How Elite Hackers Made Almost $1 Million Last Week
Reading Time: 2 minutes

The Pwn2Own elite hacking event held in Toronto saw elite hackers make almost $1 million last week. Around 63 zero-day vulnerabilities were successfully exploited by the end of the bi-annual hacking event. 26 hacking teams and individuals participated in the event, operated by Trend Micro’s Zero-Day Initiative (ZDI). 

The participants were challenged to exploit previously unknown vulnerabilities against one of the devices entered into the competition. It is not an easy task to exploit such vulnerabilities against the clock and failures across the four days of competitive hacking make it more evident. 

The Samsung Galaxy S22 was successfully hacked twice in just 24 hrs. The same model of a smartphone was again breached running the latest Android OS and updated security patches on days two and three. 

Printers, Canon, HP, and Lexmark were penetrated time and again to the zero-day attacks from various hacking teams at the Pwn2Own Toronto 2022 event. Other devices on the elite hacker’s list included network-attached storage devices from Western Digital, and routers from Netgear, Synology, and TP-Link. The Sonos One smart speaker was also hacked.How Elite Hackers Made Almost $1 Million Last Week_1 Hacking is Art

When a zero-day vulnerability is found, ZDI will not sell or redistribute it. Instead, the vendor will be given details about the issue so that they can release a patch before more people are hurt. Altogether, more than 63 zero-days were collected at the Pwn2Own Competition in Toronto for a cost of nearly one million dollars. The award purse was a whopping $989,750.

Hacking is not a crime, and it’s important to remember that distinction. 26 elite hackers from Pwn2Own Toronto 2022 are currently taking part in an event to demonstrate how hacking can be done for legitimate reasons. Some hackers are criminals and use hacking for their criminal activity, but hackers who participate in these events often do so for the benefit of companies by demonstrating vulnerabilities so vendors can issue patches and protect users. ZDI shares information regarding these vulnerabilities on its website after the 120-day period has elapsed, allowing threat actors to take advantage of the vulnerability before it becomes public knowledge.

Pwn2Own Toronto 2022 ResultsHow Elite Hackers Made Almost $1 Million Last Week_2

The results of Pwn2Own Toronto 2022 show the Devcore team coming in first place with 18.5 points and $142,500 of bounty. The team Viettel came in second with 16.5 points and $82,500 of bounty, while NCC Group EDG took third place with 15.5 points and $78,750 of bounty. The full results can be found on ZDI Pwn2Own Toronto 2022 blog.

Related Articles:
Royal Ransomware Threat Targets the U.S. Healthcare System
Russian Hackers Target U.S. Military Weapons and Hardware Supplier
Microsoft warns Europe of DDoS attacks From Russia