More stories

  • in

    Aussie BitConnect promoter charged over his involvement with alleged crypto scam

    The Australian Securities and Investments Commission (ASIC) has announced the former Australian promoter of BitConnect has been charged for his involvement in the folded cryptocurrency project that was accused of scamming millions out of investors.
    ASIC said John Louis Anthony Bigatton promoted the cryptocurrency platform before its collapse in early 2018, alleging the man from Carss Park in NSW was the Australian national promoter of Bitconnect from around 14 August 2017 to 18 January 2018. 
    ASIC alleges Bigatton operated an unregistered managed investment scheme, known as the BitConnect Lending Platform, in Australia and that he provided unlicensed financial advice on behalf of another person in, amongst other things, seminars he conducted at various locations around Australia.
    The commission further alleges that during four seminars conducted by Bigatton, he made false or misleading statements which were likely to induce investors to apply for, or acquire, interests in the BitConnect Lending Platform.
    The charges laid by ASIC are one count of operating an unregistered managed investment scheme, which carries a maximum penalty of five years imprisonment and/or a fine of AU$42,000; one count of providing unlicensed financial services on behalf of another person, carrying a maximum penalty of two years imprisonment and/or a fine of AU$42,000; and four counts of making a false or misleading statement affecting market participation.
    The maximum penalty for each of the final four charges is 10 years imprisonment and/or a fine of AU$945,000, or a fine of three-times the proceeds derived from the commission of the offence.
    See also: How the FBI tracked down the Twitter hackers

    The matter was mentioned in the Downing Centre Local Court on Tuesday, at which time the matter was adjourned for further mention on 2 February 2021. It is being prosecuted by the Commonwealth Director of Public Prosecutions after a referral from ASIC.
    BitConnect was touted as a “self-regulating financial system” and part of the “cryptocurrency revolution”. It used many buzzwords and the hype of celebrities to lure investors to participate, and also offered an incredibly high interest rate of at least 1% per day, leading many to believe it was a scam.
    Investors would “lend” funds in bitcoin to various projects and these funds were converted to the platform’s coin, BCC.
    It is estimated that BitConnect had a market capitalisation of over $2.5 billion in December 2017.  
    In January 2018, BitConnect closed its exchange platform, with all loans offered on the platform released. However, these loans were converted to BCC rather than reverted to the investors’ original bitcoin.
    ASIC in September 2018 got serious about its financial scam ban, announcing at the time it had stopped several initial coin offerings, or token-generation events that targeted retail investors.

    HERE’S MORE
    Cryptocurrency exchange Byte Power cops AU$33k fine from ASIC
    The corporate watchdog alleges that Byte Power failed to comply with its continuous disclosure obligations.
    ASIC cracks online fraud syndicate allegedly shipping money via crypto
    The ASIC-AFP joint ‘multi-layered cybercrime’ investigation has resulted in the arrest of a 21 year-old woman from Melbourne.
    Aussie blockchain startup Power Ledger wants changes to ICO tax rules
    Power Ledger reckons addressing the ‘anomalies’ in taxation rules would allow Australia to be competitive in the blockchain sector.
    310 digital currency exchanges registered with Austrac
    They occurred after the watchdog got the green light in December 2017 to extend anti-money laundering and counter-terrorism financing regulation to digital currency exchanges. More

  • in

    Facebook and Google refuse 1 in 5 Australian law enforcement data access requests

    Both Facebook and Google have told a House of Representatives Standing Committee that they have each respectively refused 20% of Australia’s law enforcement requests for data held on their platforms.
    For the 2019 calendar year, Google received 4,363 requests from Australian law enforcement agencies to disclose account level data to assist them in their investigations and a further 23 requests under the search giant’s emergency disclosure policy, which is used in cases where life is deemed to be imminently at risk. The approval rate for these requests, Google government affairs and public policy manager Samantha Yorke said, sat at around 80%.
    Facebook received 943 total requests and also disclosed data in 80% of the cases.
    “In the 20% where we didn’t, it’s typically because there was not enough either legal authority demonstrated or the request was too vague or broad for us to be able to comply,” Facebook director of public policy in Australia, New Zealand, and the Pacific Islands Mia Garlick said.
    Similarly, Yorke said requests were denied due to a lack of information from relevant parties or because the accountholder was not an Australian resident or citizen and therefore local law enforcement did not have appropriate jurisdiction to request such information.
    See also: NZ Privacy Commissioner labels Facebook as ‘morally bankrupt pathological liars’
    Yorke and Garlick were appearing before the Standing Committee on Social Policy and Legal Affairs, with Tuesday’s hearing focusing on family, domestic, and sexual violence. The committee took the opportunity to discuss Facebook’s move into end-to-end encryption across its Messenger platform.

    “We did announce that we would be taking many years to make this transition because we do work globally with law enforcement in all parts of the world and with global security agencies,” Garlick said.
    She said Facebook has been engaged in discussions with Australian law enforcement agencies, as well as the Department of Home Affairs, to talk through what law enforcement “looks like in the end-to-end encrypted world”.
    “We’re aiming to be an industry leader in this space and work with them not just on how things can stay the same with respect to unencrypted services but also thanks to the investment that we’ve made for over a decade in artificial intelligence and machine learning, there can continue to be reliance on that to assist with identifying behavioural signals that can assist with law enforcement operations,” she continued.
    Also appearing before the committee was Australian eSafety Commissioner Julie Inman-Grant, who has publicly taken issue with Facebook’s end-to-end encryption threat since August 2019, before law enforcement joined the debate.
    “We are concerned about industry going down [this path] without actually openly talking about some of the technologies and techniques that are out there, including homomorphic encryption that can be used to scan for child sexual abuse images even in end-to-end encrypted situations,” she said.
    Inman-Grant highlighted the reports made to the US National Center for Missing & Exploited Children by other tech companies.
    “In 2019, there were almost 60 million from Facebook. Now that may change if they actually go to end-to-end encryption, but if you look at companies like Apple, there were something like 230 — now they have billions of users, lots of storage capacity in iCloud, they’ve got iMessage — you can’t tell me that there are only 230 child sexual abuse images on their platform,” she said.
    “Amazon, look at AWS, that hosts most of the world’s data — they had eight. Even my former employer Microsoft who owns Skype — Skype for the past 10 years has been the most benevolent vector for child sexual livestreaming of abuse.”
    Inman-Grant said she has personally sent three letters and had five conversations with Microsoft about how it could use technologies across Skype to catch predatory material.
    “‘If you’re saying a Skype conversation is end-to-end encrypted, if you can insert a simultaneous translator in there, why can’t you eat your own dog food and use Photo DNA or an algorithm called Project Artemis that uses grooming technologies?’, and they say it’s because of the privacy of the customer,” she said.
    “I think we need to stop giving all of these companies a free pass.
    “Over time, if we don’t see the issues addressed and we think the harms to children and vulnerable users are too great, I think legislation is an option.”
    RELATED COVERAGE More

  • in

    Service NSW expecting cyber attack to set it back AU$7m in legal and investigation costs

    Service NSW, the New South Wales government’s one-stop shop for service delivery, in April 2020 experienced a cyber attack that compromised the information of 186,000 customers.
    Following a four-month investigation that began in April, Service NSW said it identified that 738GB of data, which comprised of 3.8 million documents, was stolen from 47 staff email accounts.
    Service NSW assured, however, there was no evidence that individual MyService NSW account data or Service NSW databases were compromised during the attack.
    “This rigorous first step surfaced about 500,000 documents which referenced personal information,” Service NSW CEO Damon Rees said in September. “The data is made up of documents such as handwritten notes and forms, scans, and records of transaction applications.”
    In delivering its 2020-21 Budget on Tuesday, the government revealed the legal and investigative cost it is expected to incur from the attack.
    “In April 2020, Service NSW alerted police and authorities to a cyber attack that has potentially compromised customer information,” the Budget documents [PDF] revealed. “Investigations into this matter are still ongoing however, Service NSW is expected to incur legal and investigation costs of approximately AU$7 million.”
    Elsewhere in the state’s 2020-21 Budget, the government largely expanded on a handful of initiatives that have already launched and focused also on how to pull the state out of its AU$16 billion deficit.  

    A big feature of its Budget was the Digital Restart Fund (DRF), which will be given AU$1.2 billion in capital and AU$400 million in recurrent funding.
    “Key to delivering quality government services is ensuring that those services are fit-for-purpose and meet the needs of the community. In this Budget, the government is pursuing an ambitious transformation agenda driven by digitisation,” the Budget papers stated.
    The DRF will underpin this transformation, the state government said, as it aims to promote a “whole-of-sector approach to digitisation and service transformation” and supports job creation by “driving productivity and efficiency across the sector”.
    The DRF was already announced, with AU$100 million in seed funding provided at the 2019-20 Budget, but the 2020-21 Budget contains additional investments, including for school technology, digital courts, ePlanning, Revenue NSW, and cyber.
    To recap, the government is hoping to close the “digital gap” between regional and metropolitan schools through better integration of digital technology into the school curriculum and infrastructure, with AU$366 million over two years to be given to the initiative.
    Meanwhile, AU$54.5 million has been earmarked for a major digital courts and tribunals reform project to digitise services, improve productivity in the legal system, enhance processes, and improve customer experience.
    AU$45.8 million will be used to implement the next phase of an end-to-end digital planning service through the ePlanning program and AU$17.5 million of the DRF has been allocated towards improving the online customer experience for key Revenue NSW online services.
    Also reserved under the DRF is AU$240 million for cybersecurity initiatives, including AU$60 million over the next three years for Cyber Security NSW.
    Cyber Security NSW is responsible for detecting, scanning, and managing online vulnerabilities and data across departments and agencies.
    The Budget is also aiming to support the growth of the state’s advanced manufacturing sector, with a new industry strategy that it hopes can create more jobs across a range of industries, including defence and space, and drive the development of emerging industries such as cybersecurity, medtech, and other digital technologies.
    Elsewhere, the state is also investing in digital health measures that “build on key successes during COVID-19” and further modernise its health system.
    See also: Digital venue registrations for contact tracing will be mandatory across NSW
    AU$50.4 million will be used to provide technology-enabled workforce support options, including remote video conferencing and expanding telehealth services and related infrastructure to enable more access to mental health support for people in immediate crisis.  
    An integrated state-wide laboratory information management system will also be developed to provide seamless ordering, processing, and reporting of over 70 million tests per year across NSW Health; and a real-time prescription monitoring system will be implemented to track prescribed medicines associated with a high risk of causing harm, dependence, or misuse.
    Hoping to lay the foundations of a strong economic recovery, the government has also introduced a number of productivity reforms that are designed to support individuals and businesses to rapidly adapt to the new environment, make it easier to do business by removing hurdles to investment and innovation, and leverage the opportunities from COVID-19 and adopt new technologies.
    “Business investment will be critical to a sustainable recovery,” the papers said. “The NSW government is supporting businesses affected by COVID-19 to adapt, innovate, and invest in new activities.
    “The NSW government’s targeted relaxation of trading hours and other regulations at the height of the pandemic has helped businesses pivot to alternative models and encouraged the uptake of new technology.
    “The Treasurer will lead a whole-of-government evaluation of the costs and benefits of retaining some of these temporary changes to promote a stronger recovery.”
    The state is also providing up to AU$500 million as part of its “Out and About” program to stimulate spending in the local economy, including restaurants, visitor sites, and cultural attractions. Every adult resident will be eligible to claim up to AU$100 in digital vouchers to spend on eating out and entertainment.
    With AU$472 million, meanwhile, the state will give small and medium-sized businesses which do not pay payroll tax access to a AU$1,500 digital voucher that can be used towards the cost of any government fees and charges before 30 June 2022.
    The vouchers are accessible through the MyService NSW portal and operate as a rebate, where a claim can be made after fees and charges have been paid.
    Service NSW will use almost AU$103 million to add 1,000 staff to support projects and expand the capacity of Service NSW frontline services to respond to increased customer demand and changing customer needs during COVID-19.
    MORE FROM THE FIRST STATE More

  • in

    Google ties 'Smart' features up in a bow for Gmail

    Screenshot: Asha Barbaschow/ZDNet
    Google has announced a new setting that allows users to control whether data within Gmail, Meet, and Chat can be used to serve up suggestions across its suite of products.
    It’s calling the function “Smart” features.
    “Think: tabbed inbox, Smart Compose, and Smart Reply in Gmail; reminders when your bills are due in the Google Assistant; and restaurant reservations in Google Maps,” it wrote in a blog post penned by product manager Maalika Manoharan.
    See also: Most consumers will trade their data for personalization
    Although the ability to turn some of these options on isn’t new, Google is now bundling it up into a more user-friendly feature, saying it gives clearer choice over the data processing that makes them possible.
    “This new setting is designed to reduce the work of understanding and managing that process, in view of what we’ve learned from user experience research and regulators’ emphasis on comprehensible, actionable user choices over data,” the search giant said.
    Google reiterated the user remains in control of their data. It said the smart features served up are the result of automated algorithms, not manual review.

    “And, Google ads are not based on your personal data in Gmail, no matter which choice you make,” it added.
    “If you decide not to use smart features and personalization, you will still be able to use Gmail and our other products. And if you decide later on that these features are helpful and you’d like to turn them on, you can do so in your Gmail settings.”
    MORE FROM GOOGLE
    Google’s Recommendations AI now in public beta
    The fully-managed service enables retailers to use AI to give customers personalized product recommendations.
    Google unveils revamped Google Analytics with new ML models, more granular data controls
    With the redesign, Google said it’s aiming to provide a more modern approach to data analytics and measurement.
    Google launches Chrome extension for ad transparency, Trust Token API
    Google has taken new steps towards its grand master plan to revamp the online advertising ecosystem. More

  • in

    New Zoom feature can alert room owners of possible Zoombombing disruptions

    Video conferencing software maker Zoom has launched a new feature today that can alert conference organizers when their online meetings are at risk of getting disrupted via Zoombombing attacks.
    Named “At-Risk Meeting Notifier,” this new feature is a service that runs on Zoom’s backend servers and works by continuously scanning public posts on social media and other public sites for Zoom meeting links.
    When At-Risk Meeting Notifier finds a Zoom meeting URL, it automatically sends an email to the conference organizers with a warning that other people may be able to access their room and possibly disrupt their meeting.
    These types of disruptions are known as Zoombombing or Zoom raids, and they have been a major issue for the company all year.
    Zoombombing is when trolls connect to a Zoom room uninvited and disrupt the meeting by hurling insults, playing pornographic content, or making threats to other participants.
    Zoombombing incidents usually take place after one of the participants shares a link to a Zoom meeting (and sometimes its password) on social media, Discord channels, or Reddit threads, asking others to disrupt the conference.
    Image: ZDNet
    Zoom raids became a widespread phenomenon in March this year, when, due to the COVID-19 pandemic, Zoom also became the de-facto online meeting tool for families, schools, businesses, and government agencies.

    While the US Department of Justice threatened to prosecute Zoom bombers in April, Zoombombing never actually stopped.
    Even if Zoom began enforcing meeting passwords and added a “Report Participant” button, Zoom bombings have continued to take place, primarily driven by meeting participants anonymously sharing links and passwords to private Zoom meetings online, urging trolls to connect and wreak havoc.
    Through the new At-Risk Meeting Notifier feature, Zoom hopes to curtail some of the Zoom disruptions that are still taking place today, even before they happen.
    The new feature is enabled by default and users don’t need to take any action for their accounts. More

  • in

    Employee surveillance software demand increased as workers transitioned to home working

    What does the rise of intrusive tools such as employee surveillance software mean for workers at home?

    A new study shows that the demand for employee surveillance software was up 55% in June 2020 compared to the pre-pandemic average. From webcam access to random screenshot monitoring, these surveillance software products can record almost everything an employee does on their computer.
    VPN review website Top10VPN used its global monitoring data to analyze over 200 terms related to employee surveillance software.
    It took into account both generic and brand-specific queries for its study which compared searches during March-May 2020 with internet searches in the preceding year.
    Global demand for employee monitoring software increased by 108% in April, and 70% in May 2020 compared with searches carried out the preceding year.
    Queries for “How to monitor employees working from home” increased by 1,705% in April and 652% in May 2020 compared with searches carried out the preceding year.
    The surge in popularity of such an open-ended phrase like this reveals how unprepared many companies were for the abrupt shift to mass home-working.
    Top10VPN

    The most popular surveillance tools are Time Doctor, Hubstaff, and FlexiSPY. The tools with the biggest increase in demand include Teramind, DeskTime, Kickidler, and Time Doctor, with interest for the latter tripling compared to the pre-pandemic levels.
    The top three tools account for almost 60% of global demand in surveillance software because of the range of features offered.
    Of the most popular employee monitoring tools, 81% offer keystroke logging so that employers can see every click of the keyboard.
    Over three in five (61%) provide Instant Messaging monitoring so that private instant messages can be viewed. Employers could also monitor how employees’ conversations are going at any point in time.
    Two in three (65%) can be configured to send User Action Alerts such as noticing when the keyboard has been idle for a set amount of time, and 38% are capable of remote control takeovers such as blocking access to websites, or remote installation of software.
    One package, NetVizor claims, operates “entirely in stealth; that is, it’s nearly invisible to the consumer.”
    The radical shift away from office-working has clearly made employers nervous about a reduction in productivity and its potential impact on their business. Greater surveillance, however, may actually reduce long-term productivity.
    Your boss watching your every move may make you less productive in the long run and could significantly impact your feelings about the company itself.

    Coronavirus More

  • in

    Cyber-attack disruption could last for months, says council

    The London council hit with a cyber-attack a month ago has said that some services may be unavailable or disrupted for months to come.
    Hackney Council, which provides services to 280,000 people in east London, said in an update on the mid-October cyber attack that it was continuing to work hard to recover the affected systems and end the “significant disruption” that has prevented residents from accessing some services.
    The council has described the incident as “an advanced, criminal cyberattack” affecting a large number of services, and said it is working alongside the National Cyber Security Centre (NCSC) and National Crime Agency (NCA) to investigate the ‘repugnant’ attack. However, the council has provided little detail on what happened.
    “Some of our services may be unavailable or disrupted for months,” the council said, but added that some previously affected services have either been fully or partially restored, or the council’s teams have created new or temporary ways for residents to access them.
    “In non-critical areas some of our services have been slower than usual, and we are not currently able to respond to all requests and enquiries as well as we normally would,” the council said.
    “A range of Council services are affected by the disruption caused by the cyberattack that will affect our residents, including areas such as benefit payments and Council Tax payments”, the council said. However, it added that many payment options are still available for rent, service charges, major works and garages.
    Services still affected include the land searches and planning applications needed for property sales, plus the ordering and reporting systems the council uses to process reports such as noise nuisance, antisocial behaviour and missed waste collections. Systems the council uses to access accounts, create new accounts and process payments for things like benefits, Council Tax, rents and service charges, and the online apps that residents use to manage these themselves, are also affected.

    The council also said that messages sent to some of its public email addresses between 12 October and 26 October cannot now be accessed, and that enquiries that have not received a response and remain outstanding should be sent again. More

  • in

    Meet the hackers who earn millions for saving the web: How bug bounties are changing cybersecurity

    The first time Katie Paxton-Fear found a bug, she thought it was just luck. 
    One of her friends had signed her up for an event in London, where hackers aim to find the vulnerabilities in a particular piece of software.
    Without any experience of cybersecurity beyond being a programmer and developer, she found one bug, then another. “To be fair, I thought it was a fluke,” she says. But since then she’s found 30 more security bugs.
    “It’s kind of like playing Sherlock Holmes,” says Paxton-Fear.

    More on privacy

    “You feel like a detective, going in rooting around and saying, ‘That looks interesting’, and having a stream of clues,” she says. “And, when you get all the pieces neatly together, and it works and there’s a bug there – it’s the most thrilling experience ever.”
    But unlike a hacker looking for vulnerabilities to cause damage or steal data, Paxton-Fear is a bug bounty hunter. The bugs she finds are reported to the companies that write the code.
    SEE: Security Awareness and Training policy (TechRepublic Premium)

    That allows these organisations to fix the problems before malicious hackers find the same weaknesses. And the bug hunters get paid for each one they find.
    As such she’s part of a growing industry that allows security researchers to hack into organisations’ software – with their permission – and then report the weaknesses they discover in return for a financial reward.
    It’s a different way of approaching computer security, but one that is proving increasingly popular. One key feature is these security researchers will approach a target from the same perspective as a potential attacker. 
    In that sense, bug bounty hunters are both the detective Holmes and also at least in part his nemesis, Moriarty, although Paxton-Fear says she sees herself more as Sherlock because by finding the bugs and reporting them, she’s helping improve security. 
    “I’m doing the right thing,” she says.
    Not that doing the right thing takes away the thrill: Paxton-Fear found herself shaking when she wrote up the report to detail her first bug.
    Finding mistakes in other people’s work
    A number of companies now run their own bug bounty programs, which allow hackers to report the flaws they find in their software. There are also companies that organise these programs for firms that don’t want to run them in-house.
    Paxton-Fear says what she describes as the “nice pocket money” that she makes from bug bounties is a motivator – but not the only one: “For me it’s a hobby, but I really enjoy it.”
    However, for some hackers, bug bounties can mean big paydays.
    According to HackerOne, which organised the events that Paxton-Fear attended and organises bug bounties for big businesses and government agencies, nine hackers have now earned more than $1m each in rewards for spotting vulnerabilities.
    Thirteen more have hit $500,000 in lifetime earnings, and 146 hackers have now earned $100,000 each.
    Researchers doing their hacking on HackerOne’s platform earned nearly $40m in bounties in 2019. That’s nearly equal to the $82m in bounties the company has paid out on behalf of its customers to date – and that doesn’t take into account corporate bug bounty programs that are also paying out millions a year. 
    Not bad money for finding mistakes in other people’s work.
    SEE: Cybersecurity: This is how much top hackers are earning from bug bounties
    Tommy DeVoss is one of those nine million-dollar-earning hackers. He is a reformed blackhat hacker turned bug bounty hunter. DeVoss will hunt for bugs a couple of days a week, looking for things that have changed in the systems he is targeting, and maybe checking old bugs to see if there’s been a change that means the flaw is back again.

    “I know the mistakes that get made because I’ve made those mistakes,” says bug bounty hunter, Tommy DeVoss.
    Image: TJ STEGE/HackerOne
    “The biggest determining factor is the fact I’ve just been doing this for so long and I’ve seen so much stuff. I’ve been a system admin and I’ve been a developer. I know the mistakes that get made because I’ve made those mistakes,” he says.
    DeVoss says each of the nine millionaire hackers go after a different type of bug.
    “None of us have the same skillset and I think that’s why we’re all able to be successful at the same time, instead of fighting each other for the exact same bugs,” he says.
    And while this elite group of high earners is very much the minority. For the vast majority the rewards are much lower; HackerOne said that of the hackers who have found at least one vulnerability, half have earned $1,000 or more. But for some hackers, bug bounties are becoming a handy source of additional financial support.
    Considering that hacking is often seen as a shady and mysterious world, there’s actually a lot of data about what bug bounty hackers earn, and what motivates them. And it’s not always about the money.
    Explanations for motivations
    Nearly a quarter of the security researchers surveyed by HackerOne said their entire income comes from hacking. For more than half, at least 50% of their income comes from hacking. The company said the average bounty paid for a critical vulnerability stood at $3,650, while the average amount paid per vulnerability is $979. 
    Hacking is a relatively young person’s activity: over 80% are aged under 35 and only half of one percent are over 50. And it’s very male, with only 10% identifying as female or non-binary.
    Three-quarters have a degree or postgraduate qualification in computer programming or computer science. Only 14% have no training in the subject at all. However, when it comes to hacking, nearly half describe themselves as self-taught.

    Nearly half of hackers describe themselves as self-taught.
    Image: Getty Images/iStockphoto
    Hackers also earned 38% more in bounty payments in 2019 compared with 2018, according to data from Bugcrowd, another bug bounty program company, which calculates that its hackers prevented $8.9bn in cybercrime by finding and allowing companies to fix bugs that would otherwise have let attackers into their systems.
    Among the other data Bugcrowd collected is that hackers it seems are not early risers: 73% do their hacking in the evening and only 13% do any in the morning. Nearly half spend four hours or less working on bugs and only a super-hardcore 8% do more than 30 hours a week.
    Hackers seem to find their way to bug bounties via a variety of routes.
    Santiago Lopez, another of HackerOne’s elite group of million-dollar-researchers, became intrigued with hacking after he saw the movie Hackers, and earned his first bug bounty in 2016 – when he was aged 16. He went on to become the first hacker on the platform to make a million dollars in bounties.
    “Most of all, having the curiosity to want to break stuff and play around will really decide if you’re cut out for hacker life,” he says.
    A movie was also behind how Mico Fraxix got interested in computer security, but for a slightly different reason.
    He was working as an IT engineer when Sony Pictures was hacked by North Korea, an attack that was probably in response to the studio’s film comedy, The Interview, which was set in the country.
    SEE: Network security policy (TechRepublic Premium)
    For Fraxix, the incident sparked an interest in the world of computer security. One option, he realised, was to become a penetration tester who would probe the defences of a company, often working for a security consultancy firm. But this path was expensive and demanded a degree in cybersecurity. The second option was to become a bug bounty hunter, and he went on to be one of Bugcrowd’s most successful.
    “When I first read online that it’s possible to hack companies and not get prosecuted for it, I was thrilled and amazed,” he says and worked full time as a bug bounty hunter before moving on to a job in penetration testing – and paying for the training through bug hunting.
    So what makes a good bug bounty hunter? Paxton-Fear reckons being a developer is a big advantage.
    “I have an innate sense of how I would do it and I assume people think like me,” she says.
    “One of the big skills in bug bounties that’s really difficult to teach is intuition. Everything I do I am following my intuition. It’s what looks interesting and what doesn’t look right.”
    Big rewards for helping big tech
    Bug bounty programs have actually been around for a long time. Browser pioneer Netscape launched the first one back in 1995. A few years later, Mozilla decided to launch a similar program to allow users to report bugs in its software – a program that still runs today.
    Mozilla started out with enough money for 10 bounties but didn’t know whether the idea was going to take off or not.
    “We are the oldest security bug bounty that’s still operating,” says Daniel Veditz, senior staff security engineer at Mozilla. “We were a small company and it seemed a good way to encourage people to look into security problems.”
    But from modest beginnings, Mozilla’s bug bounty program has grown. Between 2017 and 2019, Mozilla paid out nearly a million dollars – $965,750 to be precise – to researchers who reported 348 bugs, with an average payout of $2,775 per bug. The Firefox browser maker will pay between $3,000 and $10,000 to researchers who spot potentially exploitable critical and high-rated client security vulnerabilities.
    But for Veditz, having a bug bounty program is also a signal about a company’s attitude towards security. It shows that the company welcomes security researchers and sees value in their work. “We want to send a signal – we care, please come bother. If you’ve found something it helps everyone out.”
    And, after Netscape and Mozilla’s early experiments, many other big tech companies followed. Now bug bounties are offered on anything from bugs in websites to cloud services, business software or mobile apps.
    “We started it as an experiment and there was no one around to encourage us or compare ourselves to,” says Veditz. “Along the way lots of other people have decided that it’s a good idea and emulated us and surpassed us in the amount of money they can afford to pay folks.”
    Among those big spenders on bug bounties are some of the biggest tech giants. Microsoft now offers rewards to security researchers who find vulnerabilities across a range of its products, from Microsoft Azure to Xbox, Microsoft Dynamics 365 to its new Edge browser.
    SEE: Facebook launches bug bounty ‘loyalty program’
    Earlier this year Microsoft said it had spent $13.7m in bounties in the past 12 months – over three times the $4.4m it spent in the year before. That’s a big number, but so are the potential awards to individuals. A researcher who discovers a critical remote code execution, information disclosure, or denial-of-service vulnerability in Microsoft’s Hyper-V could earn up to $250,000, while vulnerability reports on Microsoft Azure cloud services could earn $40,000.
    Microsoft also noted that, with many unable to leave their homes due to COVID-19 lockdowns, bug bounty hunters have been busy. Across all 15 of its bounty programs, it saw a rise in bug reports during the first several months of the pandemic.
    Google is another big spender on bug bounties, spending a total of $21m since it launched its vulnerability reward programs a decade ago, including $6.5m in 2019 – twice what it had previously paid out in a single year.
    It also has some huge potential bounties on offer, with a top prize of $1m for a “full chain remote code execution exploit with persistence” which compromises the Titan M secure chip on Pixel devices. And if the exploit is on specific developer preview versions of Android, there’s a 50% bonus, taking the reward up to a cool $1.5m.
    After these giants kicked off bug bounty programs, many other tech companies saw the benefits of the approach, making it a common option. But in recent years, the vogue for bug bounties has spread beyond tech – now many large businesses provide some kind of reward. That’s largely thanks to the US Department of Defense, which launched its Hack the Pentagon in 2016 as the federal government’s first bug bounty program, which since then has allowed it to identify – and fix – thousands of security vulnerabilities across public-facing systems.
    Getting eyes on the prize
    So why does code have flaws in the first place?
    Part of the issue is the way that software is written. It’s usually written in a hurry, with a deadline looming and the boss pacing up and down. It’s written by multiple teams with slightly different experiences and different skills and priorities. Those teams will then have to somehow merge those projects together and make sure the end result is secure.

    “It’s not that there are fewer bugs, it’s just the bugs are in different places,” says Katie Paxton-Fear.
    Image: HackerOne
    But then, most likely, the objectives of the project will shift and a new feature is needed, which means new code being added on top. And then, maybe a year or two later, long after the original development team has moved on, a feature will need changing or removing, which means a new team of developers trying to understand, then modify, the whole leaning tower of code. And this is the best-case scenario for development in many cases. No wonder hackers find gaps they can sneak through.
    Paxton-Fear says part of the problem is that software development is so complex and involves multiple teams. 
    “You have all kinds of different developers who touch a piece of software. You get development time that is often really squished for a feature. As a developer you just want to push features out on time. You’re passing code around and little things could be missed all the time – it’s just unfortunate some of these end up being huge security risks,” she says.
    The benefits for the researchers are the chance to poke around in other peoples’ systems – something usually frowned on at best – while getting paid and maybe becoming a hacker celebrity.
    SEE: FireEye’s bug bounty program goes public
    For the companies that use bug bounty programs, the benefit comes from being able to get lots of seasoned hackers to look at their code in exactly the same way that attackers would – but without the risk – and to pay up only if they find anything.
    GitLab launched a private vulnerability disclosure program in 2014 and has since moved on to a public program with HackerOne. It has now paid out a million dollars across 768 bug reporters.
    “The main value we get from it is reducing risk – that’s the ultimate goal,” says James Ritchey, manager of app security at GitLab. “To do that we need to be aware of our security issues – and what better way to do that than having more eyes on the product. It helps our security team scale.”
    It’s also an acknowledgment of the reality of computer security and the threat that every organisation faces when they have systems exposed to the internet.
    “Ignorance isn’t bliss in security, so we really want to know about these security issues and all those eyes can give us a better perspective. The truth is the moment you’re on the internet, you are kind of an open target anyway. At that point it’s better to have a financial outing for those hackers because they’re going to hack anyway,” he says.
    Turning a hobby into a career
    Prash Somaiya, technical program manager at HackerOne, says the bug bounty programs it organises give companies access to skills they couldn’t easily access otherwise. Some companies have such sprawling infrastructure that it’s hard for them to even understand where their own systems are – let alone testing them for security.
    He says the key difference between hiring consultants to do penetration testing and setting up a bug bounty program is that researchers aren’t being paid for their time, and you’re not paying an hourly rate for them to find bugs – it’s all about delivering results.
    “Security is an evolving beast. Every organisation has vulnerabilities present in their software no matter what, and it’s about acknowledging that and working with the security community to uncover these flaws,” he says. “If those vulnerabilities are out there on the internet, they can be found and they can be exploited.”

    Security is an ever-evolving beast.
    Image: Getty Images/iStockphoto
    However, a bug bounty program isn’t a replacement for more traditional forms of security testing, but an addition, cautions Mozilla’s Veditz: “There are companies that jump into a bug bounty program thinking that it’s a substitute for quality assurance or testing or a security program – and that’s a road to disaster.”
    Some critics warn that bug programs are being used as a sticking plaster when actually organisations need to fundamentally rethink how they write code. They say companies should not be relying on outsiders – many are self-taught and doing it for fun, or working in lower-cost economies where the money from bounties goes further – to fix basic errors that in-house teams should have spotted themselves. 
    They argue that companies should ensure their internal development processes encourage secure coding rather than adding security in as an afterthought, or hoping that external hackers can fix the problem later. 
    SEE: Bug bounty platform ZDI awarded $25m to researchers over the past 15 years
    Taking into account the additional developer time, the cost of the bug bounty program and the cost of any potential security breaches in the interim, making sure the code is secure before it is published is always going to be much cheaper than fixing it later. 
    In addition, to set up a bug bounty program without having the developers in place who can actually trace and fix the bugs discovered – which is a very different skill to finding them in the first place – means that security is unlikely to be improved as a result. It might even make things worse by creating a false sense of security. 
    Indeed, bug bounty programs are not the answer to every problem, and can create some of their own. Some researchers do not want to be involved in them because some programs limit their ability to share the vulnerabilities that they discover, something that would be a benefit to all users of that particular software, and also help them build their own reputation. 
    There’s also a broader criticism of the model – that, like many other crowdsourcing models, the rewards are hard to earn. There are relatively few hackers who make big money. 
    This economic pressure is perhaps part of the reason behind the geographic spread of researchers chasing bug bounties. For Bugcrowd, 80% of bounties are from US companies, but 34% are paid out to Indian researchers – compared with 26% that go to US researchers.
    For HackerOne, nearly 90% of bounties come from the US, and while US hackers get the most, researchers from India, Russia and China also do well. That means bug bounties could in some respects evolve into a crowdsourced twist on the established model of offshore outsourcing. 
    Paying by results keeps costs down, but may also encourage researchers to focus on easier-to-spot flaws they can dig out using automated tools, rather than the ones that might take significantly more time and effort, further creating a false sense of security.
    And it’s also worth remembering that for most participants, bug hunting is a fun pastime. Some may wonder whether it is wise for the largest organisations in the world to rely on hobbyists for their online security. 
    More positively, many hackers see proving their prowess as bug hunters as a route into the security industry, which is desperate for talent. If bug bounties can demonstrate they have a role in creating an on-ramp for new security professionals – as they did for Fraxix – then some of the criticism may go away.
    Hacking is a team sport
    One thing that might surprise outsiders is the amount of cooperation between hackers. Even though only one of them is ever going to be able to claim any particular bounty, the bug bounty hacker community openly shares most information, says DeVoss.
    “One of the major parts of becoming good when it comes to hacking and bug bounties is there are always going to be people smarter than you, who know more than you or who know different things than you,” he says. “I do this for the money but I’m not greedy, so I don’t mind other people making money as well.”
    Paxton-Fear agrees: “I know that if I have a problem I can ask 10 different people for help and rely on their expertise, and a lot of the time they won’t ask for money back – they just want to help. Everyone realises what it was like to get started.”

    Image: Hacking is a community and bug bounties are now part of the mainstream.
    Getty Images/iStockphoto
    Bug bounties have come a long way since the day of Netscape’s first experiment. They’re now firmly part of the mainstream of the security industry. So as the number of wannabe hackers – and companies comfortable with employing them – increases, how does that change the bug bounty world?
    “Hacking will always be a good opportunity for people who don’t want to follow a traditional corporate career path and want the flexibility that comes with the territory,” says Lopez, adding that as awareness of bug bounty hacking grows, it will certainly become less niche, which means more competition.
    SEE: Microsoft goes big in security bug bounties: Its $13.7m is double Google’s 2019 payouts
    Developers are also wising up, which means that some of the easiest bugs are now harder to find.
    Companies have matured drastically over the past few years, says Fraxix: “It used to be that you could easily compromise famous brands and companies but, nowadays, it’s a lot more difficult. Companies are better prepared and their development teams are better trained.”
    That’s especially true when organisations have been running bug bounties for a while.
    GitLab’s Ritchey says when it first ran the program, there were very straightforward findings that were very easy to reproduce.
    “Nowadays, it’s much more complex. The thing is we are constantly releasing new features and updating our own software, and because of that the security issues will never go away. Security issues will always be there – the important thing is to have a multilayered approach to it.”
    The best defence against the worst problem
    And for sure, the types of vulnerabilities being hunted have changed. When the first bug bounties were launched, the cloud and smartphones didn’t exist. Yet those areas are where some of the biggest bounties can now be scored. 
    But that focus may prove to be a mismatch for the bug bounty business model, because most hackers concentrate on web security rather than these more complicated areas that often require additional skills and experience. In Bugcrowd’s latest research for example, 70% of hackers listed web application testing skills, but only 3% listed Android app skills.
    Still, nobody is seriously expecting computer security to improve to the point at which bug bounties – or all the other techniques used to test code once it has been written – are going to be retired any time soon.
    “I don’t think it’s going to get harder… I think it’s going to get different,” says Paxton-Fear. While a few years back bug hunting was all about particular flaws like cross-site scripting and JavaScript injections, now developers know about these problems.
    But thanks to the Internet of Things, the number of devices with some kind of computing power being connected continues to expand, which means new and unusual targets for researchers, like an internet-connected fridge.
    “There are bugs in your fridge for sure,” says Paxton-Fear. “There’s not this ending where developers suddenly know every bug – it just changes. It’s not that there are fewer bugs, it’s just the bugs are in different places.”
    SEE: IoT: Major threats and security tips for devices (free PDF) (TechRepublic)
    Mozilla’s Veditz agrees; hackers find bugs because they come to the code with that outsider approach, and that’s not going to change.
    “As long as there are bugs in software, there are security bugs, and somebody’s got to find them. Bug bounties are a good way to encourage an outside look. Bug bounties as a concept are here to stay for the foreseeable future until we get perfect robots writing our code that don’t make mistakes.”
    Even perfect robots are unlikely to make bug bounty hunters redundant according to DeVoss, who argues there is no such thing as a 100%-secured computer system – unless that computer is turned off.
    Because of the way that software is written – over years in some cases by teams contributing different elements and adding new features over time – code that seems secure at one point may develop problems as it is altered at a later date.
    “As long as we still have humans writing the code, there’re going to be errors. And even when we get to where AI starts writing code and finding bugs, they’re still going to be there. Just because something seems secure today doesn’t mean that in a month, six months, a year, or five years from now, something is found that completely breaks it all”, he says.
    Lopez has a similar view; don’t expect AIs writing perfect code to put smart humans out of business, he says: “There’ll always be a need for hackers. Even with AI and security built in from the outset, there will always be people who want to break stuff and who will learn to manipulate AI to do so. Human hackers are the best defense against the most sophisticated attacks.” More