Hacker Exploits 5 Vulnerabilities to Hack Galaxy S24, Earns $50,000 Bounty
Hacker Exploits 5 Vulnerabilities to Hack Galaxy S24, Earns $50,000 BountyTech outlet Sammyfans reported yesterday (October 24th) that Ken Gannon from NCCGroup successfully hacked into the Galaxy S24 phone at the 2024 Pwn2Own event held in Ireland, utilizing five vulnerabilities. His efforts garnered him a $50,000 (approximately 356,000 Chinese Yuan) prize and five Master of Pwn points
Hacker Exploits 5 Vulnerabilities to Hack Galaxy S24, Earns $50,000 Bounty
Tech outlet Sammyfans reported yesterday (October 24th) that Ken Gannon from NCCGroup successfully hacked into the Galaxy S24 phone at the 2024 Pwn2Own event held in Ireland, utilizing five vulnerabilities. His efforts garnered him a $50,000 (approximately 356,000 Chinese Yuan) prize and five Master of Pwn points.
Pwn2Own, organized by ZeroDayInitiative, is an event specifically for hackers that takes place twice a year. White hat hackers participate in Pwn2Own to earn rewards by executing suspicious code or compromising the security and privacy of devices.
The first day of the 2024 event awarded $516,250 in bounties for over 50 unique zero-day vulnerabilities. Day two awarded $358,625. Ken Gannon, using five vulnerabilities including path traversal, successfully obtained a shell and installed an application on the Samsung Galaxy S24. This earned him $50,000 and five Master of Pwn points.
Public information reveals that Pwn2Own aims to encourage hackers to discover and report security vulnerabilities, enabling manufacturers to promptly patch security issues and enhance product security. In recent years, Pwn2Own has gained increasing attention and attracted more and more participation from white hat hackers.
Ken Gannon's successful hack of the Galaxy S24 again underscores the importance of smartphone security. Mobile phone manufacturers need to continuously strengthen system security and promptly fix vulnerabilities to effectively safeguard user privacy and security.
Tag: Hacker Exploits Vulnerabilities to Hack Galaxy S24 Earns Bounty
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.