The Coronavirus outbreak hasn’t stopped the Pwn2Own hacking conference, for the first time its organizer, the Zero Day Initiative (ZDI), has decided to arrange the event allowing the participants to remotely demonstrate their exploits.
On the first day of Pwn2Own 2020, a team from the Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) successfully exploited a kernel privilege escalation to execute code on macOS through Safari. The attack chain involved six vulnerabilities and allowed the team to earn $70,000.
“1000 – The Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) team of Yong Hwi Jin (@jinmo123), Jungwon Lim (@setuid0x0_), and Insu Yun (@insu_yun_en) targeting Apple Safari with a macOS kernel escalation of privilege.” reads the official page of the event.
“SUCCESS – The team from Georgia Tech used a six bug chain to pop calc and escalate to root. They earn $70,000 USD and 7 Master of Pwn points.”
The popular Team Fluoroacetate (Amat Cama and Richard Zhu) that won past editions, earned $40,000 for a local privilege escalation exploit targeting Windows 10. Zhu also earned another $40,000 for another privilege escalation exploit targeting Windows 10.
Manfred Paul of the RedRocket CTF team earned $30,000 for a local privilege escalation exploit targeting Ubuntu Desktop. The hack exploits an improper input validation bug.
On the second day of Pwn2Own 2020, participants will attempt to hack Oracle VirtualBox, VMware Workstation and Adobe Reader.
Below the schedule of the day2 of the event:
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Pwn2Own, cybercrime)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.