I don’t understand how Pegasus can still exist now that everyone knows about it. Most hacks can be fixed with a patch, once it’s widely known. Whats different about Pegasus?


Comments

IMovedYourCheese720 points • 2024-02-05

As far as we know the exploit used by Pegasus was patched by Apple in Sep 2023. Of course there may be people who haven’t updated their phone since then and are still vulnerable. Alternatively, there may be yet more bugs in the OS that nobody but the makers of Pegasus know about.

Software security overall is a cat and mouse game. Every large complex system has vulnerabilities. The good guys try to catch and fix them before the bad guys can catch and exploit them. Both sides are throwing an incredible amount of money and resources at their respective tasks.

cacofonie123 points • 2024-02-05

How did it work for Apple and Android, though? One company just randomly found critical hacks for two completely different closed off systems?

jakewotf605 points • 2024-02-05

Simply, yes. My brother does this for a living. He’s a senior penetration tester (yes, I know). Basically, companies hire him to break into their system by ANY MEANS NECESSARY and then tell them how he did it so they can patch it. If that means flying to a different state to go to the company’s HQ and walking up to an unattended PC and plugging a flash drive into it, then that’s what happens.

Edit: this comment is mildly popular so I just wanted to say… my brother once broke into a network through an unsecured printer. Put a password on your fucking printers you fucking degenerates.

LordFauntloroy164 points • 2024-02-05

Big shoutout to PirateSoftware on Twitch and Youtube. He did this for US power plants and while obv he doesn’t talk about that he talks extensively on penetration testing, how it works, and cyber security.

DanzakFromEurope69 points • 2024-02-05

Wow, doing on-site “hacks” and stuff like this in US power plants must a pretty hard/action job. Especially if he had done it in nuclear pp.

Koomskap209 points • 2024-02-05

Can we just go ahead and spell out power plant next time

FlyingMacheteSponser117 points • 2024-02-05

Drink heavy water, get nuclear pp.

funkyg7318 points • 2024-02-05

Every time I hear ‘heavy water’ I immediately think of this.

LazyLich1 points • 2024-02-05

Be radiant!

ppsz6 points • 2024-02-05

Pls no shame, not every pp is created equal

DanzakFromEurope8 points • 2024-02-05

I thought about it as I wrote it. But I just left it at pp 😁

bestjakeisbest2 points • 2024-02-05

Take a look at that solar pp

swiss-y5 points • 2024-02-05

Solar beam is a 5 pp move!

DotaWemps28 points • 2024-02-05

An security admit was done to my previous employer. The hackers literally came in dressed as maintenance and screwed the security door from place to access their victim computers. Wild stuff

bestjakeisbest34 points • 2024-02-05

The weakest link is usually not the computers, people are much easier to get around.

Caldtek10 points • 2024-02-05

You can’t patch wetware

slowmaker7 points • 2024-02-05

well, you can, but the update dispersal is really spotty.

EnragedAardvark4 points • 2024-02-05

The ethics boards get whiny about that sort of thing, too.

Jonno_FTW5 points • 2024-02-05

Last place I worked, a junkie used wire cutters to break into the secured car park (there was a 1 metre section of chain link fence). He stole a bunch of toolboxes.

baz2crazy4 points • 2024-02-05

Darknet diaries on podcasts. Awesome show. Listened to everyone

funkyg735 points • 2024-02-05

Do you have a link to their YouTube? I did a search but only found a game company. Thanks!

j_driscoll8 points • 2024-02-05

Is there a guy with long brown hair and glasses in most of their shorts? That’s him - Pirate Software is his game development company. He transitioned into the field after working at Blizzard for a while (some of his stories from that time are wild).

VentItOutBaby2 points • 2024-02-06

His dad is literally the “That which has no life” from the south park WoW episode. They modeled the guy after his dad. He goes into it and shows pics and it’s uncanny.

jakewotf2 points • 2024-02-05

I’m privileged to know what I know.

do0tz70 points • 2024-02-05

My friend does this. He’s told me quite a few stories, such as getting into a building by having out by the back door smoking. Struck up a convo with an employee and said he was new, didn’t have a badge yet. Guy let him in.

Another time, they actually cut through the drywall in a closet connected to the server room after hours.

My favorite is the CEO story. This place was pretty much impenetrable. They tried everything they could but never got through. So they sent the CEO a gift basket telling him his security is fantastic! There was a new computer mouse in there as well. Fancy expensive mouse. He plugged it into his computer, and my buddy instantly jacked the system cause they put stuff in the mouse to give them access🤣

Speffeddude12 points • 2024-02-05

I’ve heard about the unsecured printer from at least 3 hackers I know. One, a past roommate, said he got into a bank’s unsecure printer, got it to send him a copy of whatever it printed, eventually received a copy of a meeting agenda that showed the branch manager would be out on a day. That day, he dressed up as a tech, went in, met the asst. Manager, said branch manager had called him in for some work, and was given free access to the manager’s laptop.

So many opportunities for the bank to stop him from getting access.

Somerandom192220 points • 2024-02-05

If you want to learn more about this stuff, it’s cool watching some of Deviant Ollam’s security talks which are available on youtube.

They’re more focused on physical security, but they provide some really interesting insight into an entire career that most people are unaware of.

username1234229 points • 2024-02-05

I remember the exploit when you could hack the printer through the ink cartridge ITSELF. Turns out printers now need chips inside the ink cartridges to check how much ink (to rip you off more). (so basically they put this on themself).

TactlessTortoise15 points • 2024-02-05

The amount of pen tester tales involving unsecured printers is ridiculous. Seems like the most sure-fire way of getting in.

creatingmyselfasigo4 points • 2024-02-05

Printers, fish tanks… If it’s on your network, secure it!

Empoleon_Master4 points • 2024-02-05

But don’t you know, protecting the ink cartridges with chips to make sure the ink is authentic is where their money should REALLY go. /s

rlt0w10 points • 2024-02-05

Unsecured printers, backup batteries, insecure wifi, or a password that consists of current season and year, Wimter2024! For example.

It’s incredibly easy to get domain admin if you’re already in the network. I’ve been focused on cloud and application security the last few years, but prior to that I was owning fortune 500 company networks left and right. Most of the time it was just poking around open data stores and documentation to find juicy information and exploits.

R3D3-13 points • 2024-02-05

Huh… And there I thought “pen testing” meant “testing an algorithm by trying it out with pen and paper”.

westcoastfishingscot4 points • 2024-02-05

I run a business doing exactly what your brother does. Can confirm exactly those stories are true and happen regularly.

doulanation2 points • 2024-02-05

I want to know how he did that

IDDQD_IDKFA-com10 points • 2024-02-05

Yes since it pays a lot. Below is from 2019 so prices have only gone up.

An updated price list published Tuesday shows Zerodium will now pay 2 million for iOS zero-days that meet the same criteria.

https://arstechnica.com/information-technology/2019/09/for-the-first-time-ever-android-0days-cost-more-than-ios-exploits/

IMovedYourCheese38 points • 2024-02-05

It’s not “randomly”. NSO group is possibly the largest cyber weapon supplier in the world that isn’t a government agency. It has hundreds of employees all working on the single goal of cracking the top software systems in use today and selling the exploits around the world.

SignorJC-81 points • 2024-02-05

Periods go inside quotation marks.

So many people confidently incorrect in the replies lmao.

nfyofluflyfkh21 points • 2024-02-05

Only if the quotation itself would end in a full stop. If it’s a fragment within a carrier sentence then it goes outside, where the carrier sentence ends.

fyonn26 points • 2024-02-05

That’s always a grammar rule I have broadly disagreed with tbh. I frequently break that rule intentionally.

NotPromKing24 points • 2024-02-05

The more people who put them outside of the quotation marks, the faster we’ll get rid of that stupid “rule”. Which BTW is only a rule in the U.S.

onomatopoetix8 points • 2024-02-05

i support this. It looks much more logical to put the period outside in this case, since it matches with parentheses being closed before finally putting a period to finish the sentence (e.g. this one).

SpikedBolt23 points • 2024-02-05

“One company” try one of the bigest state sponsored organisations.

CeldonShooper6 points • 2024-02-05

It’s a line of work. Zero day exploits can be sold for five or six figures. If you really hit the jackpot and find a zero click exploit for a widely deployed architecture it can be worth millions. There are public marketplaces for that kind of exploit.

mrichana5 points • 2024-02-05

Without having any deep knowledge, let me just say that both are unix-like systems running on similar architecture and could have more internal similarities than you think.

meneldal24 points • 2024-02-05

Probably they bought some hacks from people to. You can literally sell hacks like those on the dark web for some really good money.

Which is partly why you have bug bounties now for reporting vulnerabilities, trying to make it easier for people to do the right thing.

cowbutt66 points • 2024-02-05

There exists a market for vulnerabilities, whereby companies like those that produce tools such as Pegasus pay researchers who have found and can document previously-unknown (“zero day”) exploitable vulnerabilities in third party software such as Android, iOS, Chrome, Safari, and Acrobat Reader.

burphambelle2 points • 2024-02-05

I heard, although this may be conspiracy BS, that the US Government has a library of security vulnerabilities that it has purchased to NOT have fixed in case they need to access the system. Is this rubbish?

cowbutt610 points • 2024-02-05

https://en.m.wikipedia.org/wiki/Vulnerabilities_Equities_Process and https://en.m.wikipedia.org/wiki/EternalBlue are worth reading on this topic.

It should be assumed that any nation state with offensive cyber capability does the same thing, whether based on their own original vulnerability research, or buying details of vulnerabilities from others via brokers.

whatisthishownow3 points • 2024-02-05

Take a look at stuxnet, jointly developed by US and Israel intelligence agencies.

It leveraged a large raft of zero day exploits so fresh it’s likley they would have had to have been the ones to put them in their during developement or else their wouldn’t have been enough time to develope stuxnet to exploit them.

Zathrus14 points • 2024-02-05

There’s plenty of security exploits without having to think that they’re being intentionally introduced.

SecondPersonShooter6 points • 2024-02-05

I can’t speak to the specific example of pegasus but many IT systems can share common elements. Not all software is necessarily written from scratch in house. Imagine a car manufacturer buys it’s locks from a third party. It is discovered X brand locks are faulty. Turns out Toyota, and Ford both buy locks from X brand. Suddenly two completely different cars have the same vulnerability.

toxicatedscientist2 points • 2024-02-05

Hundai/kia ignitions might be a better example these days

middlehead_2 points • 2024-02-05

Ford & Toyota is still the better example if the hypothetical is for completely separate companies ending up with the same issues, since Hyundai and Kia have the same parent company.

cowbutt62 points • 2024-02-06

https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_garcia.pdf

“In our first case study, we show that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few, global master keys. We show that by recovering the cryptographic algorithms and keys from electronic control units, an adversary is able to clone a VW Group remote control and gain unauthorized access to a vehicle by eavesdropping a single signal sent by the original remote. Secondly, we describe the Hitag2 rolling code scheme (used in vehicles made by Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault, and Ford among others) in full detail. We present a novel correlation-based attack on Hitag2”

mine_username2 points • 2024-02-05

Darknet Diaries did an episode on Pegasus. Episode 100 titled NSO.

ShortViewToThePast3 points • 2024-02-05

https://en.m.wikipedia.org/wiki/Advanced_persistent_threat

“One company” may have basically unlimited resources. If you have unlimited resources it’s just a matter of time before you find an exploit.

Somerandom192218 points • 2024-02-05

Not directly related to Pegasus, but an important addition to the cat and mouse game you mentioned, some vulnerabilities cannot be patched. Either because they’re a security issue in a device that wasn’t designed to receive software updates (rare these days thanks to IoT, but it still happens), or because it’s an issue integral to the silicon.

The most well known example of this type of exploit are the spectre and heartbleed vulnerabilities, which mess with things “down at the metal” and require an entirely new processor to patch.

These can be the most dangerous as they can affect multiple generations of CPUs and go unnoticed for a very long time.

Edit: spectre and meltdown!!!! Not heartbleed.

ericswpark6 points • 2024-02-05

Spectre and *meltdown. Heartbleed was a bug in the OpenSSL library.

Somerandom19223 points • 2024-02-05

Goddamn I keep making that mistake I did that the other day too!

dorkasaurus4 points • 2024-02-05

Yes and no. In security we talk about things like threat models and likelihood+impact when determining risk, not just impact. The likelihood of you being a victim of Spectre is incredibly small. In that regard something banal like an IDOR in a major retailer which leaks user info is far more dangerous.

Somerandom19222 points • 2024-02-05

Sorry I used “dangerous” too generally. I I derstand that the actual risk of being a victim of a spectre or heart bleed attack is really low.

More dangerous to most businesses are the handful of fishing attacks that get past your email security.

Halvus_I2 points • 2024-02-05

Nintendo Switch launch hardware famously has a flaw that couldnt be patched with software. They had to roll out modified silicon to close the hole.

aladdinr2 points • 2024-02-05

Both sides are throwing an incredible amount of money and resources at their respective tasks

Who funds the “bad guys”?

PaintingLarge88522 points • 2024-07-31

yar, the bad guys be funding themselves with the loot from their victims m`atey

aladdinr1 points • 2024-07-31

I’m impressed you found this 176 days later. Thanks for answering my question though

nuke2x1 points • 2024-05-25

Most likely governments and rich criminal organizations

aladdinr1 points • 2024-05-26

I’m impressed you found my 110 day old comment.

Septalion73 points • 2024-02-05

Have you ever put off updating your phone? It can be annoying or take some time, you May have low network or something like that. Now add in people being scared to update because they think phone manufactures are showing phones down every update.

It’s actually very much not just Pegasus, it can be worse on the PC / server side. Imagine the machine Is making thousands of dollars a minute and you have tons of computers, running many programs all potentially having vulnerabilities. Maybe the update breaks a critical function to your software. Reluctance to update can be prevalent everywhere.

AOE2_NUB1623 points • 2024-02-05

.

pm-me-your-smile-9 points • 2024-02-05

FWIW, it was to address a specific problem that I myself experienced. There was a time when iPhones would shut down while battery level was still ~ 20% give or take. Apple’s workaround was to add a software fix that would prevent that by putting less stress on the hardware when those conditions were present. Yes, that means it would slow it down so the phone didn’t shut down. (My guess is at certain conditions, running at full speed put stress on the hardware during low batt and tripped soke sensor which forced the phone to shut down.).

This software fix meant my phone no longer shut down when it didn’t have to. I was glad for the fix. People took it to mean they were slowing down phones unnecessarily. That was a mischaracterization, but people will hear what they want to hear.

FWIW yes, newer software WILL perform slower on older hardware, but that’s for different reasons than what the lawsuit covered.

Septalion2 points • 2024-02-05

This is true, I meant in line with security updates though from what I understand that was between Major versions, either way that Is another thing that has caused friction to updating, which in turn leads to things not being patched.

Dje4321125 points • 2024-02-05

Because the attacker and defender work on 2 very different security models.

The attack only has to find a single flaw within the entire system to gain control. The defender has to try and find every possible hole to make sure there is not a single gap. This puts the ball firmly in the attackers court as its beyond easy to over look something simple.

The difference is that pegasus is designed for one off, ultra high value targets designed and sponsored by people with a nearly infinite supply of wealth. They can hire some of the best security experts money can buy and turn that impenetrable wall of security into swiss cheese. Even if the one flaw they used is discovered, there is probably hundreds more waiting to be found

CptBartender22 points • 2024-02-05

pegasus is designed for one off, ultra high value targets

Designed and used are two different things, unfortunarely…

DaCurse019 points • 2024-02-05

Just to clarify, Pegasus is just the malware that once installed gives them access to your device. What was patched is the vulnerability which allowed to covertly and remotely install Pegasus (or anything else) on the device.

IRMacGuyver16 points • 2024-02-05

Pegasus isn’t one hack. It has many iterations. It’d be like saying there is only one Doom game. It’s changed over time to stay relevant.

AquaRegia7 points • 2024-02-05

Some exploits are simply hardware related, which means they can’t be fixed by software updates. The only way to fix them is to change the hardware used for the next phone, and this of course only solves the exploit in future phones, not the phones used today.

pawloka61 points • 2024-02-05

Pegasus worked as well as it did because it exploited a lot of “zero-day exploits”. To put it ELI5, 0-days are basically “god fucking dammit, we had this bullshit in our code? This exposes fucking everything. We need to patch it ASAP - and we woulda if somebody would tell us before”.

Please tone down my explanation for actual 5yos.

The thing is - it becomes more and more lucrative to just sit on the zero-days. The whole deal with the name is that you would sell the exploit and then other people would try to do their best in a tight window of time - hence 0-day. But recently some groups just aren’t all-in on insta profit, and that includes governments. There is no doubt that NSO Group already has replacements for their exposed 0-days - but that is just my opinion.

MoonHash36 points • 2024-02-05

The term “zero-day” originally referred to the number of days since a new piece of software was released to the public, so “zero-day software” was obtained by hacking into a developer’s computer before release. Eventually the term was applied to the vulnerabilities that allowed this hacking, and to the number of days that the vendor has had to fix them.

CaptainBayouBilly4 points • 2024-02-05

Argh-e-matey! DCC the bot !list for a list of new warez

MoonHash4 points • 2024-02-05

What?

cacofonie13 points • 2024-02-05

so they just have a collection of different bugs, but rather than selling it on the dark web so that it gets widely used, they keep them and sell them for individual use on high profile individuals? Why do you use the past tense for “worked as well as it did”?

Kaldek30 points • 2024-02-05

0-Days have immense value, until they’re used. You can absolutely guarantee that the NSA, MI6, ASIO, the Russians, CCP, Iran, and everyone else has a bag of them.

They keep them for when they are needed, which considering the fact that they’re generally a one-shot weapon (if detected), can be a hard choice.

State sponsored agencies probably also buy 0-days but the risk of one from the market is that maybe it was also sold to someone else, which, if it was then publicised or used by another party instantly reduces the value of the exploit to nothing. It’s better for the agencies to work on finding 0-day exploits and keeping them themselves.

PhlegethonAcheron15 points • 2024-02-05

Recently a Russian state-sponsored orgnization offered a bounty of 20M USD for a full exploit chain that would allow them to take over a victim’s phone without their knowledge. That would involve minimum several zero-days for an iOS device: some sort of zero-click (likely a zero-day, possibly an unpatched n-day) to get their own code running from something like a malicious webpage or iMessage attachment, a zero-day to get that code running with access to the kernel , a few more zero-days to bypass iOS memory protections that limit what code can see, and probably one or two more to make some more code execute on device boot or something else without the victim’s knowledge, which would require writing to protected filesystems.

AetherBytes14 points • 2024-02-05

I want to add that theres a difference between a zero-click and a zero-day. A zero-click is an exploit that can be used without any input from the victim. A zero-day is an exploit with “0 days since discovery” and thus no one knows it exists apart from it’s users, or it’s just been discovered. A zero-click can be a zero-day, but they’re 2 different things.

meneldal22 points • 2024-02-05

0-day is not a necessity when you target hardware that doesn’t get updates regularly. It’s a lot cheaper to use known exploits.

PhlegethonAcheron2 points • 2024-02-05

Yeah, I should have phrased that a lot better, I just wanted to get across that the initial zero-click in the exploit chain would probably be a zero-day

pawloka16 points • 2024-02-05

so they just have a collection of different bugs, but rather than selling it on the dark web so that it gets widely used, they keep them and sell them for individual use on high profile individuals?

Yes, that’s the usual modus operandi for large groups.

Why do you use the past tense for “worked as well as it did”?

It’d be silly, conspiracy-mode or not, to assume they aren’t moving on their plan B, plan C etc. once their primary business got exposed.

abn13042 points • 2024-02-05

”worked as well as it did”

As I understand it, the vulnerability Pegasus used allowed it to easily do a pretty broad range of things that are desirable in spyware.

Not all vulnerabilities are made alike. Some allow easier access to a system than others, or allow broader access. Pegasus exploited a vulnerability that gave it broad access to a range of hardware functions in a way that made it very difficult to detect. That exploit was patched, so future versions of Pegasus may not have the same range of features, may be easier to detect, may require more exploits to replicate its previous functionality, or some combination of the above.

SignorJC-17 points • 2024-02-05

Punctuation goes inside quotation marks.

jaydubyah6 points • 2024-02-05

Not always.

randomjapaneselearn5 points • 2024-02-05

think about a known software like microsoft office: how does it exist? because people work on it and keep adding features.

what is the difference between a software like office and a hack like pegasus? not much honestly, the main difference is that in one case there is an extra component to make it run against your will and without any window to inform you that is running.

you could hack a phone/pc and force it to install and run office against people will and it would be the same.

so all what they have to do is find new vulnerabilities to make software run if the old one gets patched and change only that little part (technical name is RCE: remote code execution).

they can find a new vulnerability because they have a lot of money and because people that find them can sell those for money, selling to exploit developement pays more than “selling” to apple/google to fix the problem, there is a market for those, see here for example https://www.zerodium.com/program.html

they are state-sponsored so they have a lot of people and lot of money.

wjlow5 points • 2024-02-05

“Why do we still hurl solid objects at each other as a form of combat when we have armor?”

Pegasus isn’t the exploit, it’s the payload. To overly simplify (ELI5 after all), Pegasus is the thing that does the damage, it isn’t the delivery method.

We started throwing rocks at each other since the goal is to hurt the squishy human, so we built wooden armor to stop the rocks. So we got better at throwing rocks harder with tools, so we built metal armor. Fast forward today, we still throw hard things at each other really fast (bullets and guns), and we’ve developed body armor for that too (Kevlar, strike plates, etc).

The end goal has always been the same, deliver this solid thing to hurt the squishy human. Figuring out how to get through everything in between, and also figuring out how to put something in between, has always been the hardest part.

meneldal25 points • 2024-02-05

To explain more why there are so many hacks like that in the first place, you have to realize the mountain of code everything modern is based on. There are millions of lines of code running on the machine, and a lot (if not most) of those are written with languages that are not secure and if you don’t use them perfectly, that can become an entry point for a malicious actor.

And let’s say you make your own program and you’re a genius, there are absolutely no bugs and no exploits, you probably still use other programs to do some stuff (like opening an image), and maybe there’s a bug in that program you had no idea about. For any non-trivial program, you can’t write everything from scratch, so you can have holes that come from things everyone has always thought were safe until it turns out that it wasn’t.

A lot of holes come from assumptions made in a program (often implicit). Like you have an image file that says its size, but maybe it’s lying and you thought that you could get to the end but the data is missing, if the program hasn’t considered the possibility it can do something stupid instead (obviously real hacks are more complex than that but this is eli5).

Then there’s where the true fun begins, hardware-based hacks. It got a fair bit of press with Spectre but that’s not the only thing, there are just so many ways a cpu can leak stuff it shouldn’t because they got so complex. Sometimes it happens with literally secret instructions (especially on x86, harder on ARM since there is a fixed size for instructions so the space for them to hide is a lot reduced) that can be basically magic numbers you give to the machine and you literally own the thing just like that, there is an excellent video about this here, though a bit too complex for eli5)

The more you learn about it, the more you understand how it is a miracle your devices aren’t hacked every day.

Sausafeg2 points • 2024-02-05

That was a really interesting talk you linked, thanks for posting.

Grx4 points • 2024-02-05

Fun fact: Pegasus was bought by the previous polish government to spy on political opposition.

DDPJBL2 points • 2024-02-05

The most dangerous hacks that exist are called zero-day exploits. Zero-day means nobody except the party abusing it knows about it, so the number of days the manufacturer has had to fix it is zero.
Pretty much as soon as a big hack becomes public, it no longer “works”, because the manufacturer will make a software update which plugs that hole. The problem is that people often fail to update their devices for months or years on end, so even though the hack doesnt work on up to date devices, it is still usable on the not updated ones.

When it comes specifically to Pegasus, that is a spyware product made and marketed by a corporation. So while Apple does know something called Pegasus exists, they dont necessarily know how it works, because the corporation will not publish their know-how, the governments which pay for a license to use it will also try to keep it secret because leaking how it works would ruin it and they paid quite a lot of money for it and obviously the corporation is constantly working on finding new holes in new iOS versions.

Whichever hole Pegasus works through now is definitely not the same one that was used in 2016. All it takes is one iOS update that even unknowingly plugs the current hole and whatever they figure out next may well be a completely different hack, just marketed and sold under the same name.

aaaaaaaarrrrrgh2 points • 2024-02-05

Pegasus is the payload, the exploit is used to install it.

The exploit “opens the door” so to speak, then Pegasus is what “walks in” through the now-open door and does the actual spying.

The exploit gets patched, they find a new exploit, and use the new exploit to deliver a (slightly modified) version of the same software to do the spying.

“Finding” a new exploit often involves buying one for a seven-digit dollar amount on the black market, from someone who found one and is willing to sell it to shady actors to make money.