Facebook on Tuesday announced important updates to its bug bounty program. The social media giant says it’s prepared to pay out as much as $40,000 for vulnerabilities that can lead to account takeover.
According to Facebook, researchers can earn up to $40,000 if they report an account hijacking flaw that does not require any user interaction, and $25,000 if minimum user interaction is required for the exploit to work.
The bounty applies to Facebook and other services owned by the company, including Instagram, WhatsApp and Oculus.
“By increasing the award for account takeover vulnerabilities and decreasing the technical overhead necessary to be eligible for bug bounty, we hope to encourage an even larger number of high quality submissions from our existing and new white hat researchers to help us secure over 2 billion users,” Facebook said.
The bug bounty update comes in response to a recent data breach that impacted roughly 29 million users.
Facebook revealed in September that hackers exploited a vulnerability in the ‘View As’ feature to steal access tokens that could be leveraged to hijack accounts and gain access to third-party apps that used Facebook login.
The attack, which did not require any user interaction, involved the exploitation of several bugs, including ones related to a video uploader interface introduced in July 2017.
Just days before the breach was disclosed, the social media giant announced that it had expanded its bug bounty program to introduce rewards for reports describing vulnerabilities involving the exposure of user access tokens.
Related: Is Facebook Out of Control? Investigations and Complaints Are Rising
Several privacy scandals hit Facebook this year. The biggest incident involved British political consultancy Cambridge Analytica, which obtained the details of tens of millions of Facebook users. The company also admitted that 14 million users were affected by a flaw causing posts meant to be private to become public.
And incidents continue to surface. Facebook-owned Instagram informed users last week that their passwords may have been exposed as a result of using the “Download Your Data” tool.
Related: Facebook Pulls Security App From Apple Store Over Privacy
Related: Facebook’s Growing Privacy Concern

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
