IntegraXor offers unique bug bounty program, receives stiff criticism for prize offering Bug bounty programs are rather popular these days. Companies such as Google, Microsoft, and Mozilla pay respectable amounts of money to researchers who disclose vulnerabilities to them. While the argument can be made that some vulnerabilities are worth far more on the open market than the bounty paid, most vendors respect this and offer as much as they can, but do so knowing they can’t compete with many organizations.With that said, when word of a new bounty program spreads, there’s usually a good deal of attention paid to it in the InfoSec world, and a measure of positive reinforcement from the research community. That wasn’t the case last week when SCADA vendor IntegraXor announced their bug bounty program for IntegraXor SCADA.[The SCADA security survival guide]In fact, one notable researcher — Chris Soghoian — called the program pathetic, agreeing with the opinion of Vupen’s (a provider of exploits and vulnerability research) Chaouki Bekrar.The program offers payments in the form of product credit, good towards the purchase of software licenses. The value of these payment vouchers range from $149.00 USD up to $3999.00 USD. Researchers who claim one of the bounties may resell it on the IntegraXor forum or other locations. Not everyone agrees with the criticism. Terry McCorkle, technical director for Cylance, said the bounty is interesting, noting that the company confirmed as much on their blog. As it turns out, when IntegraXor launched the program in order to make their software safer, they didn’t intend it to be for anyone but customers.“The reason behind this is straightforward, we wish to start the program small. But it turns out attracts so many talk about among respectable security researchers. We wish to accept all critics humbly and will improve the program wherever appropriate and whenever possible,” the company said. However, even if the program is for customers only, the limitations are almost overly restrictive. Customers who wish to take part in the program cannot report bugs in beta software or release-candidate versions of the software. Also, fuzzing isn’t an option, as the program rules state that random strings of data into the software’s various fields “that could possibly crash/hang the program will not be qualified.”Likewise, there is conflicting instructions, another issue that some researchers pointed out as problematic. The program’s rules state that Spam or DoS attacks are not an option, while listing reward schemes for bugs that cause the program to hang or crash — also known in some circles as a Denial of Service condition.“They’re going to have to figure out what works, what doesn’t work. I don’t know why they’d set the exclusions they have, or why they would be saying you can’t touch a beta — I’d imagine that’s the place most people will instantly go to. If they’re interested in finding bugs there’re going to go after the newest version of the software,” McCorkle commented.[Securing SCADA systems still a piecemeal affair]However, the blowback and the limitations implemented by IntegraXor may have another unintended consequence because they’ve painted a target on themselves and their product, said McCorkle.“This policy has let the hacker community know that [IntegraXor doesn’t] truly understand what a bug program looks like or how bugs work. They’re shining more of a light on their vulnerabilities, and the reality is the hackers arent going to go sell their bugs to them, they’re going to go sell their bugs to some other agency,” McCorkle added.The bounty program from IntegraXor may have its flaws, but McCorkle pointed out in his interview that the ICS industry is not mature when it comes to security programs, so coming up with a solid bounty program is going to take some work. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe