Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Apple Offers up to $200,000 in Bug Bounty Program

Black Hat USA 2016 – Apple announced on Thursday its intention to launch a bug bounty program that gives a select group of researchers the opportunity to earn up to $200,000 for finding vulnerabilities in the company’s products.

Black Hat USA 2016 – Apple announced on Thursday its intention to launch a bug bounty program that gives a select group of researchers the opportunity to earn up to $200,000 for finding vulnerabilities in the company’s products.

The announcement was made at the Black Hat security conference in Las Vegas by Ivan Krstić, head of security engineering and architecture at Apple. Krstić said the company will invite a group of researchers it has previously worked with to take a crack at some of its products.

For the time being, the bug bounty program focuses on iOS and iCloud. Bug bounty hunters can earn up to $200,000 for a critical flaw in secure boot firmware components, up to $100,000 for extracting sensitive data protected by the Secure Enclave, up to $50,000 for arbitrary code execution with kernel privileges and unauthorized access to iCloud account data, and up to $25,000 for a sandbox escape. If researchers decide to donate the reward to a charity, Apple could match the donation.

While the bug bounty program is closed, researchers who are not included can still report vulnerabilities to Apple and they might get an invitation to participate. A submission will only be considered valid if it’s accompanied by a working proof-of-concept (PoC) and disclosure is coordinated with Apple.

“Apple’s program sets clear objectives. Find exploitable bugs in key areas,” said Rich Mogull, CEO of Securosis. “Because proving exploitability with a repeatable proof of concept is far more labor-intensive than merely finding a vulnerability, pay the researchers fair value for their work. In the process, learn how to tune a bug bounty program and derive maximum value from it. High-quality exploits discovered and engineered by researchers and developers who Apple believes have the skills and motivations to help advance product security.”

Apple’s bug bounty program will be launched in September. While it will be one of the highest-paying programs, experts have pointed out that legally selling exploits to third-parties could be much more profitable.

For instance, the FBI reportedly paid $1 million for an exploit that allowed the agency to access the password-protected iPhone belonging to the San Bernardino shooter. Last year, for a brief period, exploit acquisition firm Zerodium also offered $1 million for an iOS jailbreak. The company is currently offering half a million dollars for a remote iOS jailbreak.

Related Reading: Panasonic Avionics Launches Bug Bounty Program

Advertisement. Scroll to continue reading.

Related Reading: Kaspersky in Search of Hackers for New Bug Bounty Program

Related Reading: Fiat Chrysler Launches Bug Bounty Program

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.