{"type":"document","data":{"id":"9aee6c1d-89d4-44c5-81d0-4d0f6d12a84a","localeString":"en-GB","publishDate":"2026-04-15T09:18:38.482+02:00","contentType":"onecms:productPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Help ons de veiligheid en betrouwbaarheid van onze systemen te verbeteren. Meld kwetsbaarheden."},"mainHeaderZone":{"componentType":"productHeader","coreHeader":{"body":"Are you a security expert and have you found a vulnerability in our systems? Let us know. By reporting it, you are helping us improve the safety and reliability of our services together.","headerImage":{"transformBaseUrl":"https://assets.ing.com/transform/04e09918-9f79-4fb4-87dd-6f9ed98a6eb7/Tile_720x384_25Kb_step_tcm162-224456","type":"image","width":720,"original":"https://assets.ing.com/m/21cde5b169c6433/original/Tile_720x384_25Kb_step_tcm162-224456.jpg","extension":"jpg"},"title":"Reporting vulnerabilities","subtitle":"Responsible disclosure"},"backLink":{"textLink":{"url":"/en/bank/safe-banking/what-we-do","text":"ING security policy"}}},"flexZone":{"flexComponents":[{"componentType":"paragraph","title":"ING and security","richBody":{"value":"<p><span><span><span><span><span><span><span><span>At ING, keeping online banking safe and our digital services running smoothly is a top priority. Day and night, our specialists work hard to improve our systems and processes. Even with all the effort we put into security, vulnerabilities can still exist. That is why we take every report seriously.</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>Do you have the right skills to discover vulnerabilities in our systems? </span></span></span></span></span></span></span></span><span><span><span><span><span><span><span><span>You can help b</span></span></span></span><span><span><span><span>y reporting them to us</span></span></span></span><span><span><span><span>. This way, you are</span></span></span></span><span><span><span><span> helping</span></span></span></span><span><span><span><span> by</span></span></span></span><span><span><span><span> make our systems safer and more reliable.</span></span></span></span><span><span><span><span> If you’re the first to report a vulnerability and haven’t gone public with the problem, you’re eligible for a reward. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>Our team of security experts will look into your report. You</span></span></span></span><span><span><span><span> will </span></span></span></span><span><span><span><span>get an initial response by email within two working days. Sometimes it might take a bit longe</span></span></span></span><span><span><span><span>r, l</span></span></span></span><span><span><span><span>ike during busy periods, holidays or if we</span></span></span></span><span><span><span><span> are </span></span></span></span><span><span><span><span>short-staffed.</span></span></span></span></span></span></span></span></p>"}},{"componentType":"paragraph","title":"What this program is not intended for?","richBody":{"value":"<ul><li><a href=\"https://www.ing.nl/de-ing/over-ing/klachten\">Complaints</a> <span><span><span><span><span><span><span><span>about INGs services or products</span></span></span></span></span></span></span></span></li><li><a href=\"https://www.ing.nl/de-ing/over-ing/klachten\">Questions or complaints</a> <span><span><span><span><span><span><span><span>with ING websites, the mobile app or online banking</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Problems with ATMs or </span></span></span></span><span><span><span><span>cash machines</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Fraud or suspected fraud</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Phishing emails or fake messages</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Viruses or malware </span></span></span></span></span></span></span></span></li></ul>"}},{"componentType":"paragraph","title":"International laws and regulations","richBody":{"value":"<p><span><span><span><span><span><span><span><span>Laws around reporting vulnerabilities can vary from country to country. Please make sure you are aware of the local rules that apply to your situation. In some places, investigating our IT systems might be considered a criminal offence. You could risk prosecution under local or international law. If you have found a vulnerability on one of our ING pages, keep in mind that local laws always take priority over INGs guidelines. That said, if you act in good faith and follow INGs rules, we will not report your actions to the authorities unless we are legally required to.</span></span></span></span></span></span></span></span></p>"}},{"componentType":"paragraph","title":"Your privacy","richBody":{"value":"<p><span><span><span><span><span><span><span><span>We only use your personal data to follow up on your report. We won’t share it with anyone else unless we are legally required to do so, or if we ask another company to help investigate your report. In that case, we will make sure they treat your data with the same level of care and confidentiality as we do.</span></span></span></span></span></span></span></span></p>"}},{"componentType":"paragraph","title":"How can you make a report?","richBody":{"value":"<p><span><span><span><span>You can report the vulnerability by email:</span></span></span></span><a href=\"mailto:responsible-disclosure@ing.nl\">responsible-disclosure@ing.nl</a>. <span><span><span><span><span><span><span><span>To send an email to this address, you </span></span></span></span><span><span><span><span>willl</span></span></span></span><span><span><span><span> need to encrypt your message using our </span></span></span></span></span></span></span></span><a href=\"https://www.ing.nl/media/ING_PGP-key_tcm162-74965.zip\">public PGP key (zip)</a> <span><span><span><span><span><span><span><span>Write your report clearly and concisely. Make sure to include:</span></span></span></span></span></span></span></span></p><ul><li><span><span><span><span><span><span><span><span>The steps you took</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>The full URL</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Any objects involved (like input fields or filters)</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Proof of how to reproduce it (video or screenshot if possible)</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>The risk or chance of someone exploiting the vulnerability</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>You are welcome to suggest a fix: it’s not required, but it’s </span></span></span></span><span><span><span><span>definitely appreciated</span></span></span></span><span><span><span><span>.</span></span></span></span></span></span></span></span></li></ul><p><span><span><span><span><span><span><span><span>Our specialists will read your report and work on the vulnerability immediately.</span></span></span></span></span></span></span></span></p>"}},{"componentType":"paragraph","title":"What can you report?","richBody":{"value":"<p><span><span><span><span><span><span><span><span>Examples of vulnerabilities that can be reported:</span></span></span></span></span></span></span></span></p><ul><li>Remote Code execution</li><li>Cross Site Scripting (XSS)-<span><span><span><span><span><span><span><span>vulnerabilities</span></span></span></span></span></span></span></span></li><li>Cross Site Request Forgery (CSRF) <span><span><span><span><span><span><span><span>vulnerabilities</span></span></span></span></span></span></span></span></li><li>SQL injection <span><span><span><span><span><span><span><span>vulnerabilities</span></span></span></span></span></span></span></span></li><li><p><span><span><span><span><span><span><span><span>Vulnerabilities related to encryption</span></span></span></span></span></span></span></span></p></li><li><span><span><span><span><span><span><span><span>Unauthorized access to data</span></span></span></span></span></span></span></span></li></ul>"}},{"componentType":"paragraph","title":"What cannot be reported","richBody":{"value":"<ul><li><span><span><span><span><span><span><span><span>All claims without a clear analysis with evidence of possible exploitation.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Vulnerabilities found on sites of organizations that are no longer part of ING (former business units)</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span>Our policy regarding the presence or absence of SPF/ DKIM/DMARC records</span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Cross Site Request Forgery (CSRF) vulnerabilities on static pages (only on pages after login)</span></span></span></span></span></span></span></span></li><li>Redirection from HTTP to HTTPS</li><li>HTML does not specify charset</li><li>HTML uses unrecognized charset</li><li>Cookie zonder HttpOnly vlag</li><li><span><span><span><span><span><span><span><span>No use of HTTP Strict  Transport Security (HSTS)</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Clickjacking or the absence of X-Frame-Options on non-login pages</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Saved Page HTTPS response pages on websites where no online payments transactions are present</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>User enumeration on websites where no online payments transaction are available</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Possibly outdated server or application versions (from third parties) with no evidence that these versions are vulnerable and no evidence of exploitation.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Reports of insecure SSL/TLS protocols and other misconfigurations</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Generic vulnerabilities related to software or protocols not under INGs control</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Distributed Denial of Service (DDoS) attacks</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Spam or Social Engineering techniques</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Reports from regular scans such as port scanners</span></span></span></span></span></span></span></span></li></ul>"}},{"componentType":"paragraph","title":"The rules of the game","richBody":{"value":"<p><span><span><span><span><span><span><span><span>While investigating, you might do things that could technically be illegal. But if you act in good faith, carefully, and follow the rules in our responsible disclosure policy, the bank has no grounds to report you. Therefore, follow the rules as set out in this responsible disclosure policy and do not act disproportionately:</span></span></span></span></span></span></span></span></p><ul><li><span><span><span><span><span><span><span><span>Make sure you do not cause any damage while investigating the vulnerability you find.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not use social engineering to gain access to a system.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Under no circumstances may your research lead to an interruption of our services.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Under no circumstances may your investigation lead to the disclosure of bank- or customer data.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not install a backdoor in a system. Not even to expose the vulnerability. Installing a backdoor makes the system even more insecure.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not modify or delete data in the system. If your research requires you to copy data from the system, never copy more data than necessary. If one record is sufficient for your research, leave it at that.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not make any system changes</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not try to hack into a system more often than necessary. If you do manage to hack into a system, do not share access with others.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not use brute force techniques (repeatedly trying passwords) to gain access to systems.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Do not use techniques that could affect the availability of our services.</span></span></span></span></span></span></span></span></li></ul>"}},{"componentType":"paragraph","title":"Reward","richBody":{"value":"<p><span><span><span><span><span><span><span><span>We encourage everyone to report any vulnerabilities to us. If the vulnerabilities you reported have been fixed or have caused a change in our services, you’re eligible for a reward. The amount of the reward depends on the severity of the problems, the type of website (static informational websites versus online banking sites), and the quality of the report received. If the report is of significant value to the bank’s continuity and reliability, the reward will be significantly higher.</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>Good to know: </span></span></span></span></span></span></span></span></p><ul><li><span><span><span><span><span><span><span><span>Rewards will not be awarded if there is evidence of misuse.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Vulnerabilities discovered by ING employee or former ING employees will be excluded from the reward.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>A reward will only be awarded to the first reporter of the vulnerability.</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>Multiple reports of the same vulnerability with minimal differences will be treated as one report (only one report will be rewarded).</span></span></span></span></span></span></span></span></li><li><span><span><span><span><span><span><span><span>In the event you qualify for a reward, we will need your personal data to process the payment.</span></span></span></span></span></span></span></span></li></ul>"}},{"componentType":"paragraph","title":"Information in English","richBody":{"value":"<div>Please follow <a href=\"http://www.ing.com/ING.com-Security.htm\">this link</a> to read the information on responsible disclosure in English.</div>"}},{"componentType":"linkList","iconTitle":{"icon":{"transformBaseUrl":"https://assets.ing.com/transform/f52818ae-9791-4ef7-9799-d3f991c2e3b4/Functionalities-Lock_Confirmation_Outline","type":"image","width":32,"altTextNL":"\"\"","original":"https://assets.ing.com/m/5b979bd44d912a17/original/Functionalities-Lock_Confirmation_Outline.svg","extension":"svg"},"title":"Safe banking"},"textLinks":[{"url":"/en/bank/safe-banking/report-fraud","text":"Report fraud to the Hotline"},{"url":"/de-ing/veilig-bankieren/soorten-oplichting-fraude","text":"More types of scams and fraud"},{"url":"https://zowerktfraude.nl/","text":"Recognising & preventing fraud"},{"url":"/en/bank/safe-banking/5-bs/update-your-browser-and-operating-system","text":"Which browser, even with screen reader"}]},{"componentType":"linkList","iconTitle":{"title":"Learn more"},"textLinks":[{"url":"/en/bank/safe-banking/report-fraud","text":"Report fraud immediately"},{"url":"/de-ing/veilig-bankieren/wat-wij-doen/houd-je-aan-de-veiligheidsregels","text":"ING's security policy"},{"url":"/de-ing/toegankelijkheid","text":"Need banking help?"}]}]}}}