The aforementioned prize will be given out to the first one that compromises the baseband processor of any of the mobile devices available for selection, and lesser prizes will go to those that compromise:
- Bluetooth, Wi-Fi, USB or NFC via a wireless or a wired attack ($50,000)
- a Mobile Web Browser ($40,000 + $10,000 from Google if the browser is Chrome on Android, either on Google Nexus 4 or Samsung Galaxy S4)
- a Mobile Application/Operating System ($40,000)
- Messaging Services - SMS, MMS, or CMAS ($70,000)
"Be the first to compromise a selected target in one of the categories using a previously unknown vulnerability (one that has not been disclosed to the affected vendor). You’ve got 30 minutes to complete your attempt. When you’ve successfully demonstrated your exploit and ‘pwned’ the targeted device, you need to provide ZDI with a fully functioning exploit and a whitepaper detailing all of the vulnerabilities and techniques utilized in your attack," Gorenc explained.
"A successful attack against these devices must require little or no user interaction and the initial vulnerability used in the attack must be in the registered category. The contestant must demonstrate remote code execution by bypassing sandboxes (if applicable) and exfiltrating sensitive information, silently calling long-distance numbers, or eavesdropping on conversations. To avoid interfering with licensed carrier networks, all RF attacks must be completed within the provided RF isolation enclosure. The vulnerabilities utilized in the attack must be unpublished 0-days."
More details about the contest and its rules can be perused here.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.