Investing

What Is A Bug Bounty In Crypto?

What Is A Bug Bounty In Crypto?

Image for post

Employing a tough line of defense in a cost-effective way

Wallex Trust & Custody

Wallex Trust & Custody

Feb 1 · 5 min read

In this age of computers, micro to macro businesses across different industries on a universal scale is variedly dependent upon online operations for interconnectivity and interoperability in the efficient and effective delivery of goods, products, and services. There is nary a household or a seat of government that can function better with the help of the Internet. How much more unimaginable nowadays for an individual not to have a mobile phone or a gadget to get by with life lived today.

And along with the growth of cyberspace activities came the growth of cybercriminality.

Nearly every online user is wary that at any time, a bug, a virus, or a hacker can get through their mobile or computer, thereby compromising private data security and sensitive systems. Companies cannot be caught off-guard with all the cyberthreats lurking around as new bugs are created daily. They, too need to seek new ways of ensuring that they are protected. Thus, the response to the threat gave birth to what is now termed as Bug Bounty programs.

Bug bounty programs are put up by companies and corporations for ethical hackers to participate in to try and discover configuration errors and software malfunctions that can potentially compromise operations and breach security measures to the damage of reputations and sabotaging of private information, not to mention the loss of huge amounts of money. In other words, bug bounty programs are defensive mechanism projects to counter cybercrime. It is offered to ethical hackers and security researchers to discover vulnerabilities that exist within the company’s ecosystem. Those who are able to find vulnerabilities will be handed handsome monetary rewards and recognized for their successful disclosures. It is a far less expensive way of cracking harmful codes than running continuous tests and evaluations.

Bug Bounty was a phrase coined by Netscape Communications when they employed a bug-finding program for their Netscape Navigator 2.0 Beta, offering rewards to anybody who would discover its flaws. They were inspired by Hunter & Ready who launched the first bug bounty program in 1983 putting up a VW Beetle for anyone who can find flaws in their system, floating the motto: “Get a bug if you find a bug.”

Bug bounty hunting was not that popular during those days until Google launched their own program in 2010 that it gained traction. Companies followed through that resulted in the submission of more than a hundred thousand vulnerabilities and $42 million in payouts. Since then till now hundreds of companies and organizations of all sizes, even political entities, carry out bug bounty programs. The US Department of Defense had their program running during the past years, while the EU launched theirs in January 2019.

The “Hack the Pentagon” program launched in 2016 offered $75,000. The EU set an additional 20% to their payout for any hacker if a vulnerability solution is provided. Bug bounty programs can generate a hacker anywhere from hundreds to thousands of dollars rewards. One researcher was recorded to claim $1 million in earnings in total. Payouts do vary depending on the vulnerability, data and system exposure, and the company launching the program. It is said that the government pays the highest in rewards, with the most lucrative vulnerability being the Multifactor Authentication Bypass (MFA). Last year 2020, payouts reached 100 million dollars since more and more companies are opting for bug bounty programs.

Cross-site scripting was the most reported vulnerability. It was followed by improper authentication. Information disclosure ranks third among the top three most reported bugs.

Some vulnerabilities that require immediate attention include:

Cross-Site Scripting (XSS)

Open Redirect

Insecure Direct Object References (IDOR)

Cross-Site Request Forgery (CSRF)

Server-Side Request Forgery (SSRF)

Deserialization

Remote Code Execution (RCE)

Clickjacking

Race Conditions

SQL Injection

Broken Access Control

Multifactor Authentication Bypass (MFA)

Conclusion

Mobile hacking programs are beginning to rise in demand since mobile companies are coming out with more complicated products. Mobile products have a higher barrier of entry, though, but ethical hacking skills are offered higher rewards.

Wallex is a FinTech company that employs blockchain solutions to conform to your escrow, custody, exchange, transfer, and asset management needs. Our AML/KYC/CFT procedures enable us to operate internationally, conforming to each country’s policies in our area of operation. We operate under tough security conditions with round-the-clock measures to guarantee fund safety. We are at your service wherever you are, whenever you need us. Our advisory team is ever ready to assist you with a wiser way of investing. Call now. https://wallextrust.com

Check out our new platform ? https://thecapital.io/

Published at Tue, 02 Feb 2021 00:38:50 +0000