Facebook has paid out a total of more than $4.3 million since the launch of its bug bounty program in 2011, the social media giant said on Tuesday.
According to the company, 5,543 researchers from 127 countries submitted over 13,000 vulnerability reports last year. Of the total, only 526 reports from 210 researchers were valid and resulted in payouts of $936,000, with an average of $1,780. The highest number of rewards went to India, Egypt, and Trinidad and Tobago.
The most noteworthy vulnerability reports from 2015 involved the lack of CSRF protection on Facebook’s messenger.com website, abusing the GraphQL search to make inferences about hidden data, and bypassing CSRF protection.
The total bounty amount decreased in 2015 compared to the $1.3 million paid out in the previous year, but the number of submissions classified as “high impact” increased by 38 percent.
Facebook attributed this growth to the increasing quality of vulnerability reports — clear instructions for reproducing the bug and theoretical attack scenario descriptions.
“The best reports come from researchers who prioritize a few important issues instead of submitting a large number of reports about various low-impact bugs,” Reginaldo Silva, security engineer at Facebook, explained in a blog post.
As Facebook has become better at ensuring that traditional flaws like XSS and CSRF are eliminated during the development cycle, many bounty hunters have turned their attention to business logic inconsistencies. High quality reports describing such issues allow the company to address entire vulnerability classes at once, Silva said.
“Another important part of the program’s success stems from the trust between Facebook and the researcher community, so we invest a lot in those relationships,” Silva said. “We carefully investigate and respond to every submission, and are committed to doing so as promptly as possible, typically within a few days. We reward valid security issues based on several considerations and it’s not uncommon for researchers to tell us that the bounty they received is higher than they expected.”
While many researchers are pleased with the way Facebook runs its program, there have been cases where the social media giant quarrelled with bounty hunters over a flaw’s eligibility for a reward and the way vulnerability reports had been handled.
Related: Facebook Pays Out $7,500 Bounty for Account Hijacking Flaw
Related: GitHub Paid $100,000 Since Launch of Bug Bounty Program

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
