If you’re a Moscow-based zero-day exploit seller, all you have to do is e-mail a spyware company like Hacking Team out of the blue. You can go from initial, unsolicited message to getting paid tens of thousands of dollars in just a matter of weeks.
After Hacking Team, the Italian spyware vendor, was itself hacked and 400GB of its internal data released onto BitTorrent, Ars reviewed internal e-mails from the company. The chain of e-mails that follow offer a rare look into exactly how new security vulnerabilities get sold to companies and governments around the globe.
The Moscow vendor’s first e-mail, dated October 13, 2013, was short and to the point:
Hi, is your company interested in buying zero-day vulnerabilities with RCE exploits for the latest versions of Flash Player, Silverlight, Java, Safari?
All exploits allow to embed and remote execute custom payloads and demonstrate modern techniques for bypassing ASLR [address space layout randomization] and DEP [data execution prevention]-like protections on Windows, OS X, and iOS without using of unreliable ROP and heap sprays.
The e-mail contained no identifying information about its sender except for the e-mail address: [email protected].
The Hacking Team response, direct from CEO David Vincenzetti, came within 24 hours:
Absolutely.
Would you please elaborate your offer?Regards,
David
A rap sheet
Tovis responded that he had “six ready-to-delivery exploits,” for Windows, OS X, and iOS, each priced at $30,000 to $45,000. Internally, Hacking Team decided it was only interested in one of them, an Adobe Flash exploit.
On October 23, Tovis revealed himself:
All prices in the list are non-exclusive. Exclusive sales are possible but the price will grow in 3 times [sic]. Volume discounts are possible if you take several bugs. All 0days were discovered by me, all exploits are written by me and I sell them as individual person (not a company). About me: Vitaliy Toropov, 33 yo, from Moscow, Russia.
Hacking Team staff discussed how to proceed and were excited when Guido Landi, a senior software developer, discovered that Toropov had a reputation—his own entry on OSCDB, the open sourced, Web-based vulnerability database.

Loading comments...