Apple Introduces $2M Bug Bounty for Spyware-Level Exploits - MacRumors
Skip to Content

Apple Introduces $2M Bug Bounty for Spyware-Level Exploits

Apple has announced a major overhaul of its bug bounty program that doubles the top reward to $2 million for exploit chains that can match the sophistication of mercenary spyware attacks.

bug security vulnerability issue fix larry
With bonuses for Lockdown Mode bypasses and vulnerabilities found in beta software, Apple says its total payouts could exceed $5 million. The company claims this represents "the largest payout offered by any bounty program."

The program now places greater emphasis on complete exploit chains rather than individual vulnerabilities, reflecting the reality that real-world attacks typically chain multiple bugs together. The rewards for remote-entry vectors have also been substantially increased, although categories not commonly seen in actual attacks will receive lower payouts.

As part of the overhaul, Apple is introducing "Target Flags," which are inspired by capture-the-flag games. When a researcher successfully exploits a vulnerability, they can capture a specific flag that proves exactly what level of access they achieved, such as code execution or arbitrary read/write capabilities.

These flags can be verified by Apple, so researchers who submit reports using them can receive notification of their bounty award immediately after Apple validates the captured flag. The payment is also issued in an upcoming payment cycle, meaning researchers won't have have to wait until Apple releases a software fix, which can take months. Previously, researchers often had to wait for Apple to patch a vulnerability before receiving payment.

The updated program comes into effect from November 2025. Apple is also expanding categories to include one-click WebKit sandbox escapes worth up to $300,000 and wireless proximity exploits over any radio worth up to $1 million. A complete Gatekeeper bypass on macOS now earns $100,000.

More information on the changes can be found on Apple's Security Research website. Apple says it has paid out over $35 million to more than 800 researchers since launching the public program in 2020.

Popular Stories

apple lock security bug vulnerability fix privacy

Apple Warns Canada's Bill C-22 Could Force Encryption Backdoors

Friday May 8, 2026 4:22 am PDT by
Apple and Meta have opposed a Canadian bill that the companies say could force them to create backdoor access to encrypted user data, should it pass through the country's parliament. Proposed by Canada's ruling Liberal Party, Bill C-22 contains provisions that could be similar ​to a UK data access provision order sent to Apple last year, depending on how they are implemented. Back in Feb...
Apple Event Logo

Apple's Next Era Begins September 1

Thursday May 7, 2026 10:36 am PDT by
Apple recently announced that Tim Cook will be stepping down as CEO later this year, after 15 years of leading the company. Effective September 1, Apple's hardware engineering chief John Ternus will become the company's next CEO, while Cook will become executive chairman of Apple's board of directors. In his new role, Apple said Cook will assist with "certain aspects" of the company,...
Instagram Feature 2

PSA: Instagram Encrypted Messaging Ends on Friday, May 8

Tuesday May 5, 2026 8:24 am PDT by
Instagram will remove end-to-end encryption for direct messages between users from May 8, 2026. When the date comes around, Meta will potentially be able to see the contents of all messages between users on the social media platform. Encrypting messages has been an optional feature in Instagram since 2023, but in March of this year the social media platform quietly updated a help page to say ...

Top Rated Comments

8 months ago
This is a great program and these updates make it much more enticing to people to find exploits. It's good to see Apple's focus on improving security.
Score: 20 Votes (Like | Disagree)
8 months ago
iOS 26 is the biggest exploit. award me now.
Score: 19 Votes (Like | Disagree)
Macusercom Avatar
8 months ago
Great program, worst execution. There have been so many exploits that have been disclosed and those who find it do not get even remotely what Apple promises them. This is the reason many exploits remain hidden and get sold to higher bidders
Score: 16 Votes (Like | Disagree)
8 months ago
This is why I trust Apple with my personal data.
Score: 14 Votes (Like | Disagree)
Mac Fly (film) Avatar
8 months ago

This is why I trust Apple with my personal data.
CompanyProgram NameMax Reward (USD)Notes
AppleApple Security Bounty$2,000,000For zero-click spyware exploit chains (effective Nov 2025); previously $1M.
GoogleVulnerability Reward Program$1,500,000For full-chain zero-click RCE in Android; up to $3.1M for Chrome sandbox escapes.
MicrosoftMicrosoft Bounty Programs$250,000For critical RCE in Hyper-V or Azure; varies by product (e.g., $100K+ for Edge).
MetaMeta Bug Bounty$300,000For mobile RCE exploits; focuses on privacy/compromise in apps like Facebook/Instagram.
IntelIntel Bug Bounty$100,000For critical hardware RCE; lower for software-only issues.
Honestly I trust none of them. Fully, no way.
Score: 12 Votes (Like | Disagree)
WarmWinterHat Avatar
8 months ago

Can you give some examples of those?
https://9to5mac.com/2025/07/31/apple-security-bounties-pay-up-to-2m-but-it-only-paid-1k-for-a-critical-bug/
Score: 10 Votes (Like | Disagree)