NSF BUG HUNTER WINS BIG

1_DSC_8464%2bcopy https://www.defencepioneer.sg/images/default-source/_migrated_english/1_dsc_8464-copy.jpg?sfvrsn=79eb26bb_2 https://www.defencepioneer.sg/pioneer-articles/NSF-BUG-HUNTER-WINS-BIG
https://www.defencepioneer.sg/pioneer-articles/NSF-BUG-HUNTER-WINS-BIG
NSF BUG HUNTER WINS BIG
02 Nov 2019 | TECHNOLOGY

NSF BUG HUNTER WINS BIG

// Report by Thrina Tham

// Photos by Kenneth Lin

3SG Lim beat 304 white hat hackers around the world to emerge as Top Bug Hunter in MINDEF’s Bug Bounty Programme.

For three straight weeks, 3rd Sergeant (3SG) Eugene Lim would spend 10 hours a week searching for "bugs".

The Full-Time National Serviceman (NSF) would use his nights off hunting for system vulnerabilities in the Ministry of Defence’s second Bug Bounty Programme which ran from 30 Sep to 21 Oct this year.

His typical weekends saw him "hunting" from 11am to 6pm, followed by a quick meeting with his family or girlfriend, before hunting again until 2am in the morning.

His efforts paid off.

The 24-year-old topped a total of 305 white hat hackers, or ethical hackers, to emerge as the "Top Bug Hunter".

Defence Cyber Chief Brigadier-General Mark Tan (right) presenting the Top Bug Hunter award to 3SG Lim in a ceremony on 1 Nov.

The programme saw 134 local and 171 international white hat hackers invited to search for vulnerabilities (or bugs) in 11 of MINDEF's Internet-facing systems.

Participants reported 52 vulnerabilities, of which 20 were valid. 3SG Lim uncovered eight out of those 20 valid and unique vulnerabilities reported, which put him squarely in the lead among the hackers.

He also received an award for "First Reported Bug", which he found within the first hour of the programme opening.

His interest in cybersecurity was piqued when he took part in the first Army Cyber Defence Exercise last October. During the exercise, he would work with other cyber defenders to respond to online threats to defend simulated training networks.

3SG Lim (seated, third from left) taking part in the Army Cyber Defence Exercise last year. Chief of Army Brigadier-General Goh Si Hou (standing, third from left) also observed the exercise. [Photo: Singapore Army Facebook].

He then joined two Government Bug Bounty Programmes – this January and July – where he emerged as the top hacker in the second edition.

The self-taught hacker, who is a Supply Supervisor at the 12th Command, Control, Communications, Computers and Intelligence Battalion, said that it takes creativity to bypass protection tools (such as firewalls) that are set up by system administrators.

"They'll put a lock on the front door so you have to find another way – a window, an unlocked back door – to get yourself into the 'house'."

And it's a "thrill" to be able to get in, said 3SG Lim, who goes by the moniker SpaceRacoon online.

"It's a rush when you finally 'pop the shell', which is to be able control the server. There's a huge sense of achievement."

"For us white hat hackers, we would then submit proof (for the system administrator) to reproduce the bug themselves," said 3SG Lim, who graduated from Yale University last year with a Double Major in Computer Science and History.

3SG Lim, who will work as a civil servant after he completes his National Service on 31 Dec, is not shy about the fact that cybersecurity is his "primary hobby".

Earlier this year, he built a web app for scanning malicious packages, which he presented at Black Hat Asia (Arsenal), a convention on open source tools.

When asked on how he got into white hat hacking, he said: "I wanted to contribute to Singapore's cyber security and testing government systems was interesting to me."

"Being able to find vulnerabilities for MINDEF, as an NSF, was also a big motivation."

He added that his hobby has helped to foster a positive attitude: "If I meet an obstacle, I'll always think of ways around it.

"These problem-solving skills will be useful in any role I take on (in the future)."

Suggested Reading
Feature
LOCKED & LOADED: SAF SHOOTING CONTINGENT WEAPONS
TECHNOLOGY
26 Nov 2025

Take a closer look at the weaponry at this year’s ASEAN Armies Rifle Meet.

IN SERVICE OF THOSE IN NEED
PEOPLE
24 Nov 2025

MWO Sukhwinder Singh has built a career around delivering humanitarian aid and serving those in need.

LEARNING MORE ABOUT NS
COMMUNITY
23 Nov 2025

Over 200 women experienced a glimpse of National Service (NS) training at the Women’s Boot Camp, held from 21 to 23 November.

Feature
FROM MILITARY MUSICIAN TO MILITARY POLICEWOMAN
PEOPLE
20 Nov 2025

Second-generation soldier 3SG Nurin is writing her own story as a military policewoman in the SAF MP Command. 

Feature
THEY’VE GOT THEIR EYE ON THE BULLSEYE
PEOPLE
18 Nov 2025

The SAF Shooting Contingent must carry these qualities as they prepare to compete in the ASEAN Armies Rifle Meet (AARM) this year.

AI JOINS THE FIGHT IN NATIONAL CYBER DEFENCE EXERCISE
TECHNOLOGY
12 Nov 2025

AI and closer collaboration among agencies and industry are taking centre stage in this year’s Critical Infrastructure Defence Exercise (CIDeX).

DEFENCE IS EVERYONE’S BUSINESS
PEOPLE
06 Nov 2025

Whether it’s supporting NSmen in their NS commitments or volunteering in the SAF and empowering youths, 2SG (NS) Elliot Ang and SV2 Sheila Manokaran support our nation’s defence in their own ways.

Feature
FIRST IN, LAST OUT AT EX WALLABY 2025
OPS & TRAINING
06 Nov 2025

Meet the teams who toil behind the scenes to enable the smooth conduct of the SAF’s biggest unilateral overseas exercise.

Cover story
EXERCISE WALLABY 2025: TO SEE BETTER, SHOOT FASTER
OPS & TRAINING
31 Oct 2025

The SAF focuses on complex strike missions and multi-domain integration in Exercise Wallaby 2025, the 35th edition of its largest unilateral overseas exercise.

Feature
EX WALLABY 25 – GREATER INTEGRATION AND COMPLEXITY
OPS & TRAINING
25 Oct 2025

The 35th edition of the SAF’s largest unilateral overseas exercise is an opportunity for expanded scale and deeper integration towards an effective, networked fighting force.