Saturday, March 29, 2025
HomeBug BountyMeta's Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Published on

SIEM as a Service

Follow Us on Google News

Meta’s commitment to cybersecurity took center stage in 2024 as the tech giant awarded over $2.3 million in payouts to global security researchers participating in its bug bounty program.

Since its inception in 2011, the initiative has grown into a pillar of Meta’s defense strategy, with total payouts now exceeding $20 million.

This annual highlight reflects Meta’s ongoing collaboration with the security research community to enhance the safety and reliability of cutting-edge technologies like Generative AI (GenAI), augmented and virtual reality (AR/VR), and advertising tools.

The company celebrated these contributions at its annual Bug Bounty Summit and other high-profile security events throughout the year.

In 2024, Meta expanded its bug bounty program, bringing in nearly 10,000 reports from security researchers worldwide.

The company awarded bounties on around 600 valid submissions, sharing payouts with nearly 200 researchers from over 45 countries.

Notably, India, Nepal, and the United States emerged as the top three countries in terms of total bounties earned.

GenAI-Focused Research

Meta doubled down on engaging bug bounty researchers in its generative AI initiatives.

Building on its 2023 launch of generative AI features, the company encouraged submissions of security reports related to its large language models (LLMs).

Researchers were invited to assess privacy or security vulnerabilities, such as training data extraction through model inversion or other sophisticated tactics.

Meta credits its research community with providing impactful reports that bolster the integrity of its GenAI tools.

Strengthening Ads Tools and Hardware Security

Meta also targeted its ads audience tools and mixed reality hardware for security improvements.

It introduced specific payout guidelines for vulnerabilities in its advertising tools, offering maximum base payouts of $30,000 for critical issues involving personally identifiable information (PII).

On the hardware front, researchers identified potential issues in Quest devices and other AR/VR technologies.

Meta also showcased its cutting-edge hardware products at conferences like hardwear.io USA, enabling researchers to uncover and address vulnerabilities.

Meta continues to foster collaboration with its global bug bounty community.

In 2024, it hosted the Meta Bug Bounty Researcher Conference (MBBRC) in Johannesburg, South Africa, welcoming 60 top researchers.

The event saw over $320,000 in awards for notable contributions. Looking ahead, the 2025 MBBRC will take place in Tokyo, Japan, signaling Meta’s commitment to expanding its research engagement globally.

The program also celebrated long-time contributors like Philippe Harewood, who reached a 10-year milestone with over 500 valid reports.

His notable accomplishments include research on Instagram access token leaks and Ray-Ban Stories vulnerabilities.

As Meta continues its journey into 2025 and beyond, it remains dedicated to empowering researchers, providing resources for innovative security exploration, and maintaining its platforms’ safety for a global audience.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...