Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Meta Offers Rewards for Flaws Allowing Attackers to Bypass Integrity Checks

Facebook parent company Meta today announced that its bug bounty program will cover vulnerabilities that can be exploited to bypass integrity safeguards.

Facebook parent company Meta today announced that its bug bounty program will cover vulnerabilities that can be exploited to bypass integrity safeguards.

The program expansion, the company says, is meant to steer researchers’ attention to security issues that attackers may exploit to bypass specific integrity checks meant to limit abuse behaviors.

Such checks include mandatory two-factor authentication for specific business manager accounts, Facebook’s own application verification process, or feature restriction enforcements.

For example, Meta is willing to pay researchers for reports regarding issues that may allow the bypass of the quarantine state a business is automatically placed in when they violate Facebook policies; or bugs leading to tampering with restrictions enforced on other businesses or with their appeals to restrictions.

Researchers who identify endpoints that may perform sensitive actions without triggering a Business Manager two-factor authentication (2FA) prompt may receive up to $2,000 for their reports.

Meta also says it is willing to pay good money for vulnerabilities identified in its ads payment infrastructure.

Thus, researchers may be handed out rewards of up to $20,000 for issues allowing them to “create an arbitrary amount of prepaid balance without using a valid payment method,” or up to $15,000 for bugs that allow them to “remove an arbitrary outstanding balance without a valid payment,” the company says.

[ READ: Facebook Will Reward Researchers for Reporting Scraping Bugs ]

Advertisement. Scroll to continue reading.

Flaws that allow researchers to tamper with metrics in Facebook Audience Network will also be rewarded. The highest bounty payout – of $10,000 – will go to reports demonstrating the “ability to take credit for the attribution of an install through an advertisement” without user interaction.

Meta will pay up to $20,000 to researchers demonstrating a method of generating ad revenue via fake impressions (without use of external botnets, scripts, social engineering, or fake accounts).

Scenarios that impact the integrity of ads displayed within the Facebook audience network are also within scope of the bug bounty program. New attack vectors that are also highly scalable and exploitable may be awarded bug bounty rewards of up to $10,000.

Meta also expanded the bug bounty program to include vulnerabilities in its application review process and issues that allow tampering with an app’s identity after the review process has been completed.

Furthermore, the social media platform will reward issues that allow applications to continue accessing user information after a grace period of 90 days has passed since the individual last used the application, as well as bugs that allow applications to bypass rate limits Facebook has imposed on API calls.

Meta also announced bug bounty rewards for vulnerabilities that bypass penalties – such as user account suspensions or disables – that have been enforced for policy violations. Issues allowing for the bypass or modification of a user’s appeals to these enforcements are also within the scope of the bug bounty program.

Related: Facebook Battles Cyber Campaigns Targeting Ukraine

Related: Hackers Got User Data From Meta With Forged Request

Related: Meta Sues Two Nigerians Who Lured Facebook Users to Phishing Sites

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...