Microsoft has expanded its bounty program on 4 November in order to reward people who discover a new technique for bypassing the security of its Windows operating system.
And Redmond also opened the bug bounty scheme to anyone, and not just researchers.
The change means that the company will pay out $100,000 (£62,173), its top award, to individuals who discover a previously unreported method of evading Windows’ defences, even if the technique is being used in an ongoing attack. In the original bounty program, announced less than five months ago, only a person who – through their own research – discovered a way to bypass the shield of Windows defences could claim the prize.
The revised bounty program aims to take all exploits for Windows’ security off the market. Microsoft went so far as to call it a “Dead or Alive” program. The program is not about finding bugs, but finding new types of attacks, Moussouris said.
“Learning about ‘ways around the shield,’ or new mitigation bypass techniques, is much more valuable than learning about individual bugs because insight into exploit techniques can help us defend against entire classes of attack as opposed to a single bug – hence, we are willing to pay $100,000 for these rare new techniques,” she said.
In addition to rewarding anyone with the chops to analyse malware, the program could turn attackers against one another, allowing one black hat researcher to turn in the code being used by a cyber-criminal to infect systems, Wendy Nather, research director with the enterprise security practice at the 451 Group, a business intelligence firm, said in a blog post. Typically, hackers and cyber-criminals tend to work together and form communities that share information. Microsoft’s bounty program could stress those tenuous relationships, she said.
“This move by Microsoft presents economic disruption in the exploit market, but that’s not all,” Nather said. “It’s also a step toward reversing the inherent asymmetry between attackers and defenders.”
Microsoft announced its original bounty programs in June, pledging to award $100,000 for researchers that found new ways to get around its software’s defences and $11,000 (£6,839) for any vulnerabilities found in its Internet Explorer browser. Any team that won its top prize could also propose possible defences, earning another $50,000 (£31,086).
In October, the company awarded it first $100,000 bounty to security consultant James Forshaw, who developed a new technique for getting past Microsoft’s defences. The company also announced it had given $28,000 (£17,408) in prizes for six researchers, including Forshaw, who found security issues in the company’s IE11 preview.
Sorry, there’s no cash reward, but still … try our security quiz!
Originally published on eWeek.
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…