_________ ________ ___ ________ |\___ ___\|\ __ \ |\ \ |\ __ \ \|___ \ \_|\ \ \|\ \\ \ \\ \ \|\ \ \ \ \ \ \ _ _\\ \ \\ \ ____\ \ \ \ \ \ \\ \|\ \ \\ \ \___| \ \__\ \ \__\\ _\ \ \__\\ \__\ \|__| \|__|\|__| \|__| \|__|
🛡️ Threat Research Incentive Program
To be eligible for a bounty payout, you must follow these instructions exactly:
1. Submit only an encrypted ZIP file containing your sample(s) and submission details.
2. The ZIP file must be password-protected with the password: infected
3. Inside the ZIP file, include a text file named submission.txt
with the following information:
Please fill out the following in your submission.txt
file:
Name: Email: Summary of Submission: (Explain what this includes—e.g., malware name, variant, infrastructure insights, behavioral techniques, etc.) Additional Notes: (Anything else we should know?)
submission.txt
will not be eligible for bounty payout.submission.txt
.
1
or drag-and-drop files into this browser window.
2
The file uploads will begin. Wait until they complete.
3
We will contact you after submission.
The file uploads will cancel if you move away from this page before they complete.