Vulnerabilities / Threats

4/2/2018
04:23 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

'Hack the Defense Travel System': DoD Extends its Bug Bounty Program

The fifth US Department of Defense bug bounty program, launched with HackerOne, will target a DoD enterprise system used by millions.

The US Department of Defense and HackerOne have announced a new DoD bug bounty program, "Hack the DTS," which will let vetted white-hat hackers take aim at the Defense Travel System, an enterprise platform used by millions of employees to book work-related travel.

This is the fifth bug bounty challenge the two have created since 2016, when the inaugural Hack the Pentagon program let participants hunt for vulnerabilities in DoD websites, applications, and networks. Hack the DTS opened registration on April 1, 2018 and will conclude on April 29.

"The scale of users, volume of travel booked, and sensitive information it is responsible for maintaining makes DTS both a compelling asset for researcher and a priority for DoD to harden its security," says Reina Staley, chief of staff and co-founder at Defense Digital Service, who says this program will have the same execution as earlier ones but "inevitably yield unique findings."

Eligible participants must be US taxpayers and either citizens of, or eligible to work in, the United Kingdom, Canada, Australia, or New Zealand. Proof of citizenship is required to register.

Active US military members and contractors can join the challenge if they're eligible but can't receive financial rewards. Anyone who submits a vulnerability report must undergo a security and criminal background check before they are rewarded for their findings, HackerOne reports.

Hack the DTS will invite up to 600 participants. Seventy percent will be chosen based on the HackerOne Reputation System, which builds track records for researchers based on the strength and relevance of earlier reports. Thirty percent will be chosen from a random lottery.

While the DoD's initial bug bounty initiative first took security experts by surprise, the DoD's bug bounty programs launched with HackerOne have proven a valuable resource for finding and addressing vulnerabilities. More than 3,000 flaws have been resolved since the 2016 launch of Hack the Pentagon, with ensuing programs leading to more flaws discovered and larger bounties.

"The quick, positive reception of the program has been a major win," says Staley. "Inviting hackers to uncover vulnerabilities in DoD assets sounds counterintuitive to traditional government security practice, but the value of crowdsourcing external talent has been clear in every challenge we've run to date."

The first Hack the Air Force program resulted in 207 valid reports and $130,000 rewarded to hackers for their findings. The second yielded 106 valid vulnerabilities and $103,883 paid to participants, including a single award of $12,500 for a code execution vulnerability on an Air Force Portal host system. Hack the Army in December 2018 surfaced 118 valid flaws.

While Hack the Pentagon was primarily created as a means for people to help with national security without pursuing a government career, Staley notes the program has helped find talent. A contributor to the program will join the DDS for a summer internship prior to starting college in the fall.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.