Security News > 2020 > January > Researchers Earn $280,000 for Hacking Industrial Systems at Pwn2Own Miami

Researchers Earn $280,000 for Hacking Industrial Systems at Pwn2Own Miami
2020-01-24 13:03

Researchers who took part this week in the Zero Day Initiative's Pwn2Own Miami hacking competition have earned a total of $280,000 for exploits targeting industrial control systems and associated protocols.

The teams and individuals who signed up for the hacking contest were Incite Team, Flashback Team, Claroty Research, Ben McBride, Fabius Artrel, Michael Stepankin, Lucas Georges, and a nameless team comprising Tobias Scharnowski, Niklas Breitfeld, and Ali Abbasi from the Horst Goertz Institute for IT-Security in Germany.

The winner of this event was Incite Team, whose members were researchers Steven Seeley and Chris Anastasio.

The researchers from the Horst Goertz Institute won second place and earned a total of $75,000 for hacking the Triangle Microworks SCADA Data Gateway, Rockwell Automation FactoryTalk View SE, and Iconics Genesis64.

Pedro Ribeiro and Radek Domanski of Flashback Team won third place and $75,000 for hacking Iconics Genesis64, Inductive Automation Ignition, and Rockwell Automation FactoryTalk View SE. Claroty Research earned a total of $50,000 for exploits targeting Iconics Genesis64, Schneider Electric EcoStruxure Operator Terminal Expert, and Rockwell Automation FactoryTalk View SE. They also demonstrated vulnerabilities that others had disclosed before them in Inductive Automation Ignition and Triangle Microworks SCADA Data Gateway.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/xzCUoYxS0mw/researchers-earn-280000-hacking-industrial-systems-pwn2own-miami