Top Crypto Bounty and Ransom Payments Report

Top Crypto Bounty and Ransom Payments Report

The team at Immunefi, the leading security platform for crypto, has created a comprehensive crypto bug bounty report detailing the most important industry bug bounty payments to date, as well as ransom payments made by projects to malicious hackers to receive back a portion of stolen funds throughout 2022.

Immunefi has also included a high-level analysis of its own paid bug report database as a relevant overview of what the crypto bug bounty ecosystem looks like, as Immunefi is the industry leader and features the largest database.

Quick Facts

  • In total, $65,918,994 crypto bounty payments have been made through Immunefi. Of that number, $13,428,419 was paid in 2021, and $52,490,575 was paid in 2022.
  • The top five crypto bug bounty payments in the industry have brought a total of $21,700,042 in rewards to whitehat hackers alone.

The Bug Bounty: Web2 vs. Web3

Bug Bounty Programs, also known as Vulnerability Rewards Programs (VRP), are essentially open invitations to security researchers to discover and disclose potential software bugs and vulnerabilities in projects' websites and code in exchange for a reward, and in some cases additional recognition.

While the web2 ecosystem mostly does not have to worry about the direct loss of financial assets, the reality in web3 couldn't be more different. Incentives to exploit projects in web3 are significantly larger, due to the amount of capital that exists in smart contracts. Web3 is also unique because vulnerabilities in code can result in a direct loss of this capital.

This difference has led to a dramatic repricing of bug bounties in the web3 world, where they have quickly become the largest in the entire software industry by orders of magnitude. The goal of this repricing is to incentivize whitehats to responsibly disclose, rather than exploit, the vulnerabilities.

A $5,000 bounty payout for a critical vulnerability may work in the web2 world, for example, but it does not work in the web3 world. If the direct loss of funds for a web3 vulnerability could be up to $50 million dollars, then it makes sense to offer a much larger bounty size to incentivize good behavior.

A reliable incentivize system is more necessary than ever, as malicious hackers are continuously targeting vulnerabilities in (decentralized finance) DeFi smart contracts, which is a subset of the web3 industry. In fact, a recent report by Immunefi revealed that over $2.3 billion was already lost in DeFi this year alone to hacks and scams.

Additionally, web3 is a far more adversarial environment, which means every step of the bug bounty process works differently, from the submission and processing of a report, to the validation of a report, to the negotiation for a payout. Where traditional web2 bug bounties are a convenient bug fixing tool, web3 bug bounties are a far more critical emergency response system for DeFi projects. As such, cybersecurity has become a crucial component of market recognition in web3.

But how do web3 bug bounty payments compare to some of the most prominent conventional bounty programs?


Top 5 Bug Bounty Payments

The top five public crypto bug bounty payments in the industry have brought a total of $21,700,042 in rewards to whitehat hackers alone.

  • $10 million for a vulnerability discovered in Wormhole, a generic cross-chain messaging protocol.
  • $6 million for a vulnerability discovered in Aurora, a bridge and scaling solution for Ethereum.
  • $2.2 million for a vulnerability discovered in Polygon, a decentralized Ethereum scaling platform that enables developers to build scalable user-friendly dApps.
  • $2 million for a vulnerability discovered in Optimism, an Ethereum Layer 2 blockchain.
  • $1.5 million for a vulnerability discovered in Armor, a smart insurance-alternative for DeFi assets.

To put it into perspective, the Wormhole reward alone is larger than the total amount of bounties paid across all Google Vulnerability Reward Programs in 2021, at $8.7 million.


Immunefi Bounty Payments Analysis

Immunefi has released an overview of all paid bug reports processed through its platform to provide a comprehensive categorization of bug bounties in the crypto space. This report also separately includes a list of ransom payments that projects have paid to malicious hackers.

Immunefi classifies bugs on a simplified 5-level scale from Critical, High, Medium, Low, and Informational across Smart Contracts, Blockchain/DLT and Websites and Applications bug report submissions.

The development of the scale takes into consideration multiple factors that may affect a vulnerability and its likelihood of exploitation, but finalizes them largely by the impact that they cause.

Overview

Type

  • Vulnerabilities reported in Smart Contracts lead with a total of 728 submissions, accounting for 58.3% of paid reports.
  • Websites and Applications total 488 submissions, representing 39.1% of the total paid reports by type.
  • Blockchain/DLT total 32 submissions, representing 2.6% of the total paid reports by type.

Payments by Type

  • Smart Contracts take the lead with a total $59,113,273 in bounty payments, accounting for 89.6% of the total amount paid to whitehats.
  • Blockchain/DLT total $4,890,910, representing 7.4% of the total whitehat payouts paid to whitehats.
  • Websites and Applications total $1,914,811, representing 2.9% of the total whitehat payouts.

Severity

Low and critical severity reports take the lead, with 48.9% of the total paid bug reports.

  • Low severity bug reports total 306, representing 24.5% of submitted vulnerabilities, across paid reports.
  • Medium severity bug reports total 278, representing 22.3% of submitted vulnerabilities, across paid reports. An example of a medium vulnerability report includes the potentially exploitable Denial of Service (DoS) bug on Balancer.
  • High severity bug reports total 240, representing 19.2% of submitted vulnerabilities, across paid reports. Examples of high vulnerability reports include Pods Finance, for a logic error that allowed for theft of yield or abuse of the rewards system on the protocol, and Mushrooms Finance, for a MEV (miner-extractable value) attack with flash bots.
  • Critical bug reports total 291, accounting for 23.3% of submitted vulnerabilities, across paid reports. Examples of critical vulnerability reports include Wormhole, Aurora, Moonbeam, and Polygon, where significant amounts of user funds were directly at risk.
  • Vulnerabilities classified as Informational account for 10.7% across 133 paid reports.

Payments by Severity

  • Critical vulnerabilities take the lead with a total of $61,155,773, accounting for 92.7% of all bounties paid out.
  • High vulnerabilities total $2,875,627, representing 4.3% of the total bounties paid out.
  • Medium vulnerabilities total $1,149,623, representing 1.7% of the total bounties paid out.
  • Low vulnerabilities total $511,637, representing 0.7% of the total bounties paid out.
  • Vulnerabilities classified as Informational account for 0.3% of the total, amounting to $207,854 in bounty rewards paid out.

Ransom Analysis

Sometimes, a project gives an offer to the malicious hacker that they can keep a percentage of the stolen funds as long as they return the rest, in exchange for the project not legally pursuing the hacker.

Overview

Project Returned Ransom
Multichain $1 million $150,000
Optimism $13.6 million $2.4 million
XCarnival $1.8 million $1.85 million
Crema Finance $8.8 million $1.68 million
Moola Market $7.5 million $500,000

In total, malicious hackers have returned $32,700,000 illicitly gained from DeFi protocols across 5 specific situations in 2022. Hackers kept $6,445,000 in total ransom payments.


Download the full report here. For questions about this study or Immunefi itself, reach out at press@immunefi.com

About Immunefi

Immunefi is the leading security platform for crypto, protecting more than $180 billion in user funds, and securing protocols across the full development lifecycle, from pre-deployment through production.