Homeland Security Expands Its Hack DHS Bug Bounty As Log4j Threat Intensifies
If you're reading this, you probably don't need to be told that a "bug bounty" is a cash prize paid to security researchers that find a software exploit. Non-USians might need to be told that "DHS" refers to the United States Department of Homeland Security. "Hack DHS" is the bug bounty program run by the agency, and "Log4j" is a super-popular logging package used by thousands of applications that was recently hit by a critical security exploit. We all up to speed now?
Kidding aside, whether you're a regular reader of HotHardware or not, you're surely well aware of the "Log4shell" security exploit. First discovered as a chat prank in Minecraft, it was quickly found that the flaw extended to a whole lot more than just a blocky survival game. CISA, the US agency in charge of cybersecurity threats (and a subdivision of the DHS), is still on all-hands alert over the flaw, and Microsoft even remarked that state-sponsored hackers around the world are trying to exploit Log4shell. AMD, NVIDIA, and Intel put out advisories for it, too.
The DHS set up the Hack DHS program just a week ago. The group didn't say that it was in response to the Log4shell vulnerability, but it was several days after that flaw was publicly disclosed. (Then again, the US government doesn't do anything that quickly.) The program, rather than being an open bug bounty like those offered by many private companies, is instead a closed program only open to "vetted cybersecurity researchers" on an invitational basis. The DHS will ask these "hackers" to investigate specific external DHS systems and identify vulnerabilities.
Hack DHS is taking place throughout FY 2022 in three phases. In phase one, security researchers will "conduct virtual assessments on certain DHS external systems," and then in phase two, they'll participate in "a live, in-person hacking event." Finally, in the third phase, the DHS will identify and review the data, then perhaps plan for future bug bounty programs.
Of course, you have to be pre-selected for the Hack DHS program to be eligible for the bounties, which range up to $5,000 per bug. DHS says it will verify the flaws within 48 hours of discovery and that they will be fixed in 15 days, or possibly more if the bugs are particularly severe. If you'd like to see what CISA has to say on the topic of Log4shell and related exploits, the agency maintains a page for vulnerability guidance.