Security

Security bug bounty programs are a nice little earner for hackers

Safe to assume the money will keep getting better


Some security-conscious organizations award hackers up to $900,000 a year, according to what's touted as the biggest bug bounty industry report to date.

The study – commissioned by HackerOne, a bug bounty and vulnerability disclosure platform provider – examined 800 hacker-powered programs and 50,000 resolved security vulnerabilities, from organizations including GitHub, General Motors, Intel, Lufthansa, Nintendo, Uber, the US Department of Defense and more.

Bounty payments are rising – the average that researchers earned for a critical vulnerability was $1,923 in 2017; it was $1,624 in 2015 – an increase of 16 percent. A third (32 per cent) of resolved vulnerabilities were classified as high- to critical-severity, and top rewards reached $30,000 for a single report. In the past year, 88 bug bounty rewards were over $10,000.

The most lucrative bug bounty programs award researchers an average of $50,000 a month, and up to around $900,000 a year.

Programs that acknowledge, validate and resolve submitted vulnerabilities receive the most attention from researchers, according to HackerOne – as would be expected.

E-commerce and retail businesses resolve security issues in four weeks, the fastest on average, the study discovered.

In the face of increased bug bounty program adoption and federal agencies' recommendations, an astounding 94 per cent of the top publicly traded companies have no vulnerability disclosure policy that's available to the public. This remains unchanged from 2015.

Findings from HackerOne's 2017 The Hacker-Powered Security Report are summarized in a blog post, here. ®

Send us news
1 Comment

Uncle Sam kills funding for CVE program. Yes, that CVE program

Because vulnerability management has nothing to do with national security, right?

CVE program gets last-minute funding from CISA – and maybe a new home

Uncertainty is the new certainty

Don't open that JPEG in WhatsApp for Windows. It might be an .EXE

What a MIME field

CrushFTP CEO's feisty response to VulnCheck's CVE for critical make-me-admin bug

Screenshot shows company head unhappy, claiming 'real CVE is pending'

Old Fortinet flaws under attack with new method its patch didn't prevent

PLUS: Chinese robodogs include backdoor; OpenAI helps spammer; A Dutch data disaster; And more!

Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns

PLUS: Russian bug-buyers seeks Telegram flaws; Another WordPress security mess; NIST backlog grows; and more!

Panic averted: It was just a bug in Atop after all

Warning of possible problems sparks controversy: Was it OverDAtop?

Microsoft wouldn't look at a bug report without a video. Researcher maliciously complied

Maddening techno bass loop, Zoolander reference, and 14 minutes of time wasted

Public-facing Kubernetes clusters at risk of takeover thanks to Ingress-Nginx flaw

How many K8s systems are sat on the internet front porch like that ... Oh, thousands, apparently

Infoseccers criticize Veeam over critical RCE vulnerability and a failing blacklist

Palming off the blame using an ‘unknown’ best practice didn’t go down well either

IBM scores perfect 10 ... vulnerability in mission-critical OS AIX

Big Blue's workstation workhorse patches hole in network installation manager that could let the bad guys in

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper