The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another banner year, paying $442,000 for 21 critical bugs in all four major browsers, as well as Windows, Adobe Flash, and Adobe Reader.
The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another banner year, paying $442,000 for 21 critical bugs in all four major browsers, as well as Windows, Adobe Flash, and Adobe Reader.
hacking doesn’t pay…
…”That netted him another $50,000 USD and brought his daily total to $225,000.” This was JungHoon Lee (lokihardt), working by himself. Damn.
Is this competitive with what these would bring in on the black market? The guy will sleep better at night, and you can’t put a price on that… but still.
FunkyELF,
It could represent many more months of perfecting hacking techniques, debugging, and finding workable exploits, but yeah it’s many times my salary. I’m curious what the black market pays.
Between 2010 and 2013, MS seems to have realized that it needs to provide a financial incentive for hackers to come to them with vulnerabilities. Evidently “recognition” by microsoft didn’t cut it.
http://www.zdnet.com/article/microsoft-no-plans-to-pay-for-security…
http://www.cnet.com/news/microsoft-pays-out-28k-to-ie-11-exploit-hu…
My guess is that microsoft’s rewards were less than the black market would pay. Something else to think about: does the NSA qualify as “black market”? Their intention is obviously to use the exploits rather than to fix them, we can’t really call that white-hat hacking. What do they pay their hackers?
I understand that all major browsers were compromised, does anyone know what operating systems they were running on, or if they were operating system agnostic?
There are more mentions on windows exploits as part of the exploit as well, so I guess one can assume that these all worked against the browsers running on windows, but no mention of mac or linux.
At least the Firefox – bugs sounded like they were not dependant on the underlying OS and thus would most likely work just as easily under OSX or Linux. That said, I doubt much more in the way of details will be released as they don’t wanna give the baddies any ammunition.
Per the rules all browsers had to be exploited on Windows, except for Safari which had to be exploited on OS X. No Linux target was set up.
Attackers who could escape browser security and execute code at normal integrity level (Windows) or just as the user on OS X was rewarded with the *browser* exploit award.
Specifically on Windows there was an extra prize if the attacker could elevate to SYSTEM (roughly the equivalent of root if root login has been disabled). Several of the contestants achieved that as well. There was no similar prize for root on OS X.
Really impressive, even more when you learn what are the rules the hacker must observe.
Take a look at “http://techxplore.com/news/2015-03-big-browsers-fall-pwn2own-exploi….