Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Bug Bounties Spike as Software Firms, Researchers Compete for Flaws

    Written by

    Robert Lemos
    Published August 21, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      At the Black Hat 2016 security conference in early August, Apple offered select researchers up to $200,000, to find previously unknown ways to compromise the company’s iOS operating system or iCloud service.

      Less than a week later, third-party security firm Exodus Intelligence upped the ante, offering $500,000 for remote exploitation on iOS—10 times more than Apple offered for the same level of compromise.

      The competing offers for information on exploitable vulnerabilities highlight the evolving battle between software vendors, who increasingly want to bolster the security of their products by tapping researchers, and third-party firms who seek to make money from exclusive vulnerability information.

      As software companies become more at ease with paying researchers for vulnerabilities and third parties see more opportunity in buying exploits, the market for security researchers’ efforts has grown, Brian Gorenc, senior vulnerability researcher for Trend Micro’s Zero Day Initiative, told eWEEK. ZDI’s program, for example, has grown steadily this year, receiving the most submissions by researchers to date, he said.

      “Right now, it is a really good time to be a vulnerability researcher,” Gorenc said.

      The environment is a marked departure from even four years ago, when executives at companies such as Microsoft and Apple refused to pay security researchers who found vulnerabilities, and relied instead on altruism and the desire to promote a personal brand to convince researchers to disclose vulnerabilities for free.

      “I think bug bounty programs are awesome and they have come a long way from where they were initially,” Adriel Desautels, managing partner and CEO at penetration firm Netragard, told eWEEK. “When they started, the bounties were almost insults. They were $500 and $3,000. Now, they are much more competitive with what other agencies and brokers are willing to pay.”

      Yet the acquisition of exploitable vulnerabilities by third parties has resulted in significant damage to software firms’ customers. When Apple refused earlier this year to help the FBI circumvent the security of the iPhone, an Israeli company reportedly sold the agency the equivalent of a skeleton key to iOS, giving the federal government the ability to decrypt a backlog of digital evidence.

      Following the incident, and perhaps driven by it, Apple announced its first bug bounty at the Black Hat Security Briefings on Aug. 4. With a $200,000 headline-generating bug bounty, Apple’s program appears to be a strong statement that the company is jumping into the paid research market with both proverbial feet. However, the top payout is only for a very small—and at the same time, very hard to exploit—piece of the iOS software, the secure boot firmware. The more general remote execution vulnerabilities, the focus of most attackers, will bring a much smaller sum of $50,000.

      Yet the program is a good start, Rich Mogull, principal analyst and CEO at security consultancy Securosis, said in a blog post.

      “Apple didn’t need a program, but can certainly benefit from one,” he said. “This won’t motivate the masses or those with ulterior motives, but it will reward researchers interested in putting in the extremely difficult work to discover” some of the most dangerous classes of exploitable vulnerabilities.

      Bug Bounties Spike as Software Firms, Researchers Compete for Flaws

      Apple was one of three major remaining software companies that had a policy against cash bug bounties. Adobe, whose Flash and Acrobat software are popular targets of attackers, announced a program a year ago, but with no cash incentive. Oracle, the owner of the Java software framework, has criticized such programs as well as any effort to find bugs in its software.

      Java and Flash have both been frequent targets of attackers’ efforts—a focus that’s sure to continue in the future, ZDI’s Gorenc said.

      “We are seeing a shift from Microsoft vulnerabilities to Adobe vulnerabilities, and I think you see that from the shift in the attack landscape,” he said.

      With its announcement, Apple joins the company of Microsoft, which had launched its own bug bounty program in June 2013 and has awarded more than $500,000 in bounties. Google started its program in 2010 and has paid out more than $6 million.

      Yet software companies continue to fall far short of the prizes offered by third-party firms. Software companies offer, on average, thousands of dollars per vulnerability. Google, for example, paid an average bounty of $2,700 in 2015.

      Third-party brokers and exploit-development firms are paying at least an order of magnitude more. Exploit-tools developer Vupen, now operating under the name Zerodium, offered three $1 million bounties for iOS exploits last year, and eventually reported that a single team claimed one of the prizes. The company regularly offers $50,000 to $80,000 for browser exploits, $100,000 for Android and Windows Phone exploits and $500,000 for Apple iOS compromises.

      Trend Micro’s ZDI, which pays for vulnerability information and then submits it to software developers, gave away $460,000 at the CanSecWest conference in March, including prizes for the first exploit of Microsoft’s latest browser, Edge.

      In the end, software companies will have to become accustomed to rewarding security researchers and hackers who report vulnerabilities in their software. While five years ago software companies could refuse to pay for vulnerability information, these days, any firm without a bug bounty program could be seen as not doing its job, Desautels said.

      “Software companies did not seem to care much about vulnerabilities, unless it somehow affected their bottom line,” he said. “All the recent news about people buying the vulnerabilities and software vendors not participating made it look like software vendors were not doing their job, and they were not.”

      In the past, Netragard had acted as a broker of vulnerability information, facilitating high-value vulnerability sales. The company stopped the practice following revelations that Hacking Team, to whom Netragard has sold exploit techniques, had resold the attacks to questionable countries.

      Yet, for the most part, sales will continue, and because attack information has such a short shelf life—as the National Security Agency can testify following the leak of some of its tools— demand will continue unabated. With vulnerabilities becoming harder to find, and software companies competing for information on flaws in their code, the price of exploits will only continue to rise.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.