Microsoft Expands Bug Bounty To Tackle Exploits
Microsoft is a late comer to bug bounties, but now expands the scheme to offer more tempting rewards
Microsoft has expanded its bounty program on 4 November in order to reward people who discover a new technique for bypassing the security of its Windows operating system.
And Redmond also opened the bug bounty scheme to anyone, and not just researchers.
Dead Or Alive
The change means that the company will pay out $100,000 (£62,173), its top award, to individuals who discover a previously unreported method of evading Windows’ defences, even if the technique is being used in an ongoing attack. In the original bounty program, announced less than five months ago, only a person who – through their own research – discovered a way to bypass the shield of Windows defences could claim the prize.
“We are going from accepting entries from only a handful of individuals capable of inventing new mitigation bypass techniques on their own, to potentially thousands of individuals or organisations who find attacks in the wild,” Katie Moussouris, senior security strategist lead for Microsoft’s Trustworthy Computing initiative, stated in a blog post on the new program.
The revised bounty program aims to take all exploits for Windows’ security off the market. Microsoft went so far as to call it a “Dead or Alive” program. The program is not about finding bugs, but finding new types of attacks, Moussouris said.
“Learning about ‘ways around the shield,’ or new mitigation bypass techniques, is much more valuable than learning about individual bugs because insight into exploit techniques can help us defend against entire classes of attack as opposed to a single bug – hence, we are willing to pay $100,000 for these rare new techniques,” she said.
In addition to rewarding anyone with the chops to analyse malware, the program could turn attackers against one another, allowing one black hat researcher to turn in the code being used by a cyber-criminal to infect systems, Wendy Nather, research director with the enterprise security practice at the 451 Group, a business intelligence firm, said in a blog post. Typically, hackers and cyber-criminals tend to work together and form communities that share information. Microsoft’s bounty program could stress those tenuous relationships, she said.
“This move by Microsoft presents economic disruption in the exploit market, but that’s not all,” Nather said. “It’s also a step toward reversing the inherent asymmetry between attackers and defenders.”
Late Arrival
Microsoft announced its original bounty programs in June, pledging to award $100,000 for researchers that found new ways to get around its software’s defences and $11,000 (£6,839) for any vulnerabilities found in its Internet Explorer browser. Any team that won its top prize could also propose possible defences, earning another $50,000 (£31,086).
In October, the company awarded it first $100,000 bounty to security consultant James Forshaw, who developed a new technique for getting past Microsoft’s defences. The company also announced it had given $28,000 (£17,408) in prizes for six researchers, including Forshaw, who found security issues in the company’s IE11 preview.
Sorry, there’s no cash reward, but still … try our security quiz!
Originally published on eWeek.