Tencent Keen Security lab team won $215,000 for finding the security flaws in fully updated and patched Nexus 6P at a mobile-only Pwn2Own competition.
The team from China accepted the challenge from the White Hat Hackers. With the use of Rogue app, they infected the Nexus 6P with various Android bugs. The team also identified and showed that many there are many bugs already present in a new updated and modified version of Nexus 6P phone. And the team was able to access user data by just installing a rogue app on the phone. However, they failed to unlock the device.
Another milestone achieved by them is that they got a malicious app to remain on the iPhone 6S system even after the device was rebooted. However, they failed to invade the Galaxy S7 phone.
Their other accomplishments include successfully carrying out three attacks in Sniper, Strength and Stealth categories. Tencent Keen team first came to limelight when they demonstrated how to take control of Tesla’s brakes from 12 miles away last month.
With total 45 points, Tencent Keen Security Lab Team claimed the title of Master of Pwn and were awarded $215,000.
As per the rules of Mobile Pwn2Own, "Google will be informed and alerted about the identified weaknesses in Nexus 6P and the Android system so that patches could be released."
Pwn2Own gives an opportunity to White Hat hackers to showcase their hacking talent to defeat the software or hardware, and it benefits both the customers and manufacturers.
In the recent Pwn2Own competition, which was sponsored by Trend Micro. The phones that the hackers had to hack included the Nexus 6P, iPhone 6S and Samsung Galaxy S6.
The team from China accepted the challenge from the White Hat Hackers. With the use of Rogue app, they infected the Nexus 6P with various Android bugs. The team also identified and showed that many there are many bugs already present in a new updated and modified version of Nexus 6P phone. And the team was able to access user data by just installing a rogue app on the phone. However, they failed to unlock the device.
Another milestone achieved by them is that they got a malicious app to remain on the iPhone 6S system even after the device was rebooted. However, they failed to invade the Galaxy S7 phone.
Their other accomplishments include successfully carrying out three attacks in Sniper, Strength and Stealth categories. Tencent Keen team first came to limelight when they demonstrated how to take control of Tesla’s brakes from 12 miles away last month.
With total 45 points, Tencent Keen Security Lab Team claimed the title of Master of Pwn and were awarded $215,000.
As per the rules of Mobile Pwn2Own, "Google will be informed and alerted about the identified weaknesses in Nexus 6P and the Android system so that patches could be released."
Pwn2Own gives an opportunity to White Hat hackers to showcase their hacking talent to defeat the software or hardware, and it benefits both the customers and manufacturers.
In the recent Pwn2Own competition, which was sponsored by Trend Micro. The phones that the hackers had to hack included the Nexus 6P, iPhone 6S and Samsung Galaxy S6.