Valve gives $20k as reward for man who found exploit that generated infinite Steam keys

541197-steam-logo-640x360.jpg

Security is highly important for any company, especially Valve, which runs the largest PC gaming storefront: Steam. This of course means that it's up to the team at Valve to make sure everything is secure and safe as can be, for both its customers and itself. Sometimes, though, that's just not enough, which is when freelance system researchers come in, to see if there's any bugs or exploits that they can get through. Enter Artem Moskowsky, a system researcher who had figured out a way to generate unlimited Steam game keys for himself. All this required was for any user with a Steam developer account to make a slight change to a single parameter, which then allowed him to request any number of copies of any game hosted on Steam. Attempting to test if this actually would work, he made a request for 36,000 keys for Portal 2, which he received instantly through the exploit. Moskowsky immediately reported the bug to Valve's team, which was then quickly fixed from ever happening again. Valve awarded him a bounty of $15,000 dollars for finding this massive bug, along with a $5,000 bonus on top of it. This marks the second time that Moskowsky has helped Valve fix a major error within their system, in which he also was rewarded $25,000 for finding an issue that allowed SQL data to be easily read earlier this year.

Using the /partnercdkeys/assignkeys/ endpoint on partner.steamgames.com with specific parameters, an authenticated user could download previously-generated CD keys for a game which they would not normally have access. Audit logs were not bypassed using this method, and an investigation of those audit logs did not show any prior or ongoing exploitation of this bug.

:arrow: Source
 

Zanoab

Well-Known Member
Member
Joined
Dec 4, 2009
Messages
127
Trophies
1
XP
617
Country
United States
Yeah, so can infinite keys. 20k is NOTHING compared to the amount of lost revenue the guy saved Valve.

I wonder if they would've given the entire steam store library instead if requested. They've done it before in contests and other situations so it is possible and having a Steam dev account with the entire library can easily become famous and probably do more than 20k in marketing ever would.
 

Don Jon

Well-Known Member
Member
Joined
Nov 20, 2015
Messages
1,057
Trophies
0
Age
38
XP
1,496
Country
United States
Anyone knownof there is like auniversity that hands out degrees for hackers? It seems to be a profession that pays out well...
 

Noctosphere

Nova's Guardian
Member
Joined
Dec 30, 2013
Messages
6,750
Trophies
3
Age
30
Location
Biblically accurate Hell
XP
18,657
Country
Canada
He would have made more money selling to cd key websites. 20,000 isn't even enough for a good current year car.
I agree, if he released that exploit,
it would have caused much more damage to valve's wallet
 

Steena

Well-Known Member
Member
Joined
Sep 13, 2009
Messages
647
Trophies
0
XP
763
Country
Italy
The more important thing is he wasn't sued into oblivion or threatened with decades of jail time after receiving said 36,000 keys and reporting it to Valve. As far as "should have paid him more", you wouldn't pay an internal developer the worth of a possible exploit either. Security researchers being paid such sums, as long as they're being compensated for the efforts within guidelines set by the company, is reasonable. Honestly, Valve and a lot of other companies aren't required to pay out any sort of bounty on bugs, security or otherwise, so I'd consider it a net win for both sides.
yeah they do not have obligations, the point is the rewards exists so it's unappealing to take the scam route, if it were an asshole on the other end he could have costed valve millions by duplicating keys without going overboard and have the small amounts be lost in the market ocean.
don't get the whole "they aren't required to", it's in their full interest to do so - they just got extremely lucky that what is described as a business-destroying exploit happened to be found out by a legitimate exploit hunter looking for the bounty. Imagine if the information were sold out to a major grey market key seller, operating in a place where you have no instant jurisdiction.
Imagine smuggling merely 100 keys per day on different new AAA titles every day. You get to the 20k mark off kinguin in a week. 20k is absolutely not a good reward for that level of exploit.
 

kuwanger

Well-Known Member
Member
Joined
Jul 26, 2006
Messages
1,510
Trophies
0
XP
1,783
Country
United States
the point is the rewards exists so it's unappealing to take the scam route

Actually, I entirely disagree. Security researchers who are legitimate exploit hunters either do it because (1) they're looking out for possible bounties or (2) they're trying to pad their resume to get a long-term job in the security research field. Those who take the scam route do so from the start to take the scam route because it's a potential high risk, high reward scenario. Selling gray or black market exploits to criminals or governments is an area where no company can reasonably compete. It's the same with possible criminal deterrent in the form of long prison sentences: trying to encapsulate the worst possible punishment for the worst possible form of a crime just degenerates to calling for death sentences for most crimes, and places where death sentences are the norm for many crimes proves how futile that approach is.
 

K3Nv2

Village Idiot
Member
Joined
May 26, 2013
Messages
1,437
Trophies
3
Age
32
XP
4,955
Country
United States
Right, the thing is 20k really isn't a large sum of money. It's a help but an average lot rent goes from $600+ so say average rent is 1200 a month including Bill's you decide that up and it does pay out to about being worry free for a good couple of years but that's not life. We dont know how much money this guy has either.

No one had to award anything for example I just called dominos about a bug on their website that said they wouldn't deliver to my address anymore and it turned out to be a glitch on their site and I got no free pizza out of it.

You got two people trying to do the right thing and all of you go into dark thoughts of this and that waste it on games. There is a multitude amount of companies that offer rewards for people just trying to do the right thing and people just think negative of it.

Imagine this on his next resume, I helped Steam find a massive bug and reported it. This guy could probably work for any company he wants to now. On the other hand I feel bad for actual security employees that only probably bring in 1k a month working for them. Gotta give people kudos some how.
 

J-Machine

Self proclaimed Pog champion
Member
Joined
Aug 25, 2011
Messages
940
Trophies
1
Location
A concrete Igloo
XP
1,692
Country
Canada
This is worth more than than what he got guys.... This is the kind of business breaking bug that nets you lucrative jobs. trust me this guy is getting his money's worth
 

Skittyusedcovet

Gbatemp’s Favourite Skitty
Member
Joined
Jul 16, 2018
Messages
141
Trophies
0
Age
31
Location
Where cats are plentiful.
XP
323
Country
Canada
Right, the thing is 20k really isn't a large sum of money. It's a help but an average lot rent goes from $600+ so say average rent is 1200 a month including Bill's you decide that up and it does pay out to about being worry free for a good couple of years but that's not life. We dont know how much money this guy has either.

No one had to award anything for example I just called dominos about a bug on their website that said they wouldn't deliver to my address anymore and it turned out to be a glitch on their site and I got no free pizza out of it.

You got two people trying to do the right thing and all of you go into dark thoughts of this and that waste it on games. There is a multitude amount of companies that offer rewards for people just trying to do the right thing and people just think negative of it.

Imagine this on his next resume, I helped Steam find a massive bug and reported it. This guy could probably work for any company he wants to now. On the other hand I feel bad for actual security employees that only probably bring in 1k a month working for them. Gotta give people kudos some how.

You should go on the dominos social media tell them about it on there. Think about it what if this is happening to other people? They could be losing sales from this. Maybe take a few screen shots of the issue as well to give to them. I think it might just take telling the right person and it might net you some free pizza. I would also keep a log of the people you talk to for reference.
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
On the other hand I feel bad for actual security employees that only probably bring in 1k a month working for them.

Is that not how it is done in general?
You want the big money you become a freelance/contractor type. You want stability/predictable income and sick pay then you become a salaried employee. Why feel bad for the second type?

As for the rewards given. Even given my dislike of steam (it is a DRM system -- why would I like it?) I would say while I have seen more generous bug bounties I have seen far far worse.

Anyone knownof there is like auniversity that hands out degrees for hackers? It seems to be a profession that pays out well...
Yes and no.
If you go looking you will find courses in "ethical hacking". When they first hit they were typically postgraduate courses but there are some undergrad offerings now.
They were generally split into two camps
1) Boring and basic security testing. Basically teaching you how to run metasploit, crack wifi passwords, run port scanners.... the usual first pass type stuff. You can also learn this on the job if you are so inclined.
2) More actual hacking. First I have long enjoyed a video called lessons of the kobayashi maru*. It highlights problems I often see with university types, not all but enough.

*video in question


Of course you also have the basically scams that will try to teach you something but are mostly there to take your money. A lot of the early ones either were that or were effectively that by the weakness of their courses. This means not all would be employers will care much for them. I mentioned undergrad earlier and many frown upon these especially as it is a hard thing to do at that level (I don't know if you have ever seen more advanced courses not care about you doing the lower level version as much as you having good maths, English or science skills). There have been some attempts to enforce standards but... yeah.

As such I still would have to look at more general computer training (the big four being straight up computing**, maths if you bias it, physics if you bias it and electrical engineering if you so much as slightly push for it) and then doing stuff on your own time.

**computing tends to be broken down into computer science aka programming and computer administration aka actually making them work/deploying them and keeping them running. You can get weak versions of both -- a computer science course that focuses mostly on Java is one thing and tends to yield a far different result to ones that require an awful lot of maths and focus on low level languages (electrical engineering will tend to default to this if you are doing the more programming side of it, but it is not the same). Administration is not without value -- I quite often bring up an example of a client I had and how it was more admin that solved their problem. They had their wordpress website twisted away from them by a web dev hired by a marketing consultant (the we'll improve your sales, adverts... type scam). I could have spent hours looking for an exploit in the php code but that would be silly when http://wpcrux.com/blog/change-wordpress-password-phpmyadmin/ exists and that is the sort of thing administration teaches more of. Or if you prefer don't go looking for an exploit when you can instead check the default password. There is also masses of overlap but the courses will tend to focus somewhere along the line.

I don't know what sort of background the guy here had but it could have been either. I would expect a programmer to be more keenly aware of or able to explain the kind of fault covered here, however the sysadmin that has to deal with 500 different APIs in their setups and keep an eye on things from a first line security perspective (it ain't typically a programmer which installs and monitors intrusion detection systems) might be more attuned to their foibles.
A security guy however might note that traditionally developers on a service are trusted allies and with a vested interest on not having it fall over. To that end their side of things is usually given less scrutiny than the general public side of things. Such a thing might not immediately occur to either of the others.
Following from above I am probably not going to get remote access to your machine without some kind of social engineering effort. I drive a car through your front door, steal said computer and get away and then I can probably use my nice Linux livecd to read all the files on your hard drive (most people don't encrypt), and if it is actually on at the time and I keep it powered and off screensaver then so much the better.

You can also specialise
For instance I saw this video the other day


Lock me in a room with a bomb set for 48 hours with a copy of the manuals and I might get you the result there (I know enough to check outputs of functions and look for quirks that bad devs will use -- http://wiibrew.org/wiki/Signing_bug but I don't know php as well as that guy) but it is not certain I will make it out of there.
Lock me in a room with a bomb and ask me to do some of the stuff I do with game ROMs ( https://gbatemp.net/threads/gbatemp-rom-hacking-documentation-project-new-2016-edition-out.73394/ ) and I will probably join you for lunch on the first day, others might struggle or be faced with a massive learning curve. Ask me to do crazy soldering and play with my active oscilloscope and same again. If Nintendo were to release the GBA again today (an embedded ARM device with no network abilities) then guess which skill set they would want more?


Another favourite video

I would not be very good at either (I am better at embedded OSes than web stuff but by no means great at the former) but it is a nice example of where things might meet.

I should also mention penetration testing aka pen testing, red team, and while I already mentioned metasploit I will go it again. Terms you might want to search for there. Sorry for the waffle. Only started out as a short reply but hey.
 
  • Like
Reactions: Don Jon

WhiteMaze

Well-Known Member
Member
Joined
Jun 16, 2013
Messages
1,085
Trophies
2
Age
32
XP
2,211
Country
Portugal
Am I the only one who feels like $20,000 is a massive underpay considering what the accomplishment was?

My god valve, you're worth billions... and this guy probably saved you millions...
 
Last edited by WhiteMaze,

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    Veho @ Veho: The cybertruck is a death trap.