On the hunt for vulnerabilities and security gaps

top cybersecurity companies

Swiss Post is very open about the issue. In 2021, she aggressively called on hackers to hunt for weaknesses and security gaps in her e-voting system. She waved high rewards. Anyone who discovers critical vulnerabilities in the system will receive a bounty of up to 230,000 euros. Swiss Post works with the bug bounty platform YesWeHack to hunt for the vulnerabilities.

The number of vulnerabilities identified by YesWeHack hunters has doubled in 2021 compared to the previous year. 35 percent of the vulnerabilities found were classified as “critical” or “high”. This means that many enterprise systems and applications would have been seriously compromised had the vulnerabilities not been found or fixed. In terms of the type of vulnerabilities discovered, implementation and design errors (secure design, access control) are the most common for the second year in a row. This trend can be explained in particular by the increasing complexity of the applications used.

In an interview, YesWeHack Senior Account Executive Phil Leatham explains how bug bounty programs work and mutual trust is key to the success of Hunter programs.

Bug Bounty is not necessarily new. Why do you recommend companies to focus on it now?
Phil Leatham: Bug Bounty has actually been around since the 80’s, but it’s really coming back. This is because security challenges have grown exponentially and IT has become extremely complex and agile. In addition, IT is opening up more and more towards the Internet, so it is no longer operated in isolation in the data center and is therefore vulnerable to external attacks. In the past, it might not have been so bad if there were a few security flaws because they were often never found. But now you can’t afford it anymore. The world is so interconnected that all vulnerabilities are found very quickly. At the same time, the hackers are becoming more and more professional and want to earn their money with it. That’s why companies have to react and look for additional ways to better protect themselves in addition to all other professional security measures such as firewalls or security operation centers (SOC).

How does the assignment work? Do customers choose a bug bounty program or a number of hunters?
On the one hand, we provide 35,000 hunters via our platform, i.e. ethical hackers who hunt for gaps and errors. On the other hand, there are our customers who want to know whether and how a system can be attacked. If companies want to set up a bug bounty program, they register on the platform and set up a program with us. You can choose between a private program, accessible only to the hunters selected by the customer, or a public program, open to all of our hunters. We advise customers on which program is best for their needs. This depends, among other things, on what and where exactly the hunters are supposed to hunt. Typically, these are, for example, URLs or a subdomain. Then the company has to determine how much it wants to pay for a found vulnerability. So hunters only get the bounty if they find a vulnerability.

So the price is not always the same?
The price depends on the severity of a vulnerability found, from low to critical. Typically, these are in the low three-digit range for less critical vulnerabilities up to five-digit amounts for critical vulnerabilities. This also depends on the client and the system to be hacked. Bank systems, for example, are usually very secure. If you want to hire a bank hunter, you have to offer something more. Otherwise, Hunter can hardly be persuaded to deal with it and look for gaps. Once a program has been set up, hunters are invited to go hunting.

But vulnerabilities can exist in completely different systems. And with digitization, this diversity is increasing. Does every hunter have the same know-how?
We recommend specific hunters to our customers who have worked their way up our platform through their hunting successes. In addition, they must have the appropriate skills for certain systems. For example, different specialized hunters are needed for IoT systems than for an online shop on a website. One of our customers is a drone manufacturer. You need specialized hunters who know the typical weaknesses of such systems. Once the price and hunters are set, you invite the hunters in, pick a launch date, and then they go out and look for vulnerabilities.

Do you claim to be Europe’s leading Hunter platform? What are you up to?
We have the most Hunters on a European platform. Currently there are more than 35,000 and the number is growing every month. And we have a large number of very large customers, almost all of whom we are not allowed to name for good reason. One customer is Swiss Post, which has developed an e-voting system for direct dialing in Switzerland. For example for parliamentary elections. This lighthouse project is so interesting because Swiss Post wanted to do everything possible to make the system more secure. So the company is open about it. It would be fatal for Swiss Post if elections could be manipulated through a weak point. Incidentally, the Swiss Post voting system is so secure that a hunter receives 230,000 euros if he discovers a critical problem.

Should companies hire Hunter multiple times, or is it enough to test a system before officially launching it?
The problem is that every IT system has weak points. The point is to find and fix as many of these vulnerabilities as possible. For this reason alone, a one-off effort is not enough. In addition, today there is virtually no final state of IT systems. There are not just release cycles, but agile development means that new functions are constantly being developed, which can each time bring new weaknesses with them. Everything is almost always live and must be continuously monitored.

How does YesWeHack earn money?
We charge our customers an annual fee for using our platform. The companies pay for the bugs found. Hunters do not have to pay us anything to register on our platform. You enter your contact and account details, they are checked and you get your money as soon as the vulnerability has been found and verified by us.

The task has a lot to do with trust. Both a Hunter and you could also abuse hunting?
Trust is the key to Bug Bounty. We maintain close contact with customers and hunters and are therefore good at mediating. As a rule, companies are not familiar with the hacker community. If they were to set up a program themselves, hunters might not be involved and the companies would not know whether the hunters were trustworthy. We offer this trust and help companies set up the right bounties and attractive programs for the hunters. Our ranking system for hunters is also helpful. The customers can award points and the hunters work their way up. New customers can see who the best hunters are. This is our added value apart from the platform.

How are the vulnerabilities found by the hunters evaluated?
We do that for most of our customers. When a hunter reports a vulnerability, we check if this is the first time the vulnerability has been reported. Because only the first finder gets the reward. A reason why the Hunters also hurry when they have been selected for a program. We also check the Hunter report for completeness. What did he test? What is the result? How did the system react to the attack? Then we check the criticality, since a hunter naturally wants to classify everything as critical so that he earns more money. Based on the report, customers can see at a glance how many and which vulnerabilities have been reported and then fix them in a targeted manner.

What is the function of a Vulnerability Disclosure Policy (VDP)?
In addition to the professional hunters who earn their money with it, there are people who find a vulnerability without even looking for it. You really don’t want to take advantage of vulnerabilities. It is important for them that they report the vulnerability to the right place. There are always cases where someone reports a vulnerability via email, but nobody takes care of it. A VDP, on the other hand, offers hunters or people who have found a vulnerability by accident a structured and simple way to officially report vulnerabilities.

What then is the difference to Bug Bounty?
Bug Bounty is proactive while VDP is reactive. However, the process is similar to Bug Bounty. Only there are no bounties offered. Typically, a company would set up a dedicated website to report vulnerabilities. We recommend setting up a policy and explaining how a vulnerability can be reported. And that there is no money for it. In the past, such reports were received via social media channels. The respondent also wanted a reward, although none was advertised. If you want to get paid, sign up for the bug bounty program.

Ethical hackers had to struggle with legal problems, especially in Germany. Hunter could make themselves punishable.
The official bug bounty programs and the VDP have solved the problem. Hunters who report vulnerabilities can be sure today that they will not be prosecuted as long as they follow the rules.

Phil Leatham, YesWeHack Senior Account Executive

Phil Leatham
is Senior Account Executive and leads YesWeHack’s sales team in the DACH region. He studied computer engineering at Teesside University in Middlesbrough. Most recently, Leatham served as an account executive at the process automation platform Camunda.

Leave a Reply

Your email address will not be published.