Ethical Hackers Converge on U.S. Army

Between October 9 and November 15 the U.S. Army was hacked by 52 different hackers. While without further context that sounds bad for the health of our Nation’s armed services these particular hacks were part of the second “Hack the Army” event.

According to the Army’s press release, last year’s bug bounty challenge included more than 60 publicly accessible web assets. The purpose of the program was to “enhance the safety and security of these systems through crowdsourced security testing by an army of ethical hackers.”

It is our Duty

“It is our duty to ensure our citizens are protected from cyber threats, and finding new and innovative ways to do so is vital,” said Alex Romero, Digital Service Expert at Department of Defense Digital Service. “Our adversaries are determined and creative, so we must be every bit more of both. This latest HackerOne Challenge allows us to continue to harden the Army’s attack surfaces with the talent and diverse perspectives of HackerOne’s vetted hacker community.”

146 Vulnerabilities Found

The 5-week challenge drew hackers from the U.S., Canada, Germany, Portugal, Netherlands and Romania. In that short, intense time period 146 vulnerabilities were found and $275,000 in bounties paid.

Satisfying and Rewarding for All

On November 20, the challenge culminated in an awards ceremony in Augusta, Georgia where the top three hackers — @alyssa_herrera@erbbysam, and @cdl — were rewarded for their contributions.

“The Department of Defense programs are some of my favorites to hack on, and Hack the Army 2.0 was one of the most rewarding,” said second place winner @alyssa_herrera. “It is so exciting to know that the vulnerabilities I find go towards strengthening Army defenses to protect millions of people. Coming in second place and being invited to spend time with the hackers and soldiers I worked alongside made the impact we made in this Challenge feel even bigger.”

Discover Your Vulnerabilities for FREE

You don’t have to be the Department of Defense and pay hundreds of thousands in bug bounties to take advantage of the power of ethical hacking and penetration testing.

Our team of experts is happy to provide an outside, independent and unbiased analysis of your network’s security. Simply give us a call or click here:

You’ll receive a complimentary Executive Risk Assessment. This assessment will not only show you the risk and impact to your most critical digital assets but demonstrate the likelihood of a breach happening.

So whether it is a wide open IP Address, ransomware, brute force hacking, phishing or some other cyber threat, Konsultek has the tools and talent to develop the right security solution for your particular situation.

© Copyright 2018 Konsultek