Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Google Bug Bounty Program Now Covers Platform Abuse

Google on Wednesday announced the expansion of its bug bounty program to include techniques that can be used to bypass the company’s abuse detection systems.

Google on Wednesday announced the expansion of its bug bounty program to include techniques that can be used to bypass the company’s abuse detection systems.

The Internet giant claims to have paid out over $12 million as part of its Vulnerability Reward Programs since 2010, including payouts for bug reports describing techniques for bypassing fraud, abuse and spam systems.

These types of reports have now officially been added to Google’s bug bounty program. The company says it’s prepared to pay up to $5,000 for high impact and high probability issues.

Google assesses probability based on the technical skills needed to conduct an attack, the possible motivators of an attack, and the likelihood of the flaw being discovered by a malicious actor.

“Reports that deal with potential abuse-related vulnerabilities may take longer to assess, because reviewing our current defense mechanisms requires investigating how a real life attack would take place and reviewing the impact and likelihood requires studying the type of motivations and incentives of abusers of the submitted attack scenario against one of our products,” Google said.

For example, a technique that allows an attacker to manipulate the rating score of a Google Maps listing by submitting a large volume of fake reviews without being detected by the company’s systems would qualify for a reward in the new platform abuse category. Researchers can also earn rewards for bypassing account recovery systems at scale, finding systems vulnerable to brute-force attacks, bypassing content use and sharing restrictions, or buying items from Google without paying.

“Valid reports tend to result in changes to the product’s code, as opposed to removal of individual pieces of content,” members of Google’s Trust & Safety team wrote in a blog post. “This program does not cover individual instances of abuse, such as the posting of content that violates our guidelines or policies, sending spam emails, or providing links to malware.”

Related: SSRF Flaw Exposed Information From Google’s Internal Network

Related: Researcher Earns $36,000 for Google App Engine Flaws

Related: Google Bug Tracker Exposed Details of Unpatched Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.