{"id":6266,"date":"2017-01-23T13:00:00","date_gmt":"2017-01-23T21:00:00","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-119\/"},"modified":"2017-01-23T13:00:00","modified_gmt":"2017-01-23T21:00:00","slug":"news-119","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-119\/","title":{"rendered":"Pwn2Own\u2122 Returns for 2017 to Celebrate 10 Years of Exploits"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"206\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300-300x206.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Hackers make online life difficult.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We are nine weeks away from Pwn2Own\u2122 2017 returning to <a href=\"https:\/\/cansecwest.com\/\">CanSecWest<\/a>, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the rise of nation-state attacks. It happened before the explosion of ransomware. It happened before the explosion of cloud computing. It happened before bitcoin. It happened before anyone had ever heard of the Internet of Things.<\/p>\n<p>In other words, a lot has changed since 2007, including Pwn2Own. That first year, a laptop and $10,000* were given away. Last <a href=\"http:\/\/blog.trendmicro.com\/pwn2own-day-2-event-wrap\/\">year<\/a>, more than $450,000 cash and prizes were awarded over the multiple categories. In 2007, a single bug was needed to exploit QuickTime. Last year, a chain of bugs was required to complete a compromise and fully win a category. Even the <a href=\"https:\/\/pbs.twimg.com\/media\/CkmBANEUoAAF4lA.jpg\">jackets<\/a> <a href=\"https:\/\/pbs.twimg.com\/media\/BEDPA62CIAAz0ui.png\">have<\/a> <a href=\"https:\/\/pbs.twimg.com\/media\/Cu-6uFSWcAEefBS.jpg\">evolved<\/a>.<\/p>\n<p>As the contest grew, we at the Zero Day Initiative (ZDI) have grown the <a href=\"http:\/\/zerodayinitiative.com\/Pwn2Own2017Rules.html\">contest<\/a> to keep it relevant and reflect the latest trends impacting enterprises and users. This year we\u2019re expanding it even further. To celebrate 10 years of Pwn2Own, the ZDI will be offering more than <strong><em>$1,000,000<\/em><\/strong> across five different <a href=\"http:\/\/zerodayinitiative.com\/Pwn2Own2017Rules.html\">categories<\/a> to see the latest research and again crown a Master of Pwn. It\u2019s more money and more categories than we\u2019ve ever done, and we can\u2019t wait to see the research that comes to claim the prizes.<\/p>\n<p>Let\u2019s get to the categories:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Virtual Machine Escape (Guest-to-Host)<\/li>\n<li>Web Browser and Plugins<\/li>\n<li>Local Escalation of Privilege<\/li>\n<li>Enterprise Applications<\/li>\n<li>Server Side<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Virtual Machine Escape (Guest-to-Host)<\/strong><\/p>\n<p>We added Virtual Machine Escapes last year with VMware, and we\u2019re expanding this to include Microsoft Hyper-V this year. An attempt in this category must be launched from within the guest operating system from a non-administrative account and execute arbitrary code on the host operating system. Both the guest and the host operating system will be running the 64-bit versions of Windows 10. A successful exploit in either product will net $100,000 for the contestant plus a lucky 13 Master of Pwn points.<\/p>\n<p><strong>Web Browser and Plugins<\/strong><strong>\u00a0<\/strong><\/p>\n<p>Attacks on web browsers have been a part of Pwn2Own since the very beginning, and this year is no different. We welcome Mozilla Firefox back into our targets list after missing last year. Here is the full list of browsers and plugins we are including (with their payouts):<strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Microsoft Edge: $80,000 (10 Master of Pwn points)<\/li>\n<li>Google Chrome: $80,000 (10 Master of Pwn points)<\/li>\n<li>Mozilla Firefox: $30,000 (5 Master of Pwn points)<\/li>\n<li>Apple Safari: $50,000 (8 Master of Pwn points)<\/li>\n<li>Adobe Flash in Microsoft Edge: $50,000 (8 Master of Pwn points)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In this category, contestants could earn an additional $30,000 if their entry achieves SYSTEM-level code execution on Windows-based targets, or will receive an additional $20,000 if their entry achieves root-level code execution on macOS-based targets.<\/p>\n<p>Want a really big payout? The Windows-based targets will be running in a VMware Workstation virtual machine. If the contestant escapes the VMware Workstation virtual machine and achieves code execution on the host operating system, the contestant will receive an additional $100,000.<\/p>\n<p>These are cumulative bonuses, as well. For example, if a contestant exploits Google Chrome or Microsoft Edge, elevates to System, then performs a VMware escape, they will net themselves a tidy $210,000 in one sitting (and 27 Master of Pwn points!). We certainly hope someone accomplishes some chain along these lines.<strong>\u00a0<\/strong><\/p>\n<p><strong>Local Escalation of Privilege<\/strong><\/p>\n<p>Although we\u2019ve had some Escalation of Privilege (EoP) bugs as add-ons in past Pwn2Owns, this is the first year it has a category of its own. This is also the first time we included Linux as a target. In this category, the entry must leverage a kernel vulnerability to escalate privileges. If they do, contestants will earn $30,000 for Microsoft Windows 10, $20,000 for macOS, and $15,000 for Ubuntu Desktop. They will also get 4 Master of Pwn points for Windows and 3 for the other OSes. Considering the various types of malware that use local EoPs, this could prove to be an impactful category. As always, the latest, fully-patched version of each OS will be used \u2013 even if we have to stay up late to install the patches.<\/p>\n<p><strong>Enterprise Applications<\/strong><\/p>\n<p>One thing we think about when planning a Pwn2Own is what we hope to see. We\u2019ve considered adding Office and Reader applications in the past, and there\u2019s no better time than the 10th anniversary to include them.<\/p>\n<p>Here\u2019s the list of targets for this category:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Adobe Reader<\/li>\n<li>Microsoft Office Word<\/li>\n<li>Microsoft Office Excel<\/li>\n<li>Microsoft Office PowerPoint<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The Microsoft Office-based targets will have Protected View enabled. Each successful exploit earns the contestant $50,000 and six Master of Pwn points. These types of exploits are seen in the wild quite a bit, so shutting a few down could really help improve the security posture for a lot of folks.<strong>\u00a0<\/strong><\/p>\n<p><strong>Server Side<\/strong><\/p>\n<p>This is another new category for Pwn2Own, but one that should prove noteworthy. A successful exploit against Apache Web Server on Ubuntu Server will net the researcher $200,000 and earn a whopping 25 Master of Pwn points. Considering this setup accounts for roughly <a href=\"https:\/\/w3techs.com\/technologies\/details\/ws-apache\/all\/all\">half<\/a> of all websites, it\u2019s pretty clear the impact a bug here would have. An attempt in this category must be launched from the contestant laptops within the contest network.<\/p>\n<p><strong>Master of Pwn Returns<\/strong><\/p>\n<p>Speaking of Master of Pwn, we started this last year and continued it through Mobile Pwn2Own, as well. In order to crown an overall \u2018winner\u2019 for Pwn2Own, each successful exploit will receive points. Total points are calculated by the sum of the successful entries based on the following point allocations:<\/p>\n<div class=\"lightTable\">\n<table width=\"959\">\n<tbody>\n<tr>\n<td width=\"312\"><strong>Category<\/strong><\/td>\n<td width=\"335\"><strong>Targets<\/strong><\/td>\n<td width=\"312\"><strong>Points<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"312\"><strong>Virtual Machine Escape<\/strong><\/td>\n<td width=\"335\">VMware Workstation<\/td>\n<td width=\"312\">13<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Microsoft Hyper-V<\/td>\n<td width=\"312\">13<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"8\" width=\"312\"><strong>Web browser and Plugins<\/strong><\/td>\n<td width=\"335\">Microsoft Edge<\/td>\n<td width=\"312\">10<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Google Chrome<\/td>\n<td width=\"312\">10<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Mozilla Firefox<\/td>\n<td width=\"312\">5<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Apple Safari<\/td>\n<td width=\"312\">8<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Adobe Flash in Edge<\/td>\n<td width=\"312\">8<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">+ Escalation to SYSTEM (Windows)<\/td>\n<td width=\"312\">4<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">+ Escalation to Root\u00a0 \u00a0(macOS)<\/td>\n<td width=\"312\">3<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">+ Virtual Machine Escape<\/td>\n<td width=\"312\">13<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"312\"><strong>Local Escalation of Privilege<\/strong><\/td>\n<td width=\"335\">Microsoft Windows 10<\/td>\n<td width=\"312\">4<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Apple macOS<\/td>\n<td width=\"312\">3<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Ubuntu Desktop<\/td>\n<td width=\"312\">3<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"312\"><strong>Enterprise Applications<\/strong><\/td>\n<td width=\"335\">Adobe Reader<\/td>\n<td width=\"312\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Microsoft Office Word<\/td>\n<td width=\"312\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Microsoft Office Excel<\/td>\n<td width=\"312\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">Microsoft Office PowerPoint<\/td>\n<td width=\"312\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"312\"><strong>Server Side Exploits<\/strong><\/td>\n<td width=\"335\">Apache Web Server<\/td>\n<td width=\"312\">25<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p>For example, if a contestant has two successful entries (e.g. Microsoft Edge with a SYSTEM escalation and Google Chrome without a SYSTEM escalation), their total points would be 24 points. The contestant with the highest total points at the end of the contest will receive the title \u201cMaster of Pwn\u201d and receive 65,000 ZDI reward points (estimated at $25,000). There\u2019s a better than average chance that the title will also include some form of slick <a href=\"https:\/\/twitter.com\/thezdi\/status\/788054159517949953\">jacket<\/a> too.<\/p>\n<p>The complete rules for Pwn2Own 2017 are found <a href=\"http:\/\/zerodayinitiative.com\/Pwn2Own2017Rules.html\">here<\/a>. As always, we encourage entrants to read the <a href=\"http:\/\/zerodayinitiative.com\/Pwn2Own2017Rules.html\">rules<\/a> thoroughly if they choose to participate. Registration is required to ensure we have sufficient resources on hand at the event. Please contact ZDI at\u00a0<a href=\"mailto:zdi@trendmicro.com?subject=Pwn2Own%202017%20Registration\">zdi@trendmicro.com<\/a>\u00a0to begin the registration process. (Email only, please; queries via Twitter, blog post or other means will not be acknowledged or answered.) Registration closes at 5 p.m. Pacific Time on March 12, 2017.<\/p>\n<p>Over the next few weeks leading up to Pwn2Own, we\u2019ll be posting some stories and behind the scenes tales from the contest. Be sure to stay tuned to this blog and follow us on <a href=\"https:\/\/twitter.com\/thezdi\">Twitter<\/a> for the latest information and updates about the contest. We look forward to seeing everyone in Vancouver, and here\u2019s to another 10 years of pwnage!<\/p>\n<h6><em>*All monetary values are listed in U.S. dollars<\/em><\/h6>\n<h6><\/h6>\n<h6>\u00a92017 Trend Micro Incorporated. All rights reserved. PWN2OWN, ZERO DAY INITIATIVE, ZDI and Trend Micro are trademarks or registered trademarks of Trend Micro Incorporated. All other trademarks and trade names are the property of their respective owners.<\/h6>\n<p><a href=\"http:\/\/blog.trendmicro.com\/pwn2own-returns-for-2017-to-celebrate-10-years-of-exploits\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"206\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300-300x206.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Hackers make online life difficult.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/Hackers-make-online-life-difficult-_459_40135058_0_14118660_300-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>We are nine weeks away from Pwn2Own\u2122 2017 returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the rise of nation-state&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10414,10384,10416,714,10417,10415],"class_list":["post-6266","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-internet-of-everything","tag-network","tag-pwn2own","tag-security","tag-zdi","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6266"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6266\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6266"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}