Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

IoT Vulns Draw Biggest Bug Bounty Payouts

As bug bounty programs become more popular outside of the technology sector, IoT vulnerabilities are yielding the highest payouts for bug hunters, according to two reports released Wednesday.

Finding vulnerabilities tied to the Internet of Things (IoT) carries the potential to capture payouts that are considered among the most lucrative for bug hunters, according to reports released Wednesday by Bugcrowd and HackerOne.

IoT and hardware bugs found in such devices as routers, webcams, wearables, and automobiles pay an average of $724 per submission, which is substantially higher than the overall average of $451 per submission last year, according to Bugcrowd. As a result, IoT and hardware targets are viewed as the targets with the highest value.

"The main reason the payouts are higher is that these bugs are more difficult to find and the consequences of these bugs can be more severe or impactful," says Casey Ellis, founder and CEO of Bugcrowd, which conducts both public and private bug bounty programs.

Anecdotally, Alex Rice, co-founder and chief technology officer of HackerOne, noted because a higher level of expertise is often needed to find IoT bugs, organizations putting up the bug bounties will often pay the most. Intel, for example, pays $30,000 for its bug bounties, Rice says.

Not only are IoT bug bounties lucrative, but bug bounty programs tied to IoT are on a sharp rise, according to HackerOne. IoT bug bounty programs played a significant role in the 59% growth rate in the tech industry's new bug bounty programs this year over last, according to HackerOne.

Swarm of Bug Bounty Programs Emerge

IoT bug bounties are just part of the picture in a rapidly expanding field. Last year, the number of corporate bug bounty programs tripled, and the payouts from these programs rose by 211%, to $4 million, according to Bugcrowd's Bug Bounty 2017 report.  

And while the tech sector was the pioneer in adopting the use of bug bounty programs to find flaws in their software and hardware, a number of other industries are embracing the concept.

For example, in 2016, 41% of companies launching bug bounty programs were outside of the tech sector, such as in the financial services and banking, government, media and entertainment, and e-commerce and retail industries, according to HackerOne, which conducts all of its bug bounty programs on behalf of corporate customers that want a private, invite-only program.

"Non-tech industries are rapidly becoming tech without knowing it," Rice says, pointing to corporate mantras like "mobile first" or "API driven" that are espoused by non-tech companies.

The difference in payouts between public bug bounty and private bug bounty programs is also somewhat striking. Bugcrowd, which performs both types of bounties for its clients, noted the highest payout given for a single vulnerability was $50,000 and the lowest was $50, with the average falling in at $451 per submission. HackerOne, which only deals in private bug bounties, noted the average bounty for a critical vulnerability was $1,923 this year, an increase of 16% over 2015.

Although a number of the statistics gleaned by HackerOne was a continuation of the trend of bigger payouts and more bug bounty programs emerging, Rice says he was pleasantly surprised by the time it takes for a company to fix their flaws once a bug hunter has informed them of the problem.

"One of the most encouraging signs is the time to resolution. We are seeing this heading down," says Rice, noting companies are identifying and fixing problems at a faster clip.

The e-commerce and retail industry is the fastest, taking an average of 31 days from the point of being notified to solving the issue, according to HackerOne. The telecom industry, however, is the worst, with a 90-day lag time to fix the issue.

Related content:

Bug Bounty Programs are Growing Up Fast and Paying More

The Bug Bounty Model: 21 Years & Counting

US Army Bug Bounty Program Fixes 118 Flaws

8 Hot Hacking Tools to Come out of Black Hat USA

 

 

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4719
PUBLISHED: 2020-09-24
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.
CVE-2020-15604
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-24560
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-25596
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
CVE-2020-25597
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...