Zero-Day Hackers Breach Samsung Galaxy S22 Twice In 24 Hours

0

Last year, during the Pwn2Own hacking event in Austin, Texas, the Samsung Galaxy S21 was hacked, not once but twice, across a period of just 48 hours. This year, at the Pwn2Own competition in Toronto, Canada, elite hacking teams went one better: Samsung’s flagship Galaxy S22 smartphone fell to zero-day exploits twice on the same day. But this is a good thing, as it means Samsung can now fix the issues before malicious threat actors can do any harm.

What is Pwn2Own?

The Pwn2Own hacking event is operated by Trend Micro’s Zero-Day Initiative (ZDI), launched in 2005, and sees some of the best hacking teams come together to exploit various devices using previously unknown ‘zero-day’ vulnerabilities. These elite hacking bounty hunters and security researchers compete against the clock, and each other, in order to successfully exploit, or pwn, devices for sizeable financial rewards. None of the zero-days are sold or redistributed by ZDI, instead, the exploited device vendors are quickly given the details required in order for them to release a patch to fix the issue before full technical information is made public or can be exploited by malicious threat actors.

MORE FROM FORBESThis Zero-Day Twitter Hack Has Already Impacted 5.5 Million Users: Report

Samsung Galaxy S22 hacked, twice

It took the STAR Labs team three attempts, but it was third time lucky as the hackers managed to execute an improper input validation attack against a Samsung Galaxy S22 that was running the latest operating system and firmware and fully up to date with security patches. Because this was the first team to succeed in exploiting a zero-day vulnerability for the smartphone, an award of $50,000 was made. There’s even a YouTube video of the successful Samsung Galaxy S22 hack taking place.

Within just a few hours, the Chim team successfully showcased another zero-day exploit against the Samsung flagship device. This was another improper input validation attack, but because it came after the first, the team was only awarded a $25,000 prize.

I reached out to Samsung who provided the following statement: “Samsung takes security seriously and is committed to providing a safe and secure experience for our customers. We are working to further enhance the security of our devices by releasing a security patch within December. Meanwhile, we recommend users only download trusted applications and keep their devices updated with the latest software to ensure the highest level of protection possible”

MORE FROM FORBESSecurity Expert Warns ‘Update Google Chrome Now’ As CISA 0Day Deadline Revealed

Full results of successful hacks on Pwn2Own day one

Other successful exploits on day one of Pwn2Own include:

  • A stack-based Buffer Overflow attack against the Canon imageCLASS MF743Cdw printer.
  • Both an authentication bypass and a command injection attack against the WAN interface of the TP-Link AX1800 router.
  • A command injection attack against the Lexmark MC3224i printer.
  • A command injection attack against the WAN interface of a Synology RT6600ax router.
  • A stack-based buffer overflow attack against the HP Color LaserJet Pro M479fdw printer.
  • A command injection root shell attack against the LAN interface of a Synology RT6600ax router.
  • Both an SQL injection and a command injection attack against the LAN interface of the NETGEAR RAX30 AX2400 router.
  • A three-exploit chain attack consisting of two ‘missing auth for critical function’ and one auth bypass, against a Synology DiskStation DS920+ NAS.
  • A two-vulnerability attack against an HP Color LaserJet Pro M479fdw printer.
  • A five-vulnerability attack against the LAN interface of the NETGEAR RAX30 AX2400 router.
  • Two different stack-based buffer overflow attacks were successful against a Mikrotik router and a Canon printer in a new ‘SOHO SMASHUP’ category, earning the winning team $100,000. Seconds place, and $50,000, went to a team that used a three-vulnerability attack against a NETGEAR router and an HP printer.

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

Read original article here

Denial of responsibility! Rapidtelecast.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.
Leave a comment