sb-nz logo
Story image

Uber updates bug bounty terms to stop extortion and unauthorised data collection

01 May 2018

Any helpful hacker who participates in Uber’s bug bounty program must act in good faith or face legal action. The company has updated the terms of its bug bounty program, which includes safe harbour for those acting in good faith.

Under the new terms, users must play by Uber’s terms, respect users’ privacy, must not cause more harm than good, and they must not extort the company for ransom.

Anyone who stumbles upon user data is now prohibited from going any further and must report it to Uber immediately, or face the consequences. Participants are also prohibited from saving, storing, transferring, disclosing or otherwise retaining and user data that they find.

The terms also prohibit participants from extorting Uber in regards to vulnerabilities they find.

“You should never illegally or in bad faith leverage the existence of a vulnerability or access to sensitive or confidential information, such as making extortionate demands or ransom requests or trying to shake us down. In other words, if you find a vulnerability, report it to us with no conditions attached,” explain Uber security analyst for product security Lindsey Glovin and product security engineering manager Rob Fletcher.

Uber’s bug bounty program has paid out more than US$1.4 million to participants since its launch.

Bounties include:

  • Exposure of user data -- the payout ranges for this bucket range from $0 to $10,000.
  • Unauthorised requests on behalf of user/employee -- the payout ranges for this bucket range from $0 to $10,000.
  • Monetary impact -- the payout ranges for this bucket range from $0 to $10,000
  • Phishing -- the payout ranges for this bucket range from $0 to $5,000
  • Safety -- the payout ranges for this bucket range from $0 to $10,000

The company has added a bonus payout of US$500 for any researchers who include a fully-scripted proof-of-concept in their original report, which allows Uber to ‘quickly and thoroughly test issues once they are resolved, and run the POC again down the line to ensure there have not been regressions’.

Uber will also match donations of up to $100,000 by any bug bounty participant who donates their bounty to a charity through the HackerOne program.

“Once we hit that milestone, we’ll evaluate how the program is going, seek feedback from researchers, and determine whether we need to make any changes before expanding our contribution. Several leading bug bounty programs offer charitable matching already and our hope is for this to become a permanent part of our program,” conclude Glovin and Fletcher.

Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Story image
Hackers offering forged “official” COVID vaccination certificates and negative test results on dark net 
There has been a 350% increase in the number of advertisements selling alleged COVID vaccines within the last three months.More
Story image
Addressing the challenges of least privilege access
Enforcing the right privilege policies across the environment with the right visibility and observability will ensure that the policy mandates hold tight against any behaviour changes.More
Story image
Cloud services top threat vector for healthcare industry
"The coronavirus pandemic continues to highlight the unique cybersecurity needs of the healthcare industry, even as it has increased the number of threats these organisations face."More
Story image
WatchGuard uncovers top cyber threat trends of Q4 2020
“The rise in sophisticated, evasive threat tactics last quarter and throughout 2020 showcases how vital it is to implement layered, end-to-end security protections."More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More