Cyber Stress Testing
- Learn moreFor hackersHelp improve the security of major companies for generous rewards.
- Launch a programFor businessSee how well your organization is protected.
Ongoing assessment of your cyber resilience
Sign up for a cyber stress testWhat cyber stress testing gives you
How much would real hackers
be willing to hack you for?
To determine the right reward for security researchers, it's crucial to understand
how much real attackers are paid for similar exploits.
1–5mln rubles
Novice cybercriminals
Can only exploit known threats
5–20mln rubles
Financially motivated cybercriminals or hacktivists
Can use and enhance publicly available tools
20–50mln rubles
Financially motivated cybercriminals or hacktivists
Can use complex specialized software, effectively apply post-exploitation techniques, bypass security measures, and conceal traces of their attacks
50–100mln rubles
Highly skilled attackers
Can develop specialized tools, search for and exploit 0-day vulnerabilities, use native OS tools for attacks, and evade detection
100+mln rubles
State-backed APT groups
Extremely sophisticated attackers with unlimited funding, time, and advanced technologies, capable of recruiting highly specialized experts
Choose how to measure
your cyber resilience
Getting started
with cyber stress testing
- 01Eliminate common vulnerabilities
Enhance team cohesion and improve vulnerability management processes by testing your services on Standoff Bug Bounty. This step is recommended by the Standoff team, as it helps address infrastructure weaknesses that hackers will likely exploit first.
- 02Prepare the program
Define your company's non-tolerable events so researchers can test how likely they are. Set the rules of your cyber stress testing program.
- 03Run the cyber stress test
You can launch your program on the Standoff Bug Bounty platform in either public or private mode. After the program launch, security researchers look for penetration paths and report attack chains that lead to full or partial realization of non-tolerable events.
- 01Eliminate common vulnerabilities
Enhance team cohesion and improve vulnerability management processes by testing your services on Standoff Bug Bounty. This step is recommended by the Standoff team, as it helps address infrastructure weaknesses that hackers will likely exploit first.
- 02Prepare the program
Define your company's non-tolerable events so researchers can test how likely they are. Set the rules of your cyber stress testing program.
- 03Run the cyber stress test
You can launch your program on the Standoff Bug Bounty platform in either public or private mode. After the program launch, security researchers look for penetration paths and report attack chains that lead to full or partial realization of non-tolerable events.
Examples of non-tolerable events

Online store downtime or shutdown

Loyalty program fraud via reward management system

Failure or downtime of production facilities and equipment

Disruption or unavailability of client services

Loss of source code libraries used in development

Distortion of information on official resources
Cyber Stress Testing leaders
- MAXVK
323 days
Cyber stress test duration
₽10M
Reward amount
- RuStoreVK
1283 days
Cyber stress test duration
₽3.6M
Reward amount
- VKontakteVK
1381 days
Cyber stress test duration
₽3.6M
Reward amount
Take the first step
Protect your business from cyberthreats before attackers strike.
FAQ
- Every researcher works under contract with the Standoff Bug Bounty platform, creating a clear customer–platform–researcher framework.