Monday, April 28, 2025
HomeBug BountyCrowdfense Announced to Pay $3 Million Bug Bounty for iOS & Android...

Crowdfense Announced to Pay $3 Million Bug Bounty for iOS & Android Zero-day Exploits

Published on

SIEM as a Service

Follow Us on Google News

Crowdfense, a vulnerability research hub announced that they ready to pay $3 million USD per successful submission of iOS and Android zero-day vulnerability exploits.

In this year Crowdfense offering a larger 15M USD acquisition program to focus the important areas of research, inclusive of Networking Devices, WiFi/Baseband, and Messengers.

There are many researchers were paid nearly 10 million USD last year with this  “Vulnerability Research Hub” (VRH) online platform. 

- Advertisement - Google News

Successful submission of the previously unreported bug, exclusive capabilities would be eligible to receive bounty range from 100,000 USD to $3 million USD.

Crowdfense would like to receive the zero-days for Windows, MacOS, iOS, Android and other various platforms and they categorized the different price for each vendor.

Windows and macOS zero bugs reporter eligible to receive upto 1.5 million USD and they particularly expecting the Chrome and Safari RCE bugs that related to sandbox escape.

Crowdfense is willing to pay up to $1.5 million to $3 Million for iOS, Android zero-day exploit interaction with iOS and Android PE.

Also other zero-day exploits such as instant messengers, SMS/MMS RCE, Routers RCE, and WiFi/baseband RCE eligible to receive up to 100k to 1.5 million USD.

According to Crowdfense, Within this program, Crowdfense evaluates only fully functional, top-quality 0-day exploits.

Apart from this, Crowdfense offered free high-level technical training sessions to hundreds of vulnerability researchers around the world.

“The first Researcher to submit indisputable proof of a fully working chain within the scope of our public Bug Bounty program will receive a 10% bonus on his/her payout (if Crowdfense decides to buy). For a working partial chain, the bonus will be 5%, calculated on the agreed payout.” Clowdfense said.

Learn: Mastery Bug Bounty Bundle online Course

Also Read:

Hackers Earned More Than $19 Million in 2018 by Participating in Bug Bounty Programs

Safehats – The Best Alternative Bug Bounty Program for HackerOne and Bugcrowd

Netflix Launches Public Bug Bounty Program With Top Reward as $15,000

Intel Expands Bug Bounty Program Rewards To $250,000 for Meltdown and Spectre Like Vulnerabilities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...