Hack the Army, a bug bounty program launched by the US Army in November, received more than 400 bug reports in its three-week trial. Of these, 118 bugs were unique and could be fixed, reports Threatpost. White hat hackers and government employees were among 371 participants in the program, which paid upwards of $100,000.
"We recognize we cannot continue to do business the way that we are, and that we're not agile enough to keep up with things that are happening in the tech world," former Army Secretary Eric Fanning said while launching the program. "There are people all over the world trying to get access to our sites, our data, our information," he added.
One of the concerns involved goarmy.com. The website had two bugs that could be used in tandem to access the internal Department of Defense website sans password, due to poor routing security and a vulnerability within the system.
"On its own, neither vulnerability is particularly interesting, but when you pair them together, it's actually very serious," explained HackerOne, the platform for Hack the Army and Hack the Pentagon, an earlier government bug bounty program.
Read details on Threatpost.