• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 4th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Samsung

Hackers Earn $215,000 for Hacking Nexus 6P, iPhone 6S

October 28th, 2016 Agan Uzunovic Security, Android, Apple News, Google News, Samsung, Technology News 0 comments
Hackers Earn $215,000 for Hacking Nexus 6P, iPhone 6S
Share on FacebookShare on Twitter
Tencent Keen Security Lab Team Hackers Win $215,000 for Infecting a Fully Updated and Patched Nexus 6P.

Challenging White Hat Hackers through competitions and bounties for identifying potentially harmful security flaws in latest or upcoming devices is currently the hot trend in the digital world.

It is rather interesting to let security teams work hard and try to identify flaws in a given hardware or software under close scrutiny. One of the most popular of such competitions is Pwn2Own in which White Hat hackers are invited to defeat the software or hardware, which has been declared as near perfect by the manufacturer.

 Also Read: Android Bug Bounty Program Launched by Google

In the recent mobile-only Pwn2Own competition, sponsored by Trend Micro, cash prizes were offered to hackers who could infiltrate the device, access or modify user info, infect the device with fake and harmful apps or unlock mobile phones from the most high-profile manufacturers. The phones that the hackers had to hack included the Nexus 6P, iPhone 6S and Samsung Galaxy S6.

Tencent Keen Security Lab’s team from China accepted the challenge and utilized various Android bugs to infect the Nexus 6P with a rogue app. The team also identified that the bugs that were used were already present in a new Nexus 6P phone despite its OS being updated with most recent security patches. By installing a rogue app on the phone, the team was able to access user data. However, they could not unlock the device.

Another achievement of Tencent Keen’s team was to get a malicious app to remain on the iPhone 6S system even after the device was rebooted. This was termed as a partial success. However, the team could not successfully invade the Galaxy S7 phone.

Due to their accomplishment of successfully carrying out three attacks in Sniper, Strength and Stealth categories, the team received an award of $102,500. Remember, Tencent Keen team is the same team who demonstrated how to take control of Tesla’s brakes from 12 miles away last month.

Also Read: 10 Famous Bug Bounty Hunters of All Time

[fullsquaread][/fullsquaread]

Also Read: Google increases bug bounty reward for Chromebook to $100,000

With multiple successful exploits, Tencent Keen Security Lab Team claimed the title of Master of Pwn with 45 points and $215,000 total awarded.

Another team tried to hack the phone using a mobile Chrome vulnerability, which was patched subsequently, but their attempts remained unsuccessful.

As per the rules of Mobile Pwn2Own, Google will be informed and alerted about the identified weaknesses in Nexus 6P and the Android system so that patches could be released.

[src src=”Source” url=”http://blog.trendmicro.com/results-mobile-pwn2own-2016/”]Trend Micro[/src]

  • Tags
  • Android
  • Bug Bounty
  • Google
  • hacking
  • internet
  • iPhone
  • Samsung
  • security
Facebook Twitter LinkedIn Pinterest
Previous article DDoS Attack on Dyn: Largest of Its Kind Involving 100,000 Mirai Botnets
Next article This IoT Scanner Shows if Your Device is Vulnerable to be used in DDoS Attacks
Agan Uzunovic

Agan Uzunovic

Agan Uzunovic is a Bosnian journalist who is working for the country's largest newspaper. He has a keen interest in reporting on activism and hacktivism. He is also a contributor at U.S based Revolution News media. Agan reports and writes for HackRead on IT security related topics.

Related Posts
Flaw allowed bypassing verification code, log in to any Microsoft account

Flaw allowed bypassing verification code, log in to any Microsoft account

Hackers hit Microsoft Exchange Server to steal email data

Hackers hit Microsoft Exchange Server to steal email data

Gootloader exploits websites via SEO to spread ransomware, trojans

Gootloader exploits websites via SEO to spread ransomware, trojans

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Flaw allowed bypassing verification code, log in to any Microsoft account
Microsoft

Flaw allowed bypassing verification code, log in to any Microsoft account

Hackers hit Microsoft Exchange Server to steal email data
Cyber Crime

Hackers hit Microsoft Exchange Server to steal email data

Gootloader exploits websites via SEO to spread ransomware, trojans
Security

Gootloader exploits websites via SEO to spread ransomware, trojans

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us