» » Pwn2Own Toronto 2022, Day 2: Smart Speaker Exploits Earn Big Chunk of $280,000 Total

Pwn2Own Toronto 2022, Day 2: Smart Speaker Exploits Earn Big Chunk of $280,000 Total

Pwn2Own Toronto 2022, Day 2: Smart Speaker Exploits Earn Big Chunk of $280,000 Total

House › Vulnerabilities

Pwn2Own Toronto 2022, Day 2: Sensible Speaker Exploits Earn Large Chunk of $280,000 Whole

By Eduard Kovacs on December 08, 2022

Tweet

On the second day of the Zero Day Initiative’s Pwn2Own Toronto 2022 hacking competitors, contributors earned a complete of greater than $280,000 for good speaker, smartphone, printer, router, and NAS exploits.

A big chunk of the whole quantity was earned for good speaker hacks, particularly vulnerabilities concentrating on Sonos One good audio system.

A crew from ​​Qrious Safe earned $60,000 for hacking a Sonos One speaker, whereas the Star Labs crew earned $22,500 for an exploit that concerned one new and one beforehand recognized flaw.

The Bugscale crew was awarded $37,500 for a SOHO Smashup exploit that focused a Synology router and an HP printer. The try concerned the usage of new and beforehand recognized bugs.

Within the new Pwn2Own class known as SOHO Smashup, a small workplace / residence workplace (SOHO) situation is simulated, with the objective being to hack a router on the WAN interface after which pivoting to the LAN, the place a second system is hacked, akin to a NAS equipment, a wise speaker, or a printer.

[ Read: Pwn2Own Toronto 2022, Day 1: Hackers Earn $400,000 for Exploits ]

One other important reward was earned by researcher Luca Moro, who was awarded $40,000 for a WD My Cloud Professional hack within the NAS class. Interrupt Labs earned $25,000 for hacking a Samsung Galaxy S22 telephone.

The checklist of gadgets hacked on the second day of Pwn2Own, for which contributors earned between $1,250 and $10,000, consists of HP, Lexmark and Canon printers, and Netgear, Synology and TP-Hyperlink routers.

ZDI introduced {that a} whole of $681,000 was paid out within the first two days for 43 new and distinctive vulnerabilities.

Pwn2Own Toronto 2022 spans 4 days, with 26 contestants signing up for 66 exploits. ZDI stated the quantity is unprecedented, and it has determined to solely award the total money prize to the primary winner of every goal, with subsequent exploits getting 50% of the prize cash.

Associated: Netgear Neutralizes Pwn2Own Exploits With Final-Minute Nighthawk Router Patches

Associated: Over $1.1 Million Awarded at Pwn2Own Vancouver 2022 for 25 Zero-Day Vulnerabilities

Associated: Microsoft Groups Exploits Earn Hackers $450,000 at Pwn2Own 2022

Get the Every day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Iranian Hackers Ship New ‘Fantasy’ Wiper to Diamond Trade by way of Provide Chain Assault
  • Lighting Large Acuity Manufacturers Discloses Two Knowledge Breaches
  • TikTok Hit by US Lawsuits Over Baby Security, Safety Fears
  • CloudSEK Blames Hack on One other Cybersecurity Firm
  • Pwn2Own Toronto 2022, Day 2: Sensible Speaker Exploits Earn Large Chunk of $280,000 Whole
  • Apple Including Finish-to-Finish Encryption to iCloud Backup
  • Google Paperwork IE Browser Zero-Day Exploited by North Korean Hackers
  • Cyberattack on High Indian Hospital Highlights Safety Threat
  • Large Tech Distributors Object to US Gov SBOM Mandate
  • Traders Pour $200 Million Into Compliance Automation Startup Drata

In search of Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Find out how to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Find out how to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles