Power

Scoring $200K at the hacking event that almost didn’t happen

How HackerOne and Verizon Media pulled off a virtual event for 50 hackers from 13 countries.

HackerOne neon

HackerOne has put together 20 in-person hacking events over the last five years, but when coronavirus disrupted its plans for a Verizon Media event, they took it virtual.

Photo: Courtesy of HackerOne

The beginning of March for Jon Colston, like for many, was looking grim. The 44-year-old entrepreneur had to close down the mortgage startup he was developing as the economy took a beating from the coronavirus pandemic.

Fortunately, he had a side gig that was about to earn him a six-figure payday. Colston, who has a background in data analytics, taught himself the ins and outs of cybersecurity through videos and other online resources, and since late 2018, he had been moonlighting as an ethical hacker, helping companies find bugs in their code.

With other distractions gone, he quickly found himself doing freelance cybersecurity work at all hours of the day, up from about 10% of his time before the coronavirus outbreak began.

"My ritual for the last few weeks has been: wake up, roll out of bed and onto the computer, hack until I can't stay awake anymore, go to bed and repeat," Colston told Protocol last week. As a hacker he goes by nickname @mayonaise, and he lives in Las Vegas with his wife.

In early April, his dedication was rewarded. Verizon Media, which for the last several years has focused on building relationships with the ethical hacker community, held its live hacking event in partnership with bug bounty platform HackerOne. It was the first such virtual event for both organizations who decided to experiment with the new format due to the coronavirus pandemic. Verizon gave 50 hand-picked hackers from 13 countries access to some of its closely guarded code and paid them generously for any bugs they found.

"It was a playground," said Colston, who earned more than $200,000 from the event after reporting about 30 bugs. In total, Verizon Media paid out $673,988 in bounties. Colston credits about half of his success to a single, critical issue that he found on several servers. He declined to elaborate on the bug's details, but he said he's seen it affect several organizations since last May.

"I call it the MOAB, the mother of all bugs. It's everywhere, it's high in critical impact, it's across technologies," he said.

The weeklong virtual event was an "incredible success," said Luke Tucker, senior director of community at HackerOne.

And it almost didn't happen.

The event was originally scheduled to be in-person based around the Black Hat Asia cybersecurity conference at the beginning of April. Fifty of the top security researchers on HackerOne's platform would be flown to Singapore, where they would meet with Verizon Media's security team and prod part of its Yahoo product line. Verizon acquired most of Yahoo's internet business in 2017.

But by late February, with the RSA cybersecurity conference barely going off as planned, organizers from Verizon Media and HackerOne decided to pull the plug on an in-person event in Singapore.

"I remember we were on the curb at RSA, and we were talking about the current situation, where the virus was going, and we decided we didn't want to put any of the researchers or our employees at risk," said Sean Poris, director of product security at Verizon Media. "So we agreed at that moment we were going to have a zero-travel policy on our event."

"It was obviously the right decision to cancel the Singapore event," Tucker said. "And the second good decision was to make it virtual."

Making virtual lemonade

HackerOne has put together 20 in-person hacking events over the last five years with more than a dozen organizations, including Dropbox, Shopify and the U.S. Air Force. Live bug-hunting events have become an important way for companies to entice independent security researchers to help find problems in systems before criminal hackers do. Like many other organizations with in-person gatherings planned for this year, HackerOne was forced to completely rethink its playbook. Tucker said that HackerOne had brainstormed what adding a virtual element to its events would look like, partly inspired by esport competitions, but it didn't have plans to try it out anytime soon.

"We were trying to crack that nut and figure out the right way to roll out a live event experience that would be really dynamic and interesting, and then COVID-19 happened, and we were able to take the lemons of not going to Singapore and make lemonade," he said.

Pulling off a virtual hacking event poses unique technical challenges, unlike other virtual conferences or events. Organizers used a wide range of tools to make sure that the security researchers were able to collaborate with each other, share bugs with Verizon Media, and do everything in a way that would keep all the information confidential and out-of-reach from criminal hackers.

Verizon Media declined to provide details on the scope of the event, citing confidentiality, but the company informed the hackers of the specific products they would probe about two weeks before the event took place. During that gap, the hackers were encouraged to perform reconnaissance and testing in the same way that a criminal group might extensively surveil a network before trying to breach it.

"I was so excited about the targets we were given; it was a very rare opportunity that was provided to us, and I wanted to make the most of it," Colston said.

Hackers communicate on zoom Hackers communicate on Zoom during Verizon Media's virtual hacking event.Screenshot: Courtesy of HackerOne

For the event itself, organizers made use of a smorgasbord of remote work tools. Hackers used Slack, Zoom and Google Hangouts to communicate with each other and Verizon Media's security team. Organizers used Discord and Twitter to broadcast leaderboard positions and answer spectator questions about how to start a career in cybersecurity. At one point, hackers used the drawing website skribbl.io to take a break and play a mass game of Pictionary.

Although the event wasn't originally planned to be virtual, Verizon Media would consider doing similar competitions in the future, according to Poris. "It built a foundation we can launch from for future events," he said.

Another HackerOne customer has already signed up to hold a virtual live-hacking event in June, Tucker said, though he declined to name the company due to customer confidentiality agreements.

Pros: More participation, more concentration

Thanks to going virtual, organizers were also able to open the event up to many more people. Thousands of spectators — many of them students stuck at home — were able to watch the hackers and ask them questions through Twitch livestreams and YouTube videos. In-person events typically have educational workshops, Tucker said, but they're generally reserved to about 20 to 50 people invited from nearby schools.

"Where we really spent a lot of time was asking how do we open up the opportunity and provide a social experience to as many people as possible," he said.

Verizon Media was also interested in expanding the event's reach, in part to attract new employees, Poris said, adding that he's hired ethical hackers in the past. "There are way more openings in the security field than we have people. The more we can mentor and educate and get people pumped into the field to reduce that pressure overtime, [the better]," he said. He also wanted to "share our brand to researchers and have folks understand how important security is to us."

From the hackers' perspective, participating in a virtual event likely makes it easier to find bugs, Colston said. He was able to work from the comfort of his home, on his own workstation, and didn't have to deal with travel hassles or distractions.

"I'm one of those people that needs complete focus," he said. "I say I'm going into my hacker hole — time slips away, and I'm completely focused on what I want to achieve. That definitely helped out in submitting more reports."


Get in touch with us: Share information securely with Protocol via encrypted Signal or WhatsApp message, at 415-214-4715 or through our anonymous SecureDrop.


Cons: Outages, time zones and canceled karaoke

The event would end up having some unique challenges: A bug show-and-tell during the closing ceremony livestream, for example, was briefly knocked offline because the person hosting it from her home in Indiana had her power knocked out by a nearby tornado. Time zones were also difficult; participants came from 13 countries, including Argentina, Germany, Russia and New Zealand, so some hackers had to keep odd hours to take part in question-and-answer sessions and daily updates.

"One thing you lose in a virtual event is that there's something special about the concentration of security researchers, the HackerOne folks, and us all coming together physically and being able to break bread, chat, and argue about the merits of a given finding. That's just facilitated so much more in person. We really spent a lot of time thinking about how to create as close as possible that community feeling," Poris said.

Not everything could be re-created: Poris said he especially missed not being able to go out to karaoke with the hackers at the end of the event.

"It's become a tradition, and we missed that this year," he said. "But the closing ceremonies were really strong, and we recorded the show-and-tell sessions, which will help us understand what's going on in the minds of security researchers."

Fintech

Judge Zia Faruqui is trying to teach you crypto, one ‘SNL’ reference at a time

His decisions on major cryptocurrency cases have quoted "The Big Lebowski," "SNL," and "Dr. Strangelove." That’s because he wants you — yes, you — to read them.

The ways Zia Faruqui (right) has weighed on cases that have come before him can give lawyers clues as to what legal frameworks will pass muster.

Photo: Carolyn Van Houten/The Washington Post via Getty Images

“Cryptocurrency and related software analytics tools are ‘The wave of the future, Dude. One hundred percent electronic.’”

That’s not a quote from "The Big Lebowski" — at least, not directly. It’s a quote from a Washington, D.C., district court memorandum opinion on the role cryptocurrency analytics tools can play in government investigations. The author is Magistrate Judge Zia Faruqui.

Keep Reading Show less
Veronica Irwin

Veronica Irwin (@vronirwin) is a San Francisco-based reporter at Protocol covering fintech. Previously she was at the San Francisco Examiner, covering tech from a hyper-local angle. Before that, her byline was featured in SF Weekly, The Nation, Techworker, Ms. Magazine and The Frisc.

The financial technology transformation is driving competition, creating consumer choice, and shaping the future of finance. Hear from seven fintech leaders who are reshaping the future of finance, and join the inaugural Financial Technology Association Fintech Summit to learn more.

Keep Reading Show less
FTA
The Financial Technology Association (FTA) represents industry leaders shaping the future of finance. We champion the power of technology-centered financial services and advocate for the modernization of financial regulation to support inclusion and responsible innovation.
Enterprise

AWS CEO: The cloud isn’t just about technology

As AWS preps for its annual re:Invent conference, Adam Selipsky talks product strategy, support for hybrid environments, and the value of the cloud in uncertain economic times.

Photo: Noah Berger/Getty Images for Amazon Web Services

AWS is gearing up for re:Invent, its annual cloud computing conference where announcements this year are expected to focus on its end-to-end data strategy and delivering new industry-specific services.

It will be the second re:Invent with CEO Adam Selipsky as leader of the industry’s largest cloud provider after his return last year to AWS from data visualization company Tableau Software.

Keep Reading Show less
Donna Goodison

Donna Goodison (@dgoodison) is Protocol's senior reporter focusing on enterprise infrastructure technology, from the 'Big 3' cloud computing providers to data centers. She previously covered the public cloud at CRN after 15 years as a business reporter for the Boston Herald. Based in Massachusetts, she also has worked as a Boston Globe freelancer, business reporter at the Boston Business Journal and real estate reporter at Banker & Tradesman after toiling at weekly newspapers.

Image: Protocol

We launched Protocol in February 2020 to cover the evolving power center of tech. It is with deep sadness that just under three years later, we are winding down the publication.

As of today, we will not publish any more stories. All of our newsletters, apart from our flagship, Source Code, will no longer be sent. Source Code will be published and sent for the next few weeks, but it will also close down in December.

Keep Reading Show less
Bennett Richardson

Bennett Richardson ( @bennettrich) is the president of Protocol. Prior to joining Protocol in 2019, Bennett was executive director of global strategic partnerships at POLITICO, where he led strategic growth efforts including POLITICO's European expansion in Brussels and POLITICO's creative agency POLITICO Focus during his six years with the company. Prior to POLITICO, Bennett was co-founder and CMO of Hinge, the mobile dating company recently acquired by Match Group. Bennett began his career in digital and social brand marketing working with major brands across tech, energy, and health care at leading marketing and communications agencies including Edelman and GMMB. Bennett is originally from Portland, Maine, and received his bachelor's degree from Colgate University.

Enterprise

Why large enterprises struggle to find suitable platforms for MLops

As companies expand their use of AI beyond running just a few machine learning models, and as larger enterprises go from deploying hundreds of models to thousands and even millions of models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

As companies expand their use of AI beyond running just a few machine learning models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

Photo: artpartner-images via Getty Images

On any given day, Lily AI runs hundreds of machine learning models using computer vision and natural language processing that are customized for its retail and ecommerce clients to make website product recommendations, forecast demand, and plan merchandising. But this spring when the company was in the market for a machine learning operations platform to manage its expanding model roster, it wasn’t easy to find a suitable off-the-shelf system that could handle such a large number of models in deployment while also meeting other criteria.

Some MLops platforms are not well-suited for maintaining even more than 10 machine learning models when it comes to keeping track of data, navigating their user interfaces, or reporting capabilities, Matthew Nokleby, machine learning manager for Lily AI’s product intelligence team, told Protocol earlier this year. “The duct tape starts to show,” he said.

Keep Reading Show less
Kate Kaye

Kate Kaye is an award-winning multimedia reporter digging deep and telling print, digital and audio stories. She covers AI and data for Protocol. Her reporting on AI and tech ethics issues has been published in OneZero, Fast Company, MIT Technology Review, CityLab, Ad Age and Digiday and heard on NPR. Kate is the creator of RedTailMedia.org and is the author of "Campaign '08: A Turning Point for Digital Media," a book about how the 2008 presidential campaigns used digital media and data.

Latest Stories
Bulletins