Windows 10, iOS 15, Ubuntu, Chrome fall at China’s Tianfu Cup hacking contest

By Catalin Cimpanu October 17, 2021  
https://therecord.media/windows-10-ios-15-ubuntu-chrome-fall-at-chinas-tianfu-hacking-contest/


Chinese security researchers took home $1.88 million after hacking some of the 
world’s most popular software at the Tianfu Cup, the country’s largest and most 
prestigious hacking competition.

The contest, which took place over the weekend of October 16 and 17 in the city 
of Chengdu, was won by researchers from Chinese security firm Kunlun Lab, who 
took home $654,500, a third of the total purse.

The competition, now at its fourth edition, took place using the now-classic 
rules established by the Pwn2Own hacking contest.

In July, organizers announced a series of targets, and participants had 
three-to-four months to prepare exploits that they would execute on devices 
provided by the organizers on the contest’s stage.

Researchers had three 5-minute attempts to run their exploits, and they could 
register to hack multiple devices if they wished to increase their winnings.

This year’s edition included a list of 16 possible targets and was one of the 
Tianfu Cup’s most successful editions, with the 11 participants mounting 
successful exploits against 13 targets.

The only ones that were not hacked included Synology DS220j NAS, Xiaomi Mi 11 
smartphone, and a Chinese electric vehicle whose brand was never revealed — for 
which no participant even registered to attempt an exploit.

On the other hand, successful exploits were mounted against nearly everything 
else, as follows:

Windows 10 – hacked 5 times
Adobe PDF Reader – 4 times
Ubuntu 20 – 4 times
Parallels VM – 3 times
iOS 15 – 3 times
Apple Safari – 2 times
Google Chrome – 2 times
ASUS AX56U router – 2 times
Docker CE – 1 time
VMWare ESXi – 1 time
VMWare Workstation – 1 time
qemu VM – 1 time
Microsoft Exchange – 1 time

Most of the exploits were privilege escalation and remote execution bugs; 
however, two exploits presented at the Tianfu Cup this year stood out.

The first was a no-interaction remote code execution attack chain against a 
fully patched iOS 15 running on the latest iPhone 13. The second was a simple 
two-step remote code execution chain against Google Chrome, something that has 
not been seen in hacking competition in years.

But while the Tianfu Cup hacking contest will take all the news headlines in 
the coming days, the event also included a separate trade show and 
cybersecurity conference, which this year was keynoted by Qi Xiangdong, 
chairman of security firm QiAnXin, and also included sections dedicated to 
smart vehicle security, IoT security, artificial intelligence security, and 
smart city security.

However, all eyes were on this year’s competition for another reason, namely 
that one of the iOS exploits showcased at last year’s competition was used in a 
cyber-espionage campaign carried out by the Beijing regime against its Uyghur 
population.

The discovery came to reinforce the belief among western security experts that 
Beijing forbade Chinese security researchers from participating in hacking 
contests held abroad back in 2017 in order to better harness their 
exploit-creating capabilities for its own operations.
--



_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to