'Hack the Army' Program Pays Out About $100,000 for Netting 118 Bugs The Department of Defense rewarded individuals and groups who hacked into its servers.

By Stephanie Mlot

This story originally appeared on PCMag

via PC Mag

And you thought hacking the Pentagon was easy: The U.S. Army last week revealed details of its first bug bounty program.

The four-week Hack the Army scheme generated 416 vulnerability reports (nearly 30 percent of which are unique and actionable) and approximately $100,000 for security researchers and bug hunters.

The most significant flaw -- as reported by HackerOne, a security consulting firm under contract with the Pentagon -- was uncovered due to a series of chained vulnerabilities that unwittingly took a hacker from the public-facing goarmy.com site to an internal Department of Defense page usually requiring special credentials to access.

"On its own, neither vulnerability is particularly interesting, but when you pair them together, it's actually very serious," HackerOne explained.

The Army remediation team and Army Cyber Protection Brigade stepped in to patch the hole.

"We're not agile enough to keep up with a number of things that are happening in the tech world and in other places outside the Department of Defense," former Army Secretary Eric Fanning said in the November announcement about Hack the Army. "We're looking for new ways of doing business."

The DoD experimented with a similar program last spring, when it invited white-hat hackers and researchers to infiltrate the Pentagon; 138 established vulnerabilities cost the federal government some $150,000 -- money well spent, the agency said in June.

"What Hack the Pentagon validated is that there are large numbers of technologists and innovators who want to make a contribution to our nation's security, but lack a legal avenue to do so," Fanning said.

But unlike Hack the Pentagon, which offered static websites not considered targets, Hack the Army provided sites considered critical to its recruiting mission, according to HackerOne.

"Crowdsourcing is really the only way to get the dynamic skills you need that a static workforce can't get you," Lisa Wiswell of the DoD's Defense Digital Service, said in a statement last fall.

More than 370 people participated in hacking the largest branch of the U.S. Armed Forces -- including 25 government employees, 17 of whom are military personnel.

Stephanie Mlot

Reporter at PCMag

Stephanie began as a PCMag reporter in May 2012. She moved to New York City from Frederick, Md., where she worked for four years as a multimedia reporter at the second-largest daily newspaper in Maryland. She interned at Baltimore magazine and graduated from Indiana University of Pennsylvania (in the town of Indiana, in the state of Pennsylvania) with a degree in journalism and mass communications.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Side Hustle

'My Brain Thrives on Variety': His Side Hustle Inspired By 'The 4-Hour Workweek' Led to $600,000 in 16 Months

Mark Hellweg, 42, knows what it takes to start a business "with a fraction of the capital."

Business Ideas

70 Small Business Ideas to Start in 2025

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2025.

Social Media

How to Turn Social Media Moments Into Newsworthy Stories That Captivate Audiences

How a simple TikTok of a baker kneading sourdough at 30,000 feet sparked global headlines, social media debates and a lesson in viral storytelling.

Growing a Business

Stop Selling Services — How MSPs Can Build Brands That Clients Can't Resist

In 2025, the managed service provider landscape is more competitive than ever. To stand out, MSPs must shift from selling technical services to building magnetic brands rooted in trust, value and differentiation.

Science & Technology

AI Isn't the CEO — Why Human Judgment Still Rules in Business Decisions

AI is transforming business operations, but human oversight remains essential for strategic decision-making. Here's how to strike the right balance between automation and human input.