Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Paid Out $6.7 Million in Bug Bounty Rewards in 2020

Google this week said it paid out more than $6.7 million in rewards as part of its bug bounty programs in 2020.

Google this week said it paid out more than $6.7 million in rewards as part of its bug bounty programs in 2020.

The total amount of bug bounty rewards increased only slightly compared to 2019, when the Internet search giant paid just over $6.5 million. Running for ten years, the company’s programs have resulted in approximately $28 million in reward payouts to date.

A total of 662 researchers from 62 countries received bug bounty payouts last year, with the highest reward being of $132,500.

Google has Vulnerability Reward Programs (VRPs) in place for multiple products, including the Chrome browser, the Android operating system, and the Google Play Store.

Last year, Google paid out $1.74 million in rewards as part of the Android VRP. A total of 13 working exploit submissions were received in 2020, resulting in $1 million in exploit reward payouts. The Internet giant announced higher exploit payouts in November 2019.

According to the company, 30% of the total number of Android exploits ever reported as part of the bug bounty programs were submitted by Guang Gong (@oldfresher) and the team of researchers at the 360 Alpha Lab at Chinese cybersecurity firm Qihoo 360.

The most recent of the 8 exploits they discovered is a 1-click remote root exploit in Android, Google says, adding that the team still holds the top Android payout ($161,337) for an exploit submitted in 2019.

At $400,000, the top all-time spot in Android exploit payouts is held by a researcher who recently submitted two new exploits.

Advertisement. Scroll to continue reading.

In 2020, the Internet search company also paid $50,000 in rewards for flaws in Android 11 developer preview and launched bounty programs for Android Auto OS, Android chipsets, and for writing fuzzers for Android code.

Following an increase in rewards for Chrome vulnerabilities, Google paid out 83% more than in 2019 as part of the Chrome VRP, for a total of $2.1 million across 300 bugs.

The percentage of V8 bugs dropped from 14% in 2019 to only 6% in 2020, but the number is expected to increase, as Google is offering bonuses for clearly exploitable V8 flaws.

With an expanded criteria to include apps using the Exposure Notification API and ones engaging in contact tracing, the Google Play Security Rewards Program also saw an increase in the maximum bounty award for qualifying vulnerabilities, to $20,000.

Google paid more than $270,000 to the Android researchers who submitted reports as part of the Google Play Security Rewards Program and Developer Data Protection Reward Program in 2020.

In 2020, Google received twice as many reports through the Abuse program, compared to 2019, which resulted in more than 100 issues across roughly 60 different products being patched.

Last year, the Internet search giant also awarded more than $400,000 in grants to over 180 security researchers. The researchers submitted more than 200 reports and helped identify over 100 vulnerabilities.

Google also said it gave $280,000 to charity last year.

Related: Google Increases Bug Bounty Payouts for Abuse Risk Flaws

Related: Google Offering Higher Bonuses for Cloud Platform Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.