Microsoft Signs Up To Bug Bounties With £65,000 Reward

Microsoft has finally broken a long-standing moratorium on paying for information on vulnerabilities in its software products.

Redmond announced 19 June that it has created two programs that will pay researchers for information on software flaws, and a third that will reward researchers who create defensive measures.

High Stakes

The software company will pay $100,000 (£64,750) to any researcher who develops a technique to bypass the defences of the latest version of Microsoft’s operating system, Windows 8.1.

In a second vulnerability-reward program, the company will also pay up to $11,000 (£7,124) for each bug found during the first 30 days of the beta period of its latest version of Internet Explorer, Katie Moussouris, senior security strategist lead for Microsoft’s Trustworthy Computing group, told eWEEK.

“What we are looking for are new ways to bypass our mitigations,” she said. “We want to learn about these new ways to punch holes in our shields, so we can develop defences that work platform-wide and block those types of attacks.”

In addition to the two bug-bounty programs, Microsoft will also reward researchers who create novel ways to foil exploitation methods. Under its BlueHat Bonus for Defense program, also announced 19 June, the company will award a $50,000 (£32,375) prize for techniques for blocking current attacks that bypass its defences.

The programs come after years of criticism by some researchers and hackers that Microsoft should solve its security problems by paying for bugs. For more than a decade, security researchers have bristled at reporting bugs to Microsoft for free. While the company made billions of dollars on its software, researchers complained that they were expected to provide free quality assurance in the form of bug reports, or face criticism for being irresponsible. For a number of years, Microsoft had referred to the vulnerability reporting process as “responsible disclosure,” if the researchers worked with the company to fix the issue before publicizing the flaw.

“The first thing that comes to mind is that it’s about time,” Chris Wysopal, chief technology officer for application-security firm Veracode, told eWEEK. “All the other browsers have bug-bounty programs, and that fact may have been one of the things that pushed [Microsoft] over the edge.”

QA Work

Times have also changed: The market for information on vulnerabilities has matured, and now any researcher who finds a significant vulnerability in a popular software product has a number of ways to get paid – from selling the information to a white-market program, such as the Zero-Day Initiative, to using a broker to cut a six-figure deal with a government agency.

Microsoft is feeling those changes. The company has courted researchers, creating a number of programs to strengthen the company’s relationship with bug finders, but even so, researchers are turning fewer vulnerabilities over to Microsoft for free. Three years ago, more than 90 percent of the vulnerabilities that the company fixed came directly from researchers. Now, that’s no longer true, said Moussouris.

“The researchers themselves are changing how they choose to report; the data is really what tells the story here,” Moussouris said.

Microsoft’s second program, the Internet Explorer 11 Preview Bug Bounty Program, is an attempt to change researcher behaviour. In the past, researchers typically found and mainly reported vulnerabilities in Internet Explorer only after the software was released. By paying for bugs only during the first 30 days of the preview of Internet Explorer, Microsoft hopes to shift that behaviour, so it can fix the software before its release.

“It’s a good idea,” Wysopal said. “If they are paying researchers to do their quality assurance, why not pay them to do it in the actual QA period, rather than after the product is released and you would have to issue a patch,” he said.

How well do you know your web browsers? To find out, take our quiz.

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago