common occurrence and if so, how will the SEC respond? As the article says, the idea that something like this would happen has been mentioned in security conferences for several years but this is the first “mainstream” occurrence. Since the findings were found by an outside firm, it would seem no trading laws were broken, which is reiterated by the fact that the SEC is currently choosing to remain silent on the issue. But issues of ethics and safety could require some kind of reactive measures if these types of exploits continue.

    Log in to Reply
    • Mauchel Barthelemy says

      September 16, 2016 at 8:59 pm

      Bilaal,
      This act becoming a more common practice is the first thing that strikes my mind as a concern. This would not be a good way to commercialize cyber security because it would invite hackers to explore this idea deeper and probably exploit it in a way in their own benefit. For example, they may infiltrate a system, create multiple back doors, then approach the same company later on to falsify new vulnerability findings to make money. Also, who knows how negatively this practice could impact the U.S. economy. Conversely, selling vulnerability findings can encourage the good guys to discover back doors before unethical hackers; however, no one really is certain how this would play out as an unregulated common practice in the economy.

      Log in to Reply
  2. Wade Mackey says

    September 20, 2016 at 12:50 am

    I gotta think the SEC is going to have something to say about this sooner rather then later. Strip away the tech babble and this looks like insider trading to me. Also, seems unethical. When I have been involved in pen testing a third party application, the results were always share with the company that sells the software.

    Wade

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in