Connect with us


Apple awards $288,500 to hackers for discovering 55 flaws

The hacker group spent about three months hacking into Apple’s system.



Apple Fifth Avenue

Apple has awarded $288,500 to a group of five hackers for discovering 55 defects in its platform. Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes spent about three months hacking into the company’s system to discover security vulnerabilities.

During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would’ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim’s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.

All the reported flaws varied in severity: 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity. Some of these vulnerabilities were resolved in just few hours, while some remediated within 1-2 business days. As of Thursday, October 8, the group had received 32 payments from Apple totaling $288,500 for various vulnerabilities reported.

Since no-one really knew much about their bug bounty program, we were pretty much going into unchartered territory with such a large time investment. Apple has had an interesting history working with security researchers, but it appears that their vulnerability disclosure program is a massive step in the right direction to working with hackers in securing assets and allowing those interested to find and report vulnerabilities.

Since last year, Apple has been actively investing in its bug bounty program, which offers up to one million dollars per vulnerability depending on the severity of the issue. You can read the comprehensive post on Sam Curry’s blog.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *