Skip to main content

Hacked in 18 seconds: PwnFest exploited Microsoft Edge to execute malicious code

Google Pixel, Apple's Safari, and Adobe Flash all exploited at PwnFest 2016

Microsoft Edge
Image used with permission by copyright holder
On Thursday during the PwnFest 2016 event within Seoul’s Power of Community security conference, a team from vulnerability firm Qihoo 360 and South Korean security researcher JungHoon “Lokihardt” Lee demonstrated two different hacks that took advantage of vulnerabilities within Microsoft Edge, completing one in a mere 18 seconds. The internet browser was running on a 64-bit version of Windows 10 Anniversary Edition (aka Redstone 1) and enabled these teams to remotely execute code at the system level.

PwnFest is a “festival” that encourages hackers and security firms to target specific platforms as a means of demonstrating how vulnerabilities they find can be used in the wild. Participants receive a cash prize while platform developers receive information about vulnerabilities and how they are exploited. In the end, participants and general consumers are the two big winners stemming from the event.

Recommended Videos

That said, here are the targets and their cash rewards:

Please enable Javascript to view this content
Platform/OS/Device Base Reward Extra Reward
Microsoft Edge
Windows 10 x64 Redstone 1
$120,000 $20,000
Android 7.0
Nexus 6p and Pixel
$120,000 $20,000
Microsoft Hyper-V
Windows Server 2016
$150,000 none
Google Chrome
Windows 10 x64 Redstone 1
$120,000 $20,000
Apple iOS 10
iPhone 7 Plus
$120,000 $60,000
Apple Safari
MacOS Sierra
$80,000 $20,000
Adobe Flash Player
Microsoft Edge
Windows 10 x64 Redstone 1
$100,000 $20,000
VMWare Workstation Pro 1.2
Windows 10 x64 Redstone 1
$150,000 none

As for the participating teams, there appear to be six. Here they are with their targets:

360Vulcan
360Alpha
360Marvel
Lokihardt Team Pangu
JH
Microsoft Edge Microsoft Edge Apple Safari
VMware Workstation 12.5.1 VMware Workstation 12.5.1
Adobe Flash Player
Android 7.0 (via Pixel)

On the Microsoft Edge front, vulnerabilities discovered in the Windows 10 browser enabled system-level remote code execution. To better understand system-level access, you have to look at how device operating systems are layered in a security sense. At the top layer, consumers will see the applications they normally use. Under that are device drivers with low privileges followed by device drivers with high privileges further underneath. The final bottom layer consists of the operating system’s central core, aka the kernel, that controls everything. Running a malicious program below the “user” layer grants a hacker special privileges that can go undetected by the device owner.

According to The Register, Lokihardt managed to successfully exploit Microsoft Edge’s security hole(s) in 18 seconds, whereas the length of time it took Qihoo 360’s team to hack Microsoft Edge was not provided. In fact, the Qihoo 360 team reportedly worked on developing its trio of attacks for a period of six months prior to this week’s event.

However, despite all that preparation, the Qihoo 360 team was forced to rework their Edge browser attack within a span of 30 hours. That is because Microsoft plugged three of the four available vulnerabilities in a patch on Tuesday released prior to this week’s hacking event.

Microsoft’s Edge browser was not the only piece of software to be exploited. Qihoo 360, a security firm located in China, pocketed $520,000 in total for their efforts, including exploiting Flash in four seconds to win $120,000. It also used an undisclosed vulnerability to hack the Google Pixel to allow remote code execution, which won them another $120,000. The following video shows the Pixel exploit as it happened.

Google Pixel zero day exploit November 2016

Other exploits included the use of a root privilege escalation bug to win $80,000 for hacking Apple’s Safari browser. Edge was broken for prize money totaling $140,000. The prize money is sponsored by many of the same companies that publish software that is commonly the target of an attack and it is money well-spent — the companies can use the results of events like PwnFest to close security holes and avoid much more costly exploits down the road.

The details surrounding vulnerabilities exploited during PwnFest won’t be released to the public right away, but rather provided directly to the vendors so they can issue an immediate fix.

Updated on 11-14-2016 by Mark Coppock: Added information on further exploits achieved during PwnFest 2016.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
This is the GPU I’m most excited for in 2025 — and it’s not by Nvidia
The AMD Radeon RX 7900 XTX graphics card.

The next few months will completely redefine every ranking of the best graphics cards. With Nvidia's RTX 50-series and AMD's RDNA 4 most likely launching in January -- and even Intel possibly expanding its Battlemage lineup -- there's a lot to look forward to.

But as for me, I already know which GPU I'm most excited about. And no, it's not Nvidia's rumored almighty RTX 5090. The GPU I'm looking forward to is AMD's upcoming flagship, which will presumably be the RX 8800 XT (or perhaps the RX 9070 XT). Below, I'll tell you why I think this GPU is going to be so important not just for AMD but also for the entire graphics card market.
Setting the pace

Read more
Google Street View camera captures highly suspicious act, leading to arrests
The Google Street View image showing someone loading a large bundle into the trunk of a car.

Imagery from Google’s Street View has reportedly helped to solve a murder case in northern Spain.

Street View is the online tool that lets you view 360-degree imagery captured by cameras mounted on Google’s Street View cars that travel the world.

Read more
AMD’s RDNA 4 may surprise us in more ways than one
AMD RX 7800 XT and RX 7700 XT graphics cards.

Thanks to all the leaks, I thought I knew what to expect with AMD's upcoming RDNA 4. It turns out I may have been wrong on more than one account.

The latest leaks reveal that AMD's upcoming best graphics card may not be called the RX 8800 XT, as most leakers predicted, but will instead be referred to as the  RX 9070 XT. In addition, the first leaked benchmark of the GPU gives us a glimpse into the kind of performance we can expect, which could turn out to be a bit of a letdown.

Read more