Cyber Stress Testing

  • For hackers
    Help improve the security of major companies for generous rewards.
    Select program
  • For business
    See how well your organization is protected.
    Learn more

A legitimate way to test security, where you earn rewards not for single bugs, but for achieving a bigger goal—a non-tolerable event inside the company's infrastructure

Select program

Example tasks

  • Gaining database access

    Gaining database access

  • Compromising user or administrator accounts

    Compromising user or administrator accounts

  • Gaining access to bank accounts or financial transactions

    Gaining access to bank accounts or financial transactions

  • Obtaining full control over critical services

    Obtaining full control over critical services

Participate in cyber stress testing programs—solo or with a team—and earn up to ₽45M for a successful attackSelect program

How to participate in a cyber stress test

  • 01
    Choose a cyber stress testing
    program.
     
  • 02
    Decide how you'll participate:
    solo or as a team.
     
  • 03
    Review the program terms
    and conditions.
     
  • 04
    Perform an attack and submit
    your report.
     
Important!Before participating, carefully review the program terms. Cyber stress testing programs differ from bug bounty programs in that they have defined goals and deadlines. Typically, rewards are paid only for achieving a specific goal, which means that only the first hacker to cause the non-tolerable event will receive the reward.

Cyber Stress Testing stars

@remembernamer₽5.6M
@brain₽4M
@b4bay₽4M
@FedyaSyel₽2.5M
@Bagley₽2M

The tougher the challenge, the greater the reward

Earn up to 45M rubles for demonstrating a non-tolerable event.

View tasks
 
up to ₽45M

Cyber stress testing options

Cyber stress testing with Positive Technologies
View programs
Cyber stress testing with JSC Kiberispytanie
View programs

FAQ

  • A cyber stress test is a legal form of security testing where rewards are granted for achieving a specific objective—a non-tolerable event within the company's infrastructure. Examples of non-tolerable events include gaining access to a database or taking control of critical services.