Skip to content

๐ŸŽฃ The Curious Case of the Beg Bounty Bait โ€” or: Licence to Phish

Not every day do I get an email from a very serious security researcher, clearly a man on a mission to save the internet โ€” one vague, copy-pasted email at a time.

Hereโ€™s the message I received:

From: Peter Hooks <peterhooks007@gmail.com>
Subject: Security Vulnerability Disclosure

Hi Team,

Iโ€™ve identified security vulnerabilities in your app that may put users at risk. Iโ€™d like to report these responsibly and help ensure they are resolved quickly.

Please advise on your disclosure protocol, or share details if you have a Bug Bounty program in place.

Looking forward to your reply.

Best regards,
Peter Hooks

Right. Letโ€™s unpack this.


๐Ÿงฏ”Your App” โ€” What App?

I’m not a company. I’m not a startup. I’m not even a garage-based stealth tech bro.
I run a personal WordPress blog. Thatโ€™s it.

There is no โ€œapp.โ€ There are no โ€œusers at riskโ€ (unless you count me, and Iฬทฬ“ฬœโ€™ฬทฬ‹ฬ mฬดฬ“ฬช ฬดอฬนaฬธฬฝอ™lฬตฬฟฬฃrฬธฬฝอ‡eฬตฬˆอ–aฬถฬ‹อ–dฬตฬ‡อ“yฬดฬ‚ฬผ ฬดอ‚ฬ–bฬถฬ‹ฬ eฬถฬฬปyฬดอ„อ‡oฬธฬ’ฬฃnฬธฬฬฆdฬดฬ†ฬŸ ฬถอ’อ‰sฬถอ€อ…aฬถอ—ฬกvฬดอŠอ™iฬตฬŠอ–nฬตฬ†อ–gฬธฬ”ฬก).


๐Ÿ•ต๏ธโ€โ™‚๏ธ The Anatomy of a Beg Bounty Email

This little email ticks all the classic marks of what the security community affectionately calls a beg bounty โ€” someone scanning random domains, finding trivial or non-issues, and fishing for a payout.

Want to see how common this is? Check out:


๐Ÿ“ฎ My (Admittedly Snarky) Reply

I couldnโ€™t resist. Hereโ€™s the reply I sent:

Hi Peter,

Thanks for your email and your keen interest in my โ€œappโ€ โ€” spoiler alert: there isnโ€™t one. Just a humble personal blog here.

Your message hits all the classic marks of a beg bounty reconnaissance email:

  • โœ… Generic โ€œHi Teamโ€ greeting โ€” because who needs names?
  • โœ… Vague claims of โ€œsecurity vulnerabilitiesโ€ with zero specifics
  • โœ… Polite inquiry about a bug bounty program (spoiler: none here, James)
  • โœ… No proof, no details, just good old-fashioned mystery
  • โœ… Friendly tone crafted to reel in easy targets
  • โœ… Email address proudly featuring โ€œ007โ€ โ€” very covert ops of you

Bravo. You almost had me convinced.

Iโ€™ll be featuring this charming little interaction in a blog post soon โ€” starring you, of course. If you ever feel like upgrading from vague templates to actual evidence, Iโ€™m all ears. Until then, happy fishing!

Cheers,
Amedee


๐Ÿ˜ข No Reply

Sadly, Peter didnโ€™t write back.

No scathing rebuttal.
No actual vulnerabilities.
No awkward attempt at pivoting.
Just… silence.


#crying
#missionfailed


๐Ÿ›ก๏ธ A Note for Fellow Nerds

If youโ€™ve got a domain name, no matter how small, thereโ€™s a good chance youโ€™ll get emails like this.

Hereโ€™s how to handle them:

  • Stay calm โ€” most of these are low-effort probes.
  • Donโ€™t pay โ€” you owe nothing to random strangers on the internet.
  • Donโ€™t panic โ€” vague threats are just that: vague.
  • Do check your stuff occasionally for actual issues.
  • Bonus: write a blog post about it and enjoy the catharsis.

For more context on this phenomenon, donโ€™t miss:


๐Ÿงต tl;dr

If your โ€œsecurity researcherโ€:

  • doesnโ€™t say what they found,
  • doesnโ€™t mention your actual domain or service,
  • asks for a bug bounty up front,
  • signs with a Gmail address ending in 007

โ€ฆitโ€™s probably not the start of a beautiful friendship.


Got a similar email? Want help crafting a reply thatโ€™s equally professional and petty?
Feel free to drop a comment or reach out โ€” Iโ€™ll even throw in a checklist.

Until then: stay patched, stay skeptical, and stay snarky. ๐Ÿ˜Ž

1 thought on “๐ŸŽฃ The Curious Case of the Beg Bounty Bait โ€” or: Licence to Phish”

  1. @amedee these guys are so annoying indeed

Leave a Reply