The company will pay between $25,000 and $200,000 for exploits After years of reluctance to pay researchers for exploits, Apple has given in and is ready to hand out up to US$200,000 for critical vulnerabilities found in the latest version of iOS and the newest iPhones. Apple announced the program Thursday at the Black Hat security conference in Las Vegas. It starts in September, and unlike bounty programs run by other large technology companies it will be invite only. The program will start with a few dozen researchers hand-picked by Apple, though any outsider who submits a flaw that qualifies can receive a reward and be invited to join the program, said Ivan Krstić, the head of Apple Security Engineering and Architecture. “It’s not meant to be an exclusive club,” he said. Apple said it was willing to double the payouts for researchers who donate their reward to a charity. Rich Mogull, CEO of information security firm Securosis, noted that bug bounty programs can have downsides, and said it’s not something Apple necessarily had to do. But he said it’s a good start and something Apple can benefit from. Some companies “don’t really want to get into a bidding war with governments and well-funded criminal organizations, some of which are willing to potentially pay up to a million dollars for certain exploits,” Mogull said in a blog post. Public bug bounty programs can also produce a lot of noise in the form of low-quality reports that don’t necessarily lead to bug fixes, but that still consume engineering resources to investigate, he said. Mogull believes Apple’s program focuses on quality over quantity and has a clear objective: to find exploitable bugs in key areas of iOS that are considered a high priority. It also forces researchers to prove the impact of any flaws they find with working proof-of-concept exploits. That’s harder than simply submitting bugs that might be critical and leaving it to the company investigate. Apple will pay up to $200,000 for critical flaws in the secure boot firmware components, up to $100,000 for exploits that can extract confidential material from the Secure Enclave Processor — the secure chip that performs cryptographic operations in iPhone 5s and later, $50,000 for bugs that can result in arbitrary code execution with kernel privileges, $50,000 for ways to access iCloud account data on Apple’s servers without authorization, and $25,000 for vulnerabilities that provide access from inside a sandbox process to user data outside of that sandbox. This bounty structure reflects the difficulty of finding each of the five types of flaws, Krstić said. Apple hasn’t always had the best relationship with the security community. While many researchers acknowledge the solid security of Apple products, it has often been criticized for the way it communicates about security issues, or for not communicating enough. Apple is also one of the last big companies to launch a security rewards program. Vulnerabilities that can completely compromise iOS command some of the highest prices on the gray market. When iOS 9 came out, one exploit broker who counts government agencies among its customers offered $1 million for a browser-based jailbreak — an exploit that can gain root access to iOS simply by visiting a website. The FBI has also bought an iOS exploit from hackers in order to access the data on the locked iPhone of Syed Farook, one of the San Bernardino shooters. Asked by the audience at Black Hat why Apple waited so long to launch a bounty program, Krstić said the company has heard from researchers that finding critical vulnerabilities is increasingly difficult, and it wanted to reward those who take the time to do it. Related Video: Related content news F5 looks to squelch 'ball of fire' that is application security Updates include security scanning and penetration testing capabilities for web applications, as well as a new container-based web application firewall. By Michael Cooney May 01, 2024 4 mins Firewalls Network Security Networking news Arista targets lateral security threat in campus and data center networks Arista Macro-Segmentation Service sets up microperimeters for enterprise resource protection. By Michael Cooney May 01, 2024 3 mins Remote Access Security Network Security Networking brandpost Sponsored by Zscaler Breaches galore - why a proven platform for Zero Trust is needed Organizations need a proven platform for zero trust. But before we dive into why that is the case, we must first answer two important questions. By Zscaler Apr 30, 2024 8 mins Network Security brandpost Sponsored by Zscaler 4 reasons firewalls and VPNs are exposing organizations to breaches Yesterday’s solutions are today’s problems. By Zscaler Apr 30, 2024 11 mins Network Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe