Pwn2Own Toronto 2022, Hackers Earn big for 63 unique zero-day exploits

Share post:

Participants in the Pwn2Own Toronto 2022 hacking competition earned $400,000 on the first day, and a total of $989,750 on the final day for new exploits targeting phones, printers, routers, and NAS devices.

26 teams and security researchers targeted devices in the categories of mobile phones, home automation hubs, printers, wireless routers, network-attached storage, and smart speakers during this hacking competition, all of which were up to date and in their default configuration.

On their third attempt, the STAR Labs team was the first to exploit a zero-day in Samsung’s flagship device by executing an improper input validation attack, earning $50,000 and 5 Master of Pwn points.

On the first day of the competition, another contestant known as Chim demonstrated another successful exploit targeting the Samsung Galaxy S22. On the second and third days of the competition, security researchers from Interrupt Labs and Pentest Limited also hacked the Galaxy S22, with Pentest Limited demonstrating their zero-day exploit in just 55 seconds.

The Devcore team, which had previously competed in several Pwn2Own contests, received the highest single reward on the first day. They were paid $100,000 for hacking a MikroTik router and a Canon printer connected to it.

The event totals $989,750, 63 unique 0-days, 66 entries, and 36 different teams representing 14+ countries.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways