Feeds

Microsoft covers Brit who penetrated Windows 8.1 with GOLD

A thin sheet of gold, anyway, worth $100k

High performance access to file storage

A UK security researcher has secured the first Microsoft $100,000 bounty after uncovering ways to get around security defences built into Windows 8.1 Preview, the latest version of Redmond's operating system.

James Forshaw, head of vulnerability research at Context Information Security, scooped the award for a new mitigation bypass technique.

Redmond debuted three bounty programmes in June that rewarded researchers for:

  • techniques that bypass built-in OS mitigations and protections,
  • defences that stop those bypasses and
  • the discovery of vulnerabilities in Internet Explorer 11 Preview.

Earlier this week Microsoft announced payouts totalling $28,000 to six security researchers who collectively reported 15 different bugs in the preview release of Internet Explorer 11.

Forshaw has already benefited from discovering design level bugs during the IE11 Preview Bug Bounty, taking his total bounty earnings to $109,400.

Microsoft is not providing details of the new mitigation bypass technique uncovered by Forshaw until it can come up with a security fix. Microsoft does, however, praise Forshaw's research in a post on its Blue Hat blog.

Redmond explains that payouts for new mitigation techniques are far more generous than come for fingering flaws in Internet Explorer because learning about new mitigation bypass techniques helps it develop defences against entire classes of attack.

Strengthening platform-wide mitigations makes it harder for attackers to exploit bugs in all software running on the Microsoft platform and not just Microsoft applications, Redmond said.

Coincidentally, Microsoft engineer Thomas Garnier found a variant of this class of attack uncovered by Forshaw but this doesn't detract from Forshaw's research or prevent him from claiming his well-earned reward.

Katie Moussouris, senior security strategist lead, Microsoft Trustworthy Computing, said: "We’re thrilled to receive this qualifying Mitigation Bypass Bounty submission within the first three months of our bounty offering. James [Forshaw’s] entry will help us improve our platform-wide defences and ultimately improve security for customers, as it allows us to identify and protect against an entire class of issues."

Forshaw explained that he is driven the intellectual challenge of finding bugs rather than scoring prizes.

"Over the past decade working in secure development and research, I have discovered many interesting security vulnerabilities with a heavy focus of complex logic bugs," Forshaw said in a statement. "I’m keenly interested in the intellectual puzzle of finding novel exploitation techniques and the creativity it requires.

"To find my winning entry I studied the mitigations available today and after brainstorming I identified a few potential angles. Not all were viable but after some persistence I was finally successful," he added.

Redmond's bug bounty programme is one of numerous schemes across the industry designed to reward researchers for reporting flaws to vendors, rather than selling details of bugs to TippingPoint's Zero Day Initiative or hawking them through exploit brokers or vulnerability marketplaces.

"Microsoft’s Mitigation Bypass Bounty is very important to help shift the focus of bounty programs from offence to defence," Forshaw explained. "It incentivises researchers like me to commit time and effort to security in depth rather than just striving for the total vulnerability count."

Forshaw is due to speak at the Hack in the Box conference in Kuala Lumpur, Malaysia, later this month. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.