6.5 C
New York
Friday, December 4, 2020

Chinese hackers successfully hacked the latest versions of Windows, Ubuntu, iOS and Android

Must Read

Is it true that being glued to the phone is bad for your mental health?

Do you spend a lot of time using your mobile phone? Don't worry, it won't have an effect on your...

Scientists explain the significance of the oldest sculptures on Earth

The statuettes of "Venus Figurines" personify the ideas of ancient people about the ideal female figure. Scientists from the United...

Astronomers catalog a million unknown galaxies and you can now take a virtual trip through them

Astronomers have cataloged a million previously unexplored galaxies using a radio telescope. The high-resolution images obtained were put together in...
Kamal Saini
Kamal S. has been Journalist and Writer for Business, Hardware and Gadgets at Revyuh.com since 2018. He deals with B2b, Funding, Blockchain, Law, IT security, privacy, surveillance, digital self-defense and network policy. As part of his studies of political science, sociology and law, he researched the impact of technology on human coexistence. Email: kamal (at) revyuh (dot) com

China hosted the largest national hackathon Tianfu Cup – a competition of teams of experts on attacks on information infrastructure. Using previously unknown vulnerabilities, participants were able to hack virtually all the most advanced software products.

The winner received $744,500 for successful attacks on Google Chrome and Mozilla Firefox browsers, as well as for hacking the iOS operating systems (iOS) running the iPhone 11 Pro and Microsoft Windows 10 2004 running on the Surface Pro 5. Members of 360 Enterprise Security and Government and (ESG) Vulnerability Research Institute work for the Chinese Internet security company Qihoo 360. In total, this team took two-thirds of the total prize pool, which was 1.2 million dollars.

Goals achieved table / © Tianfu Cup

Qihoo 360 employees were also able to hack the corporate virtualization software VMWare EXSiAdobe Reader (2 successful attacks), SamsungGalaxy S20 smartphone running Android 10, software environment of emulation of QEMU and Ubuntu 20. To top it all off, they easily took control of the TP-Link WDR7660 router.

Other participants also distinguished themselves – under their onslaught, the Safari browser, the Docker enterprise software management suite and the ASUS AX86U router “fell”. In addition, not only Qihoo 360 specialists successfully coped with the breach of the above software. Most targets were attacked more than once.

For example, the iPhone 11 was jailbroken in two ways, just like the Galaxy S20. And the document viewer in PDF format from Adobe made a difference – five successful attacks were made on it. A comparable number of new vulnerabilities were found only in the TP-Link router: 4 pieces.

It is noteworthy that the organizers of the hackathon chose a few more goals as disciplines of the competition, but the participants left some of them unattended. Microsoft Edge browser, VMware Workstation custom package and Exchange Server 2019 system could bring teams another 380,000 dollars. But for some reason they did not spend their energy. Perhaps these software products are not of much interest to cybercriminals, or perhaps there is simply no time left for them within the framework of the competition.

In total, 11 out of 16 targets were achieved, and the most common applications and operating systems were successfully attacked. It goes without saying that the developers of each software product received detailed information about all identified vulnerabilities.

The Tianfu Cup hackathon has been held since 2018. It was organized after the Communist Party banned Chinese cybersecurity specialists from participating in overseas professional competitions. In terms of its principles, this competition is similar to one of the most prestigious hacker championships – Pwn2Own. Participants are given a goal, for example, to execute code with certain privileges on the attacked device. They must find a previously unknown vulnerability and implement it. For the successful completion of the task, points are awarded, and then cash prizes. All identified software errors must be reported to the software creators.

- Advertisement -
- Advertisement -

Latest News

Is it true that being glued to the phone is bad for your mental health?

Do you spend a lot of time using your mobile phone? Don't worry, it won't have an effect on your...

Scientists explain the significance of the oldest sculptures on Earth

The statuettes of "Venus Figurines" personify the ideas of ancient people about the ideal female figure. Scientists from the United States and the United Arab...

Astronomers catalog a million unknown galaxies and you can now take a virtual trip through them

Astronomers have cataloged a million previously unexplored galaxies using a radio telescope. The high-resolution images obtained were put together in an impressive celestial world map...

The iOS, more vulnerable than ever: an iPhone could have been hacked over Wi-Fi

A cybersecurity expert finds an unprecedented vulnerability on iOS operating system devices. Until May 2020 the 'hackers' may have accessed iPhones, iPads and iWatch...

German workers’ union declares war on Tesla

In Germany, the largest metalworkers union, IG Metall, declared war on Tesla co-founder Elon Musk who is building his first European plant in the...
- Advertisement -

More Articles Like This

- Advertisement -