Microsoft Puts Up $5 Million to Catch Hackers

Microsoft raised the stakes for virus and worm authors on Wednesday by putting $5 million into a reward fund for information leading to the arrest of malware writers. Specific bounties of $250,000 each are in place for the authors of the MSBlastA worm and the Sobig virus.

Flanked by representatives of the Federal Bureau of Investigation, the Secret Service and Interpol, Microsoft officials unveiled the Anti-Virus Reward Program at a news conference in Washington, D.C.

“Malicious worms and viruses are criminal attacks on everyone who uses the Internet,” Brad Smith, senior vice president and general counsel at Microsoft, said in a statement. “These are real crimes that hurt a lot of people. Those who release viruses on the internet are the saboteurs of cyberspace, and Microsoft wants to help the authorities catch them.”

The fund is designed to help law enforcement track down virus and worm authors by giving their associates a big enough incentive to turn them in. Microsoft framed the $5 million funding as the initial funding for program.

The Sobig virus has come out in five variants so far, starting in January. Early versions spoofed Microsoft e-mail addresses. The last known variant, Sobig.F, caused massive damage during late summer.

MSBlast, an automated worm, also caused major damage in late summer. Officials noted that although arrests have been made in connection with the B and C variants of MSBlast, no one has been arrested in connection with the A version.

Microsoft framed the program as a part of the company’s wider program to improve computer security.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.