Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Dropbox Paid Out Over $1 Million Through Bug Bounty Program

File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program.

File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program.

Dropbox launched its bug bounty program in 2014 and in April 2015 it announced a program on the HackerOne platform. The bug bounty program currently covers the company’s main websites, its Paper collaborative workspace service, and its desktop and mobile applications.

Rewards range between $216 and over $32,000, with the top amount offered for critical remote code execution vulnerabilities affecting Dropbox servers.

The company says it has paid out more than $1 million to date. This includes over $318,000 via the HackerOne platform for nearly 300 vulnerabilities and more than $330,000 at a live hacking event that took place last year in Singapore.

Dropbox has also shared a list of its favorite bug reports, which includes vulnerabilities that could have been exploited to access password-protected documents, gain access to a user’s Paper documents, access internal Dropbox services via server-side request forgery (SSRF), steal file content, and perform ImageTragick attacks.

“To those outside of the security community, it may seem counterintuitive that you can make your platform safer by encouraging security researchers to attack you, but that’s exactly the value that these programs deliver,” the Dropbox product security team said in a blog post. “This process of discovering and remediating bugs is key to our maintaining a highly secure organization and increasingly hardened product surfaces.”

Related: Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019

Related: Facebook Offers Rewards for Instagram Data Abuse Reports

Advertisement. Scroll to continue reading.

Related: GitLab Paid Half a Million Dollars in Bug Bounties in One Year

Related: Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...