Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more


A week ago, Yahoo got into hot water for offering T-shirts to security researchers who discovered serious holes in its network. Yesterday, Microsoft awarded $100,000 to a vulnerability researcher with Context Information Security who found a new way to bypass Windows 8.1 security.

Not bad for white-hat hacking.

Of course, the Yahoo program was a personal initiative and was in the process of being replaced with cash rewards of between $150 and $15,000 even as “T-shirt-gate” hit. But $100K is a very, very significant award, and it states very loudly — without Microsoft having to say a word — that the company is deadly serious about security.

The recipient is James Forshaw, who has already found other bugs in Microsoft technology and now completely dominates Microsoft’s new bug bounty program. Microsoft has paid out over $128,000 in the program, the company says, and Forshaw has pocketed a cool $109,400 of that.

Clearly, this hacker didn’t learn to share in CompSci classes.

The actual vulnerability is something Microsoft is referring to as a “mitigation bypass technique,” and the company cannot go into detail about the hack, since it is still, basically, a zero-day exploit. Microsoft will likely release more details about it when it patches the hole and issues software updates.

Why so big a payday? Essentially, the sheer creativity of Forshaw’s technique:

“The reason we pay so much more for a new attack technique versus for an individual bug is that learning about new mitigation bypass techniques helps us develop defenses against entire classes of attack,” Microsoft senior security strategist Katie Moussouris said. “This knowledge helps us make individual vulnerabilities less useful when attackers try to use them against customers. When we strengthen the platform-wide mitigations, we make it harder to exploit bugs in all software that runs on our platform, not just Microsoft applications.”

Microsoft’s bounty program runs on, with payments of up to $100,000 possible, plus bonuses of up to $50,000 extra for “defense submissions.”

If you’re interested in acquiring some of the Redmond company’s cash, you need to be at least 14, you need to report a vulnerability via Microsoft’s bounty program, and for the big money, you’ll need to find a serious, reliable, and novel attack methodology that works in user mode, not just administrator.

Oh, and you’ll have to be freakishly brilliant.

VentureBeat

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact. Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:
  • up-to-date information on the subjects of interest to you
  • our newsletters
  • gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
  • networking features, and more
Become a member