According to reports, the hackers of the Keen Security Lab brought about a persistent hack of an iPhone 7 with iOS 11.1 at the hacking contest well-known as Mobile Pwn2own in Tokyo and extorted a total of 110,000 US dollars. The hackers managed to attack the iPhone 7 via its WLAN connection and execute their own code. The malicious code was still active after a restart of the device. Overall, four vulnerabilities were exploited in the hack. In addition, the hackers of Keen Security Lab and the hacker Richard Zhu were able to attack the Safari browser on an iPhone 7 and execute malicious code. Yes, both vulnerabilities were exploited.
Successful attacks on iPhone 7 with iOS 11.1, Galaxy S8 and Mate 9 Pro
At the contest, attacks were also carried out on the Android devices – some of them also successful. So could – similar to the iPhone 7 – the Samsung Galaxy S8 (persistent) to be cracked. Here was the entry via the Samsung browser. The 360 Security hackers received $70,000 to uncover the vulnerabilities. The hackers also managed to carry out a successful attack on Huawei Mate 9 Pro, and they did this attack on its baseband processor via a stack overflow and won $100,000. However, on the second attempt, the hackers unable to execute an attack on the NFC connection of the Huawei flagship, of course, the Huawei Mate 9 Pro.
— Zero Day Initiative (@thezdi) November 1, 2017 Mobile Pwn2own will pay more than $500,000 to hackers and security researchers on two days of competition, exposing vulnerabilities in the most popular smartphones. A total of four hacker groups this year to attack devices from Samsung, Huawei, Apple, and Google. On the first day of the contest, hackers had already received a total of $350,000 in rewards. So, what do you think about this? Simply share your views and thoughts in the comment section below.
Δ