March 22, 2017 By Douglas Bonderud 2 min read

Bug bounty programs work. It makes sense: White-hat hackers of all stripes and skill levels get a chance to track down critical flaws, improve their security reputation and get paid.

Dark Reading noted these programs are quickly “growing up,” offering bigger payouts and using a more formal approach to determine vulnerability values. Here’s a look at the maturing market of big league bug squashing.

The Rise of Bug Bounty Programs

Crowdsourcing the bug-hunt business is a solid choice for big tech companies. Even with large IT staff, it’s impossible to invest the kind of time and effort necessary to track down both existing and zero-day flaws. Add in the fact that familiarity with local systems makes in-house IT less than impartial, and there are big benefits to bug finding.

So it’s no surprise that the market is growing. ZDNet reported that Intel just launched its first bug bounty program. Payouts are $7,500 for critical software bugs, $10,000 for critical firmware security flaws and up to $30,000 for each “critical Intel hardware bug.”

Meanwhile, companies like HackerOne and Bugcrowd, which manage bounty programs for other organizations, are seeing a marked increase in the number of registered hackers, according to Dark Reading. HackerOne in particular has more than 100,000 people on board, and has helped 750 organizations find 40,000 bugs.

Results come quickly — more than 75 percent of companies that sign up with HackerOne get at least one bug report within 24 hours. Even companies with long-standing bounty programs, such as Microsoft, are increasing their payouts. If participants find zero-day vulnerabilities that Microsoft can replicate, the rewards reach $15,000 or more.

Locking It Down

Along with bigger payouts, companies are also tightening up the formula they use to assign bug values. What’s the math behind all the money?

CSO Online explained that it’s critical for companies to define what a bug is worth — and be prepared to change this number as market forces shift. Dark Reading also pointed to several key factors in “formalizing” bug bounty programs to pay out more when specific conditions are met. For example, HackerOne takes into account the severity of the flaw, the scarcity or abundance of similar bugs, the potential impact of the vulnerability in the wild and the maturity of a company’s existing security program.

What does this mean for bug hunters? Low-risk flaws that are common across industries, won’t lead to severe data breaches and can be effectively handled by internal teams will pay out on the low end of the spectrum: likely between $1,000 and $5,000. On the higher end, rare, risky and repeatable bugs that put corporate resources in jeopardy could net anywhere from $15,000 to $100,000.

The bottom line is that bug bounty programs, both internal and managed, are maturing as corporate risk increases. They are also becoming increasingly structured as more hackers lend their squashing skills to protect corporate data.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now.The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP).DMP’s benefits and vulnerabilitiesDMP predicts memory addresses that the code is most…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today