Hacking is a criminal offense in most countries. Almost all system servers and operating systems have been hacked at least once in their development period. But tech giant Microsoft is ready to change the game. Microsoft launches the Azure Sphere Security Research Challenge which calls for hackers and challenges them. The company is ready to offer a bounty worth $100,000 to anyone who can successfully hack into the custom Linux OS. The latest custom version of Linux from Microsoft is custom and lightweight. However, it will handle all of the company’s latest IoT (Internet of Things) applications. The Azure Sphere OS runs on a special chipset.
The main goal of the Azure Sphere is to support price-sensitive, microcontroller-enhanced devices connect to the internet through a safe pathway. The custom Linux OS is supposedly going to help the Azure Sphere platform run applications smoothly. This is mainly because the basic applications provide a sandbox-like environment.
Are you up for the Microsoft Azure challenge?
We are excited to announce a new IoT-focused research program, the Azure Sphere Security Research Challenge, with awards up to $100,000 USD! Deadline to apply is May 15, check out the blog post for more information: https://t.co/YGqcSqh6fy
— Security Response (@msftsecresponse) May 5, 2020
Sylvie Liu, a security manager at Microsoft Security Response Center, says “The bounty worth $100,000 is up for grabs for anyone who can hack into the system server during the ongoing challenge.” All interested individuals can use the official link to register for the challenge. The official documentation given in the blog page serves to provide details about the OS architecture.
The Azure Sphere Security Research Challenge provides resources to support research, including:
- Azure Sphere development kit (DevKit)
- Access to Microsoft products and services for research purposes
- Azure Sphere product documentation
- Direct communication channels with the Microsoft team
The entire research is, however, going to help test the system’s attack retentivity. Because at the end of the day, the system will go through plenty of DoS attacks. Let us know what you think of this new security testing technique in the comments section below.