{"id":1475,"date":"2010-03-25T10:46:50","date_gmt":"2010-03-25T09:46:50","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1475"},"modified":"2010-03-25T10:46:50","modified_gmt":"2010-03-25T09:46:50","slug":"hackers-crack-macs-and-others-for-cash","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/","title":{"rendered":"Hackers Crack Macs (and Others) for Cash"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg\"><\/p>\n<p>It&#8217;s time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs fell quickly, but so did the iPhone and Windows 7 in day one of the event.<\/p>\n<p>It&#8217;s the CanSecWest conference in Vancouver, which hosts the Pwn2Own contest. On Wednesday, the hackers lined up to take their chances at part of a purse of $100,000. The first to fall was the iPhone, <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=5836\">which was hacked in &#8220;20 seconds.&#8221;<\/a>  Naturally, this doesn&#8217;t mean that the hackers just started trying to figure out how to hack the device, but spent a couple of weeks doing so in advance of the event. The hackers had discovered a vulnerability, and set up a booby-trapped web page that copied the SMS database from the handset.<\/p>\n<p>Mac hacker Charlie Miller cracked a MacBook, using <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=5846\">using Safari and a drive-by download<\/a>. This was Miller&#8217;s third consecutive victory against the Mac, and it was worth $10,000. (There&#8217;s a short video of Charlie Miller discussing this on <a href=\"http:\/\/www.youtube.com\/watch?v=K0FRby27S4A\">YouTube<\/a>.) <\/p>\n<p>And at the same time, Windows 7 <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=5855\">fell to a Dutch hacker<\/a> who exploited two Internet Explorer vulnerabilities. He, too, won a prize of $10,000. And a German hacker cut through the defenses in <a href=\"http:\/\/threatpost.com\/en_us\/blogs\/mozilla-firefox-hacked-pwn2own-contest-032410\">Mozilla Firefox<\/a> to get at Windows 7. <\/p>\n<p>While this sort of exploit doesn&#8217;t suggest that the hackers found vulnerabilities and cracked them on the same day, it does show that experienced hackers can crack pretty much any system given time. None of these vulnerabilities involve the type of social engineering that tricks people into installing Trojan horses. There is no user interaction allowed in this contest, other than directing a user to a web site. (Browser-based vulnerabilities are the easiest to crack, in fact.) All of these vulnerabilities could be exploited in the wild, as these hackers demonstrate.<\/p>\n<p>This was just day one of the Pwn2Own contest. Other platforms and devices are sure to be hacked in the following days, but the prizes for some of them are lower, and fewer hackers are interested in spending the time to work on their vulnerabilities. Full information about the contest, the targets, and the prizes can be found <a href=\"http:\/\/dvlabs.tippingpoint.com\/blog\/2010\/02\/15\/pwn2own-2010\">here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs fell quickly, but so did the iPhone and Windows 7 in day one of the event. It&#8217;s the CanSecWest conference in Vancouver, which hosts the Pwn2Own contest. On [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[63,85],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It&#039;s time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Crack Macs (and Others) for Cash  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-03-25T09:46:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/\",\"name\":\"Hackers Crack Macs (and Others) for Cash - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage\"},\"datePublished\":\"2010-03-25T09:46:50+00:00\",\"dateModified\":\"2010-03-25T09:46:50+00:00\",\"description\":\"It's time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Crack Macs (and Others) for Cash\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Hackers Crack Macs (and Others) for Cash\",\"datePublished\":\"2010-03-25T09:46:50+00:00\",\"dateModified\":\"2010-03-25T09:46:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg\",\"keywords\":[\"Hacking\",\"Macs\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It's time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Crack Macs (and Others) for Cash  - The Mac Security Blog","og_description":"It's time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs","og_url":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-03-25T09:46:50+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/","name":"Hackers Crack Macs (and Others) for Cash - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage"},"datePublished":"2010-03-25T09:46:50+00:00","dateModified":"2010-03-25T09:46:50+00:00","description":"It's time, once again, for the annual crack-a-thon, in which savvy hackers save up their exploits to earn some cold cash. As is usually the case, Macs","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Crack Macs (and Others) for Cash"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Hackers Crack Macs (and Others) for Cash","datePublished":"2010-03-25T09:46:50+00:00","dateModified":"2010-03-25T09:46:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#webpage"},"wordCount":368,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-crack-macs-and-others-for-cash\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/cansecwest10.jpg","keywords":["Hacking","Macs"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1475"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1475"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1475\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}