Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Vulnerability Management

8/6/2019
07:00 PM
50%
50%

US Air Force Bug Bounty Program Nets 54 Flaws for $123,000

The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.

A six-week bug-hunting contest netted the US Air Force information on 54 security vulnerabilities in its Common Computing Environment (CCE), a branch-wide cloud platform that aims to serve up online applications, program management firm Bugcrowd said on August 6.

The bug bounty program, in which 50 vetted hackers participated, resulted in $123,000 in prizes, or an average of $2,460 per participant. The number and severity of the issues reported to the US Air Force show the strength of the crowdsourced model, says Casey Ellis, Bugcrowd's chief technology officer and founder.

"If you got people building software, building environments, they are also going to make mistakes, and that is the stuff you want to catch and provide feedback on," he says. "This is about making hackers part of the solution and figuring out how to engage them in activities for government cybersecurity."

Bug bounties have become much more popular as an inexpensive way of finding vulnerabilities in specific products and services. In addition to the US Air Force, every branch of the US military has run significant bounty programs against some part of their information infrastructure. In November 2016, the US Army launched a "Hack the Army" event, netting 118 valid vulnerability reports from 371 eligible participants. And, at last year's DEF CON conference in Las Vegas, the US Marine Corps had a live nine-hour hacking event, in which it paid out $80,000 in prize money for 75 vulnerabilities.

As the US government moves toward increasing its use of the cloud, the military is looking to test the security of its cloud infrastructure as well. The CCE is the US Air Force's cloud-based platform that currently hosts 21 applications as of April, according to the Air Force. The military branch has spent $136 million on the cloud platform since 2015 but has saved on operations and management issues, according to statements from the US Air Force.

As an initial validation to an organization that might be new to crowdsourced security, the bug bounty program was a success, says Ellis. The next step it to regularly use bug bounties to systematically improve infrastructure security.

"We are at the point, after initial validation, where we are as an industry is figuring out how to incorporate feedback from the hacker community into how we build our stuff securely," Ellis says. "That is going to be different for every organization."

In 2018, bug bounty programs had another growth year. Both Bugcrowd and HackerOne announced record-setting revenues. HackerOne paid more than $19 million for information on more than 100,000 vulnerabilities in the software and systems of its clients. Bugcrowd helped its clients launch 29% more programs in 2018, and had 92% more submissions, according to its "Priority One: The State of Crowdsourced Security in 2019" report.

The average payout from the US Air Force program was $2,460, very close to the average bounty of $2,442 for vulnerabilities in 2018, according to Bugcrowd's report. The most lucrative bounties, more than $8,550 per bug, were paid for vulnerabilities found in Internet of Things devices. Overall, Bugcrowd found that the bounty for vulnerabilities increased 83% in 2018 compared with the previous year.

"While the vulnerabilities in IoT devices — refrigerators and DVRs — capture our attention for their novelty and fear factor, they are still and by far outnumbered by vulnerabilities in web applications," the company stated in the report. "In fact, web application vulnerabilities have always been the top submitted vulnerabilities across our programs and correspondingly account for the highest percentage of awards paid."

While the US Air Force's bug bounty program seems impressive, the rewards from such programs tend to benefit relatively few people. Because there were 50 researchers, the average researcher only saw a single reward. In reality, the majority of the prizes likely went to a handful of researchers. An academic paper published last year found that bug bounties tend to have skewed rewards

While every military branch is now on board, getting to this point required overcoming significant hurdles, Ellis says. "The idea that the DoD and the Air Force would accept the help of the external hacker community — that's not an intuitive thing," he says.

Related Content

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
christie446
50%
50%
christie446,
User Rank: Apprentice
8/6/2019 | 10:32:47 PM
woa
it very funny
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...