Story image

Uber updates bug bounty terms to stop extortion and unauthorised data collection

01 May 18

Any helpful hacker who participates in Uber’s bug bounty program must act in good faith or face legal action. The company has updated the terms of its bug bounty program, which includes safe harbour for those acting in good faith.

Under the new terms, users must play by Uber’s terms, respect users’ privacy, must not cause more harm than good, and they must not extort the company for ransom.

Anyone who stumbles upon user data is now prohibited from going any further and must report it to Uber immediately, or face the consequences. Participants are also prohibited from saving, storing, transferring, disclosing or otherwise retaining and user data that they find.

The terms also prohibit participants from extorting Uber in regards to vulnerabilities they find.

“You should never illegally or in bad faith leverage the existence of a vulnerability or access to sensitive or confidential information, such as making extortionate demands or ransom requests or trying to shake us down. In other words, if you find a vulnerability, report it to us with no conditions attached,” explain Uber security analyst for product security Lindsey Glovin and product security engineering manager Rob Fletcher.

Uber’s bug bounty program has paid out more than US$1.4 million to participants since its launch.

Bounties include:

  • Exposure of user data -- the payout ranges for this bucket range from $0 to $10,000.
  • Unauthorised requests on behalf of user/employee -- the payout ranges for this bucket range from $0 to $10,000.
  • Monetary impact -- the payout ranges for this bucket range from $0 to $10,000
  • Phishing -- the payout ranges for this bucket range from $0 to $5,000
  • Safety -- the payout ranges for this bucket range from $0 to $10,000

The company has added a bonus payout of US$500 for any researchers who include a fully-scripted proof-of-concept in their original report, which allows Uber to ‘quickly and thoroughly test issues once they are resolved, and run the POC again down the line to ensure there have not been regressions’.

Uber will also match donations of up to $100,000 by any bug bounty participant who donates their bounty to a charity through the HackerOne program.

“Once we hit that milestone, we’ll evaluate how the program is going, seek feedback from researchers, and determine whether we need to make any changes before expanding our contribution. Several leading bug bounty programs offer charitable matching already and our hope is for this to become a permanent part of our program,” conclude Glovin and Fletcher.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.