Why bug bounty schemes haven’t led to safe software program
Governments ought to make software program corporations accountable for growing insecure pc code. So says Katie Moussouris, the white hat hacker and safety skilled who first persuaded Microsoft and the Pentagon to supply monetary rewards to safety researchers who discovered and reported severe safety vulnerabilities.
Bug bounty schemes have since proliferated and have now change into the norm for software program corporations, with some, similar to Apple, providing awards of $2m or extra to those that discover crucial safety vulnerabilities.
Moussouris likens safety vulnerability analysis to working for Uber, solely with decrease pay and fewer job safety. The catch is that folks solely receives a commission if they’re the primary to seek out and report a vulnerability. Those that put within the work however get outcomes second or third get nothing.
“Intrinsically, it’s exploitative of the labour market. You’re asking them to do speculative labour, and you’re getting one thing fairly beneficial out of them,” she says.
Some white hat hackers, motivated by serving to folks repair safety issues, have managed to make a dwelling by specialising find medium-risk vulnerabilities that will not pay in addition to the high-risk bugs, however are simpler to seek out.
However most safety researchers battle to make a dwelling as bug bounty hunters.
“Only a few researchers are able to find these elite-level vulnerabilities, and only a few of those which are succesful assume it’s value their whereas to chase a bug bounty. They might slightly have a pleasant contract or a full-time function,” she says.
Moral hacking comes with authorized dangers
Its not simply the dearth of a gentle earnings. Safety researchers additionally face authorized dangers from anti-hacking legal guidelines, such because the UK’s Pc Misuse Act and the US’s draconian Pc Fraud and Abuse Act.
When Moussouris joined Microsoft in 2007, she persuaded the corporate to announce that it will not prosecute bounty hunters in the event that they discovered on-line vulnerabilities in Microsoft merchandise and reported them responsibly. Different software program corporations have since adopted swimsuit.
The UK authorities has now recognised the issue and promised to introduce a statutory defence for cyber safety researchers who spot and share vulnerabilities to guard them from prosecution.
One other problem is that many software program corporations insist on safety researchers signing a non-disclosure settlement (NDA) earlier than paying them for his or her vulnerability disclosures.
This flies towards one of the best practices for safety disclosures, which Moussouris has championed by way of the Worldwide Requirements Organisation (ISO).
When software program corporations pay the primary particular person to find a vulnerability a bounty in return for signing an NDA, that creates an incentive for individuals who discover the identical vulnerability to publicly disclose it, growing the danger {that a} unhealthy actor will exploit it for prison functions.
Worse, some corporations use NDAs to maintain vulnerabilities hidden however don’t take steps to repair them, says Moussouris, whose firm, Luta Safety, manages and advises on bug bounty and vulnerability disclosure programmes.
“We regularly see an enormous pile of unfixed bugs,” she says. “And a few of these programmes are properly funded by publicly traded corporations which have loads of cyber safety staff, software safety engineers and funding.”
Some corporations seem to treat bug bounties as a alternative for safe coding and correct funding in software program testing.
“We’re utilizing bug bounties as a stop-gap, as a solution to probably management the general public disclosure of bugs, and we aren’t utilizing them to establish signs that may diagnose our deeper lack of safety controls,” she provides.
In the end, Moussouris says, governments should step in and alter legal guidelines to make software program corporations accountable for errors of their software program, in a lot the identical means automobile producers are liable for security flaws of their autos.
“All governments have just about held off on holding software program corporations accountable and legally liable, as a result of they needed to encourage the expansion of their trade,” she says. “However that has to alter at a sure level, like vehicles weren’t extremely regulated, after which seatbelts have been required by legislation.”
AI may result in much less safe code
The rise of synthetic intelligence (AI) may make white hat hackers redundant altogether, however maybe not in a means that results in higher software program safety.
The entire main bug bounty platforms within the US are utilizing AI to assist with the triage of vulnerabilities and to enhance penetration testing.
An AI-powered penetration testing platform, XBow, just lately topped the bug bounty leaderboard through the use of AI to give attention to comparatively easy-to-find vulnerabilities and testing probably candidates in a scientific solution to harvest safety bugs.
“As soon as we create the instruments to coach AI to make it seem like nearly as good, or higher in a variety of circumstances, than people, you’re pulling the rug out of the market. After which the place are we going to get the subsequent bug bounty skilled?” she asks.
The present technology of specialists with the talents to identify when AI programs are lacking one thing essential is at risk of disappearing.
“Bug bounty platforms are transferring in direction of an automatic, driverless model of bug bounties, the place AI brokers are going to take the place of human bug hunters,” she says.
Sadly, it’s far simpler for AI to seek out software program bugs than it’s to make use of AI to repair them. And corporations are usually not investing as a lot as they need to in utilizing AI to mitigate safety dangers.
“We’ve to determine easy methods to change that equation in a short time. It’s simpler to seek out and report a bug than it’s for AI to jot down and take a look at a patch,” she says.
Bug bounties have failed
Moussouris, a passionate and enthusiastic advocate of bug bounty schemes, is the primary to acknowledge that bug bounty schemes have, in a single sense, failed.
Some issues have improved. Software program builders have shifted to raised programming languages and frameworks that make it tougher to introduce explicit lessons of vulnerability, similar to cross-site scripting errors.
However there’s, she suggests, an excessive amount of safety theatre. Firms nonetheless deal with faults as a result of they’re seen, however maintain off fixing issues that the general public can’t see, or use non-disclosure agreements to purchase silence from researchers to maintain vulnerabilities from the general public.
Moussouris believes that AI will in the end take over from human bug researchers, however says the lack of experience will injury safety.
The world is on the verge of one other industrial revolution, however it is going to be larger and sooner than the final industrial revolution. Within the nineteenth century, folks left agriculture to work lengthy hours in factories, usually in harmful circumstances for poor wages.
As AI takes over extra duties presently carried out by folks, unemployment will rise, incomes will fall and economies threat stagnation, Moussouris predicts.
The one reply, she believes, is for governments to tax AI corporations and use the proceeds to supply the inhabitants with a common fundamental earnings (UBI). “I believe it has to, or actually there shall be no means for capitalism to outlive,” she says. “The excellent news is that human engineering ingenuity remains to be intact for now. I nonetheless imagine in our capacity to hack our means out of this downside.”
Rising tensions between governments and bug bounty hunters
The work of bug bounty hunters has additionally been impacted by strikes to require software program know-how corporations to report vulnerabilities to governments earlier than they repair them.
It started with China in 2021, which required tech corporations to reveal new vulnerabilities inside 48 hours of discovery.
“It was very clear that they have been going to judge whether or not or not they have been going to make use of vulnerabilities for offensive functions,” says Moussouris.
In 2020, the European Union (EU) launched the Cyber Resilience Act (CRA), which launched related disclosure obligations, ostensibly to permit European authorities to arrange their cyber defences.
Moussouris is a co-author of the ISO normal on vulnerability disclosure. Certainly one of its ideas is to restrict the information of safety bugs to the smallest variety of folks earlier than they’re fastened.
The EU argues that its method shall be protected as a result of it’s not asking for a deep technical rationalization of the vulnerabilities, neither is it asking for proof-of-concept code to point out how vulnerabilities may be exploited.
However that misses the purpose, says Moussouris. Widening the pool of individuals with entry to details about vulnerabilities will make leaks extra probably and raises the danger that prison hackers or hostile nation-states will exploit them for crime or espionage.
Danger from hostile nations
Moussouris doesn’t doubt that hostile nations will exploit the weakest hyperlinks in authorities bug notification schemes to be taught new safety exploits. If they’re already utilizing these vulnerabilities for offensive hacking, they may be capable to cowl their tracks.
“I anticipate there shall be an upheaval within the menace intelligence panorama as a result of our adversaries completely know this legislation goes to take impact. They’re definitely positioning themselves to find out about this stuff by way of the leakiest get together that will get notified,” she says.
“And they’re going to both begin concentrating on that exact software program, in the event that they weren’t already, or begin pulling again their operations or hiding their tracks in the event that they have been those utilizing it. It’s counterproductive,” she provides.
Moussouris is anxious that the US will probably comply with the EU by introducing its personal bug reporting scheme. “I’m simply holding my breath, anticipating that the US goes to comply with, however I’ve been warning them towards it.”
The UK’s equities programme
Within the UK, GCHQ regulates authorities use of safety vulnerabilities for spying by way of a course of often known as the equities scheme.
That includes safety specialists weighing up whether or not the UK would place its personal crucial programs in danger if it did not notify software program suppliers of potential exploits towards the potential worth of the exploit for gathering intelligence.
The method has a veneer of rationality, nevertheless it falls down as a result of, in apply, authorities specialists can don’t know how widespread vulnerabilities are within the crucial nationwide infrastructure. Even giant suppliers like Microsoft have hassle monitoring the place their very own merchandise are used.
“After I was working at Microsoft, it was very clear that whereas Microsoft had a variety of visibility into what was deployed on the earth, there have been tonnes of issues on the market that they wouldn’t learn about till they have been exploited,” she says.
“The truth that Microsoft, with all its telemetry capacity to know the place its clients are, struggled means there’s completely no solution to gauge in a dependable means how susceptible we’re,” she provides.
Kate Moussouris spoke to Pc Weekly on the SANS CyberThreat Summit.

