Microsoft Launches $100k Bug Bounty Program 68
Trailrunner7 writes "After years of saying that the company didn't need a bug bounty program, Microsoft is starting one. The company today will announce the start of a new program that will pay security researchers up to $100,000 for serious vulnerabilities and as much as $50,000 for new defensive techniques that help protect against those flaws. Microsoft security officials say that the program has been a long time in development, and the factor that made this the right time to launch is the recent rise of vulnerability brokers. Up until quite recently, most of the researchers who found bugs in Microsoft products reported them directly to the company. That's no longer the case. The system that Microsoft is kicking off on June 26 will pay researchers $100,000 for a new exploit technique that is capable of bypassing the latest existing mitigations in the newest version of Windows."
Question? (Score:1)
How much does the NSA then pay for the bugs? ;-)
Re: (Score:2)
How much does the NSA then pay for the bugs? ;-)
Doesn't matter, they have 300 million pin numbers to choose from?
Re: (Score:1)
The NSA pays Microsoft $200k to implement the "bug "to begin with, so they're still making a net profit.
Re: (Score:3, Insightful)
Now's the time to put up or shut up!
Re: (Score:3, Insightful)
Re:Bugs in Windows? Unthinkable! (Score:4, Interesting)
I kind of agree.
However there are some things that will make this nearly impossible to claim even if you manage to find something.
It needs to be new, which means something they didn't know about.
However, they don't need to tell anyone when they learn about something new, which opens a perfect hole for them to say "Oh that one, we knew about that one" even if they didn't.
The line "a new exploit technique that is capable of bypassing the latest existing mitigations in the newest version of Windows" is also important. Because if gives them another way out of paying for it. "Oh you are using Windows 8 with security patch 8.12.235321, but we are about to release security patch 8.12.235322 which has already fixed that - so you weren't on the latest version."
These are old tricks, which I have seen used by companies for other things where there is supposedly a reward.
Re: (Score:3)
Re: (Score:2)
If that's the case then you can immediately publish a working exploit as soon as they say they already know about it : ) I think they'd lose that fight, lol
Re: (Score:1)
Bugs? In Windows? I'm gonna be rich!
They're gonna be bankrupt.
Re: (Score:2)
Re: (Score:3, Funny)
This is old news! I have been getting rich forwarding emails from Microsoft's Email Beta Test program for years now.
That check should be showing up any day now...
Finally (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Deal or no deal (Score:2)
Re: (Score:1)
http://www.techdirt.com/articles/20130614/02110223467/microsoft-said-to-give-zero-day-exploits-to-us-government-before-it-patches-them.shtml
I'm guessing they just give you part of what they get from the NSA now.
Re: (Score:1)
Better late than never. Microsoft exploits have been traded and sold to security companies owned by intelligence agencies for years now.
they couldn't afford a bounty like this until Windows 7 was SP'd...
Lets hope they have deep pockets (Score:1)
Re: (Score:1)
Exploit circle (Score:2, Informative)
1) Pay for exploits up to 100,000
2) Sell exploits to NSA for up to 200,000, guaranteed unpatched for x days
3) Patch exploit; forcing NSA to buy more exploits
4) Repeat steps
5) Profit!
Why so much? (Score:2)
So up to a short time ago people did this for free? But now they are worth 100K a pop?
Re: (Score:2)
Re: (Score:1)
So up to a short time ago people did this for free? But now they are worth 100K a pop?
Actually it's a $100,000 program, not $100,000 a bug. With the volume of bugs in Windows they will probably be broke in a week offering $5 a pop.
What about XP? (Score:2)
Re: (Score:1)
No problem - Windows itself is a bug.
Bug no. 54321: Mitigating factors... (Score:2)
will pay researchers $100,000 for a new exploit technique that is capable of bypassing the latest existing mitigations in the newest version of Windows."
In this style: http://technet.microsoft.com/en-us/security/bulletin/ms12-020 [microsoft.com]
Bug no.: 54321
Severity: Critical
FAQ: Allows privilege escalation
Mitigating factors:
1. There are only 3 genuine users of the latest version of our operating system
2. We care a damn about affected earlier versions since those lousy bastards need to upgrade anyway
So it is a bug yes,
First bounty (Score:1)
Dear Microsoft,
I have found a terrible bug in windows 8. I don't know how it got through testing, but the start button and its menu is missing. It isn't actually letting adversaries *in* to the system but it is letting an awful lot of users *out* of the system. So I'm hopeful that you can stretch the definition of "security bugs" to cover "financial security of Microsoft bugs" and get a check headed my way.
Genius Marketing (Score:2)
Simply offering a generous bug bounty may be enough to convince technologists to buy and use your software.
While the cost of the program is likely greater than the related sales, said technologists will become accustomed to your new software and push it on to their families, their friends, their neighbours, their customers and their workplaces. Genius marketing is genius.
So Windows 7 and XP users are SOL? (Score:2)
capable of bypassing the latest existing mitigations in the newest version of Windows
So if someone finds a juicy exploit in Windows 7, then his only potential choices are (a) a pat on the back from Balmer, or (b) sell it to the bad guys?
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)