Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Google Chrome hacked for first time at $1m contest

March 9, 2012

Google’s browser was hacked within only five minutes as part of an annual security contest, thanks to a team of French hackers and a Russian student.

chrome%20hack.jpg
After avoiding being successfully attacked for three years thanks largely to its sandbox, which locks down executable code to prevent damage, Chrome was hacked at both Pwn2Own and Google’s Pwnium.
For the former, Vupen Security’s team used a pair of zero-day flaws – one targeting Windows, the other targeting Chrome’s sandbox – to hack the browser mere minutes into the start of the contest.
While the hack only took five minutes to execute, Vupen has been developing the attack against Chrome’s sandbox for six weeks, Chaouki Bekrar, Vupen co-founder and head of research, told ZDNet.
Meanwhile, a Russian student won $60,000 for hacking Google’s Chrome browser, as part of the internet giant’s ‘bug bounty’ program to beef up its security.
The Russian university student, Sergey Glazunov, managed to bypass Chrome’s sandbox and exploit two vulnerabilities in the extension sub-system. He could then execute any code of his choosing on the underlying machine.
Glazunov hacked into a fully patched Windows 7 machine using a remote code execution exploit in Google Chrome as part of Google’s Pwnium hacker contest at CanSecWest.
Until now, there are no known reports of a zero-day attack ever hitting Chrome, and at the previous three years’ contests, Chrome escaped unscathed, even as Internet Explorer, Firefox, and Safari were brought down by exploits that allowed the attackers to take complete control of the machine running the software.
Google noted that the exploit would be fixed via an update to the browser which will be pushed out automatically.
Pwnium is an alternative to the traditional Pwn2Own contest, set up specifically to find exploits in Google’s Chrome browser, as opposed to Pwn2Own which includes Internet Explorer and Firefox.
Speaking to ZDNet, Justin Schuh, who is part of Google’s Chrome security team, said the attack was “very impressive” and that the exploit could have done “anything” on the infected machine, as he executed the code with full permission of the user.
The Google’s Pwnium hacker contest is taking place at the CanSecWest security conference in Vancouver, Canada.
Google will give prizes of US$60,000, US$40,000 and US$20,000 out of a total US$1m prize fund depending on how participants manage to exploit Chrome on a Windows 7 PC.
In a blog post Google wrote, “We have a big learning opportunity when we receive full end-to-end exploits. Not only can we fix the bugs, but by studying the vulnerability and exploit techniques we can enhance our mitigations, automated testing and sandboxing. This enables us to better protect our users.”
Follow Netimperative on Twitter

Uncategorized Google, security, Twitter

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT