Microsoft offers hackers $100K to break Azure Sphere

Microsoft announces $100,000 bounty for exposing vulnerabilities in Azure Sphere

Microsoft recently launched the Azure Sphere Research Challenge, offering approved security researchers up to a $100,000 reward for identifying dangerous exploits that could potentially impact the security of Azure Sphere, the company’s Linux-based platform for IoT devices.

Azure Sphere became available to users in February 2020, and Microsoft is now ready to hand the reins to select hackers and allow them to probe it for vulnerabilities. The Azure Sphere Research Challenge is in addition to Microsoft’s current Azure Security Lab initiative, which Microsoft announced at Black Hat in August 2019.

The new Azure Sphere Research Challenge is a three-month event that could provide hackers a hefty $100,000 bounty. To earn the six-figure reward, researchers must successfully execute code on Azure Pluton or Azure Secure World.

To participate in the challenge, individuals must submit an application to Microsoft before May 15, 2020. Microsoft will review applications each week and notify those who’ve been accepted via email. 

Microsoft will supply approved hackers with an Azure Sphere development kit, access to Microsoft products and services, Azure Sphere product documentation and direct communication with the Microsoft team. 

"By expanding the Azure Security Lab, we're providing more content and resources to better arm security researchers with the tools needed to research high-impact vulnerabilities in the cloud," Microsoft noted in the announcement. 

Microsoft is also tapping security firms, such as Avira, Baidu International Technology, Bitdefender, Bugcrowd, Cisco's Talos team, ESET, FireEye, F-Secure Corporation, HackerOne, K7 Computing, McAfee, Palo Alto Networks and Zscaler to participate.

Microsoft’s Azure Sphere Research Challenge will run from June 1, 2020, through Aug. 31, 2020

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021