Around 300 selected white hat hackers from around the world will have the opportunity to test major MINDEF (Ministry of Defence, Singapore) Internet-facing systems for vulnerabilities (or “bugs”), and will receive rewards (or “bounties”) for doing so, as part of the MINDEF Bug Bounty Programme. This is the first time a Singapore Government agency is engaging in such an exercise.
The Programme was announced by the Ministry of Defence (MINDEF)’s Defence Cyber Chief, Mr. David Koh (he is also Chief Executive of Singapore’s Cyber Security Agency), on the sidelines of his visit to the Cyber Defence Test and Evaluation Centre (CyTEC) earlier today.
White hat hackers are computer security specialists who break into protected systems and networks to test and assess their security. These hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
MINDEF has engaged HackerOne, a reputable international bug bounty company, to run the programme. The programme will be conducted from 15 January to 4 February 2018, involving eight selected Internet-facing systems. The firm was also engaged by the United States Department of Defense to run their bug bounty programme in 2016, which unearthed and resolved more than 138 unique vulnerabilities.
The SAF’s (Singapore Armed Forces) operational systems, which are not Internet-facing, will not be included in the programme.
The eight Internet-facing systems involved in the programme are:
- MINDEF Website (Ministry of Defence website)
- NS Portal – e-Services for NSFs (National Servicemen Full-time) and NSmen (National Servicemen)
- CMPB Website (Central Manpower Base website)
- DSTA Website (Defence Science and Technology Agency website)
- eHealth Portal for MINDEF/SAF personnel for medical purposes
- Defence Mail – Public Internet email service for MINDEF/SAF personnel
- LearNet 2 Portal – Learning resource portal for trainees
- myOASIS Portal – NSmen administration portal
Hackers will be financially rewarded for disclosing valid and unique vulnerabilities to MINDEF, with more critical vulnerabilities receiving larger bounties. The reward can range from about S$150 to about S$20,000 based on previous programmes organised by HackerOne. The total amount paid out in rewards is dependent on the number and quality of the vulnerabilities discovered, and is expected to cost significantly less than hiring a dedicated commercial cybersecurity vulnerability assessment team.
The press release from MINDEF explains that Singapore is constantly exposed to the increasing risk of cyberattacks, and MINDEF is an attractive target for malicious cyber activity. As hackers with malicious intent find new methods to breach networks, MINDEF must constantly evolve and improve its defences against cyber threats.
Mr. Koh emphasised the importance of strengthening Singapore’s cyber defences amidst this changing landscape and said that the programme, utilising crowdsourcing, is one such innovative and effective way of doing so.
He said, “This is the first time that MINDEF is launching such a bold programme… White hat hackers participating in this programme will be given the mandate to ‘hack’ MINDEF, to find bugs in our major Internet-facing systems… For each valid and unique bug that the hacker finds, he will receive a bounty.”
Mr. Koh said that it is not possible to fully secure modern computer software systems, and new vulnerabilities are discovered every day. Hence, the need for such a programme. He added that due to the fast-changing cyber landscape, no agency can keep up by itself and even large companies use this effective and fast crowdsourcing approach.