Skip to main content

Intel enlists help of ‘elite hackers’ to exterminate bugs

Intel has announced an expansion of its Bug Bounty program with Project Circuit Breaker, a new initiative that is predominantly aimed at recruiting “elite hackers.”

The company wishes to form a community of hackers who will attempt to discover bugs in firmware, hypervisors, GPUs, chipsets, and more.

A depiction of a hacker from Intel's Project Circuit Breaker bug program.
Image source: Intel Intel

Project Circuit Breaker will provide time-boxed events for “specific new platforms and technologies.” Individuals who are involved in the initiative will receive training from Team Blue, which will create “opportunities for more hands-on collaboration with Intel engineers.”

Alongside the collaboration with Intel’s own software engineers, Project Circuit Breaker will allow participants to access new and prerelease products. The chip giant stresses that this will deliver “exciting new hacking challenges and opportunities to explore at unprecedented levels.” Those interested in enrolling in the program can do so on its website.

“Bug bounty programs are a powerful tool to continuously improve the security of our products,” said Tom Garrison, vice president and general manager of Client Security Strategy and Initiatives at Intel. “As we aim to develop the most comprehensive security features, we also realize the incredible value of deeper collaborations with the community to identify potential vulnerabilities and mitigate them for the ongoing improvement of our products.”

Twenty security researchers have already enrolled in Project Circuit Breaker’s first event, called Camping with Tigers, and all received systems equipped with Intel Core i7 processors (formerly Tiger Lake). The event itself, which was launched in December and will end in May, offers bounty multipliers that are triggered at three separate milestones when certain vulnerabilities are uncovered.

Intel added that Camping with Tigers “brings together world-class security researchers and our own product engineers to deepen testing and improve resiliency on our 11th Gen Intel Core processors.”

The Bug Bounty program was initially launched to the public in 2018. During 2021, 97 of 113 vulnerabilities that were discovered externally were reported through the initiative. It’s no surprise, then, that Intel is increasing its investment in the program. With “unprecedented access to early products” being emphasized in the announcement, the company is clearly trying to attract top talent who will most likely have access to upcoming PC components like Intel’s Arc Alchemist GPUs and its next-generation CPUs, dubbed Raptor Lake.

While the monetary value of finding bugs via the Project Circuit Breaker program has not been revealed, we have some idea of what kind of payments participants will be eligible to receive thanks to payout figures stemming from previous initiatives. For example, Intel’s Intigriti bug bounty program offers payout scales through three tiers.

The highest tier delivers rewards between $2,000 and $100,000 for locating vulnerabilities in hardware (microprocessors, chipsets, motherboards, and SSDs). The second tier involves bugs related to firmware, and pays out between $1,000 and $30,000, while the third tier offers payment ranging from $500 to $10,000 for detecting software defects.

Editors' Recommendations

Zak Islam
Former Digital Trends Contributor
Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the…
How to enable secure boot in Windows 11
Secure Boot setting in an ASUS BIOS.

Enabling Secure Boot is an important step in upgrading to Windows 11, as it's part of the system requirements. It ensures that unauthorized software can't run on your PC, and you will have to enable it before you install Windows 11 or it just won't work. Fortunately, enabling Secure Boot is as quick as changing a single BIOS setting.

Here's how to do it.

Read more
No, Intel’s Lunar Lake CPUs aren’t being delayed
Intel keynote.

Intel's hotly-anticipated Lunar Lake CPUs look like they're suffering a delay, at least according to a report from DigiTimes. The outlet, which covers semiconductor news, says that shipments of the chips are arriving in September and that they were originally planned for June. Intel says otherwise, however.

When Intel first announced Lunar Lake, it said they would arrive between July and September of this year. More specifically, the company pointed out that they'd be available before the holiday shopping season. If June was the original plan, we'd already have a lot more details about the processors. It looks like September was the target all along.

Read more
Hacker claims to have hit Apple days after hacking AMD
The Apple logo is displayed at the Apple Store June 17, 2015 on Fifth Avenue in New York City

Data breaches happen all the time, but when the giants get hit, it's impossible not to wonder what kind of critical data may become exposed. Earlier this week, notorious cybercriminal Intelbroker reported that they managed to hack AMD. Now, they followed up with claims about hacking Apple, and went as far as to share some internal source code on a hacking forum.

As Apple has yet to comment, all we have to go off is the forum post, first shared by HackManac on X (formerly Twitter). In the post, Intelbroker states that Apple suffered a data breach that led to the exposure of the source code for some of its internal tools. The tools include AppleConnect-SSO, Apple-HWE-Confluence-Advanced. There's been no mention of any customer data being leaked, which is good news, but there could still be some impact on Apple if this proves to be true.

Read more