📺 Stream EntrepreneurTV for Free 📺

'Hack the Army' Program Pays Out About $100,000 for Netting 118 Bugs The Department of Defense rewarded individuals and groups who hacked into its servers.

By Stephanie Mlot

entrepreneur daily

This story originally appeared on PCMag

via PC Mag

And you thought hacking the Pentagon was easy: The U.S. Army last week revealed details of its first bug bounty program.

The four-week Hack the Army scheme generated 416 vulnerability reports (nearly 30 percent of which are unique and actionable) and approximately $100,000 for security researchers and bug hunters.

The most significant flaw -- as reported by HackerOne, a security consulting firm under contract with the Pentagon -- was uncovered due to a series of chained vulnerabilities that unwittingly took a hacker from the public-facing goarmy.com site to an internal Department of Defense page usually requiring special credentials to access.

"On its own, neither vulnerability is particularly interesting, but when you pair them together, it's actually very serious," HackerOne explained.

The Army remediation team and Army Cyber Protection Brigade stepped in to patch the hole.

"We're not agile enough to keep up with a number of things that are happening in the tech world and in other places outside the Department of Defense," former Army Secretary Eric Fanning said in the November announcement about Hack the Army. "We're looking for new ways of doing business."

The DoD experimented with a similar program last spring, when it invited white-hat hackers and researchers to infiltrate the Pentagon; 138 established vulnerabilities cost the federal government some $150,000 -- money well spent, the agency said in June.

"What Hack the Pentagon validated is that there are large numbers of technologists and innovators who want to make a contribution to our nation's security, but lack a legal avenue to do so," Fanning said.

But unlike Hack the Pentagon, which offered static websites not considered targets, Hack the Army provided sites considered critical to its recruiting mission, according to HackerOne.

"Crowdsourcing is really the only way to get the dynamic skills you need that a static workforce can't get you," Lisa Wiswell of the DoD's Defense Digital Service, said in a statement last fall.

More than 370 people participated in hacking the largest branch of the U.S. Armed Forces -- including 25 government employees, 17 of whom are military personnel.

Stephanie Mlot

Reporter at PCMag

Stephanie began as a PCMag reporter in May 2012. She moved to New York City from Frederick, Md., where she worked for four years as a multimedia reporter at the second-largest daily newspaper in Maryland. She interned at Baltimore magazine and graduated from Indiana University of Pennsylvania (in the town of Indiana, in the state of Pennsylvania) with a degree in journalism and mass communications.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Business News

Carnival Cruises Officially Installs Elon Musk's Starlink Internet on 100% of its Ships

Starlink is now the official internet for Carnival passengers.

Business News

Wegovy-Maker Presents Results of Its Longest Study Conducted So Far on Weight Loss — Here's What to Know

The company's data showed that the drugs were effective over multiple years, even if there are still unknowns.

Money & Finance

This Toxic Money Habit Is Becoming More Common — If You've Picked It Up, Your Finances Are at Serious Risk, Expert Warns

Kaitlin Walsh-Epstein, chief marketing officer at digital banking platform Laurel Road, reveals the frequent mistake.

Business News

Major U.S. Airlines Are Suing the Government Over 'Capricious' Fee Transparency Law

Southwest Airlines opted not to join the other airlines in the lawsuit.

Business News

'This Year Almost Broke Me': Tom Schwartz Reveals 'Scandoval' Almost Shut Down His Restaurant After Losing 80% of His Business

As Bravo's "Vanderpump Rules" ends its 11th season, longtime cast member, Tom Schwartz, and Schwartz & Sandy's business partner, Greg Morris, open up about how public scandal almost shuttered their restaurant — and how they kept it afloat.