Preliminary Results Indicate ‘Hack the Army’ a Success

snagfilms-a.akamaihd-1.net635701513298324901-cyber-39e5a9475124b3dfdb8d655a85ff058880e1e8d9

One of the main firms associated with the Hack the Army effort released the results of the service’s first bug bounty program.

In a blog post published Jan. 19, HackerOne said from Nov. 30 to Dec. 21:

  • 371 eligible participants registered.
  • 416 total reports were received.
  • 118 total valid reports were received
  • It took five minutes to receive the first vulnerability report.

HackerOne touted the preliminary results posted on their website as a success. Twenty-five of the 371 eligible and invited were government employees including 17 military personnel — a difference in the original Hack the Pentagon initiative.

An estimated $100,000 in bounties was paid to hackers.

HackerOne said the most significant vulnerability discovered was a series of chained vulnerabilities in which a researcher could move from the public-facing goarmy.com to an internal Department of Defense website requiring special credentials.

HackerOne also promised more to come from this effort.

Like the Defense Digital Service — a Silicon Valley-modeled node within the Pentagon focused on difficult problems, such as Hack the Pentagon — the Army and Air Force have stood up their own iteration.