Following the success of the “Hack the Pentagon” program, the U.S. Department of Defense has decided to continue to test its websites and networks for cybersecurity vulnerabilities using crowdsourced experts.
The DoD announced on Thursday that it awarded a combined $7 million to HackerOne and Synack for helping the organization’s components launch their own bug bounty initiatives.
HackerOne will help the DoD run challenges similar to Hack the Pentagon, while Synack will provide assistance for a private program open only to highly vetted researchers. The private program will focus on the Pentagon’s sensitive IT assets.
The DoD expects the contracts to cover up to 14 challenges in which hundreds of researchers will be rewarded.
“As adversaries become more sophisticated and the threat environment continues to evolve, maintaining the highest levels of security has never been more important,” said Mark Wright, spokesman at the Office of the Secretary of Defense. “By partnering with these leading crowdsourced security companies, we can take a much more innovative, diverse, scalable and effective approach to better protect and defend our digital assets.”
The Hack the Pentagon challenge, led by the Defense Digital Service and hosted by HackerOne, took place between April 18 and May 12. More than 1,400 hackers registered for the pilot program and over 250 of them submitted at least one vulnerability report. Of all the submissions, 138 were valid and eligible for a bounty.
The DoD said the entire cost of the Hack the Pentagon pilot was $150,000, half of which went to participants. The organization believes that hiring an outside contractor to conduct similar vulnerability testing would have cost at least $1 million.
“These contract vehicles will create an easier and faster path for components and services to set up their own challenges,” said Lisa Wiswell, bureaucracy hacker with the Defense Digital Service team. “Considering the tremendous cost-benefit of crowdsourcing talent, it’s proven that you’ll get more bang for your buck than with some of the other traditional security tools we’ve used in the past.”
Related Reading: Facebook Paid Out $5 Million in Bug Bounties Since 2011
Related Reading: Apple Offers up to $200,000 in Bug Bounty Program
Related Reading: Kaspersky in Search of Hackers for New Bug Bounty Program

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
Latest News
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
