Hackers Get Invite To Find Holes In Singapore Govt’s Digital Systems In 2nd Bug Bounty Exercise

Five highly used Internet-facing systems and websites such as the REACH and MFA sites will be subject to ethical hackers’ scrutiny for a month.

SINGAPORE: A second bug bounty programme targeting five Government systems and websites in Singapore is currently underway, according to a joint release by the Government Technology Agency of Singapore (GovTech) and Cyber Security Agency of Singapore (CSA).

Issued on Friday (Dec 21), both agencies said they will partner local and overseas ethical, or white hat, hackers to search for vulnerabilities in these systems in return for rewards.

The five highly used systems are: the Gov.sg website, the REACH website, Ministry of Communications and Information’s Press Accreditation Card Online, the Ministry of Foreign Affairs (MFA) website and MFA’s

Rewards for vulnerabilities found can range from US$250 to US$10,000 depending on its severity, and reported bugs will be addressed by the relevant organization, the release said.

US-based HackerOne is again running the programme for the Government and it will last three weeks. It conducted one for the Ministry of Defence last December, which saw it pay out US$14,750 in bounties to 17 successful hackers who participated.

“The Government Bug Bounty Programme is part of the Singapore Government’s ongoing efforts to build a secure and resilient Smart Nation,” GovTech and CSA said.

“With cyber attacks growing in scale and complexity, the (programme) will help to build an innovative cyber ecosystem, draw in a wide range of expertise to help identify the Government’s cyber blind spots, and benchmark its defenses against skilled global hackers.”

Key findings from this exercise will be shared next March and such bug bounty programmes will be expanded to include more Government IT systems in future, they added.

 

View Source Here

Posted in Blog, News and tagged , , , , , , , , , , , .

Leave a Reply

Your email address will not be published. Required fields are marked *