Vulnerabilities / Threats

6/21/2016
02:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

'Hack The Pentagon' Paid 117 Hackers Who Found Bugs In DoD Websites

Defense Department's historic bug bounty pilot yields 138 valid reports of vulnerabilities, most of which were fixed within two days.

The Defense Department’s historic bug bounty pilot program uncovered nearly 140 previously unknown vulnerabilities in public DoD websites and yielded participating hackers payments of anywhere from $100 to $15,000.

DoD earlier this year launched the government’s first-ever program for paying rewards to white-hat hackers for legitimate vulnerabilities, dubbed “Hack The Pentagon.” The pilot program ran from April 18 to May 12 of this year, and allowed vetted hackers to hunt for bugs in DoD public websites for possible prize money. Secretary of Defense Ash Carter first announced the program in April at The RSA Conference.

Lisa Wiswell, bureaucracy hacker at DoD’s Defense Digital Service in a blog post yesterday announced the results of the program: some 1,410 hackers registered to participate, of which 252 submitted at least one bug finding. DoD received a total of 1,189 vulnerability reports and of that number, 138 were confirmed findings and received compensation. Some 117 participating hackers were paid bounties.  

“And precisely zero registered hackers …. intentionally did anything nefarious, or malicious,” Wiswell said.

Alex Rice, CEO of HackerOne, which helped run the pilot for DoD, says the feds took the right approach to their first bug bounty program. “They were wise from the start: they approached this cautiously as a pilot program, in a very mature fashion and a very public, transparent way,” Rice says.

Secretary Carter last week announced plans to establish an operational DoD Bug Bounty program that would encompass certain DoD websites, applications, code, networks, and systems. 

DoD is rolling out a responsible disclosure policy and process for researchers to report bugs to DoD without concern over legal or regulatory violations. “Over the next several months you’re going to hear about a number DoD initiatives that will engage private citizens, not affiliated with the US Government to help with our most complicated security concerns,” Wiswell said.

DoD will open up a procurement process for various parts of the DoD to run their own individual bug bounty program as well, Rice explains. “They’re going to start using the existence of bug bounty programs to do risk assessment in the vendor on-boarding process” as well, vetting security vendors for having such vulnerability programs in place, for example, he says.

HackerOne will “almost certainly” bid for one of those contracts, he says.

Meanwhile, DoD fixed most of the vulnerabilities discovered during the Hack The Pentagon pilot within the first two days, Rice says, and all of them were remediated before the three-week program concluded. “You have to give them props for that. You’d be hard-pressed to find” many organizations that can do that, he says.

Related Content:

The Black Hat’s CISO Summit August 2 offers executive-level insights into the technologies and issues security execs need to keep pace with the speed of business. Click to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
CVE-2019-8908
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...
CVE-2019-8909
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to cause a denial of service (resource consumption) via crafted dimensions for the verification code image.