Vulnerabilities

Google Offers $100,000 for Chromebook Hack

Google announced on Monday two important changes to its Chrome Reward Program, namely an increased reward for hacking Chromebooks and the addition of a new class of vulnerabilities.

<p><strong><span><span>Google announced on Monday two important changes to its Chrome Reward Program, namely an increased reward for hacking Chromebooks and the addition of a new class of vulnerabilities.</span></span></strong></p>

Google announced on Monday two important changes to its Chrome Reward Program, namely an increased reward for hacking Chromebooks and the addition of a new class of vulnerabilities.

In February 2015, the search giant announced that it had decided to ditch single-day Pwnium competitions in favor of a year-round program allowing researchers to earn high rewards for Chromium vulnerabilities and exploit chains.

The company offered at the time $50,000 to anyone who could achieve a persistent compromise of a Chromebox or Chromebook in guest mode via a web page. Since no one has claimed the prize so far, Google has decided to increase the reward from $50,000 to $100,000.

In addition to promising higher rewards for Chromebook hacks, Google also informed bug bounty hunters that they can now report Safe Browsing download protection bypass vulnerabilities via the Chrome Reward Program.

Researchers can earn up to $1,000 for a high quality report describing a method that can be used to download a blacklisted test binary to a location on the disk where a typical user could execute it, such as the “Downloads” folder. The submission will qualify for a reward if the file on the disk leads to non-sandboxed code execution with minimal user interaction.

Google describes minimal interaction as a maximum of three actions that must be performed by the victim for the exploit to work (e.g. click to download, open .zip, and launch .exe).

Google noted that a valid submission must describe a technique that works with Safe Browsing enabled and an up-to-date database. It’s also important that Safe Browsing servers are reachable from the network, and that the download does not send a Download Protection Ping to Safe Browsing.

The company paid out more than $2 million last year as part of its Security Reward Program, and a total of over $6 million since the launch of the program in 2010. As part of the Android Vulnerability Reward Program launched in June 2015, Google had paid more than $200,000 by the end of the year, including a single payment of $37,500 to one researcher.

Advertisement. Scroll to continue reading.

Facebook reported last month that it paid well over $900,000 last year to researchers who discovered vulnerabilities in the social media platform. The company has paid out more than $4.3 million since the launch of its bug bounty program in 2011.

Related: Google Pays $25,000 Reward for Critical Chrome Flaw

Related: Google Patches Three High Risk Flaws in Chrome 49

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version