{"id":33936,"date":"2020-03-20T08:06:09","date_gmt":"2020-03-20T08:06:09","guid":{"rendered":"http:\/\/7319fc09-937b-40a2-b8c1-486fd54427c7"},"modified":"2020-03-20T08:06:09","modified_gmt":"2020-03-20T08:06:09","slug":"windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/","title":{"rendered":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/03\/20\/714cf4c9-0d57-4762-a2b7-360477081b52\/pwn2own.jpg\" class alt=\"Pwn2Own\"><\/span><\/p>\n<p>The 2020 spring edition of the Pwn2Own hacking contest has come to a close today.<\/p>\n<p>This year&#8217;s winner is Team Fluoroacetate &#8212; made up of security researchers Amat Cama and Richard Zhu &#8212; who won the contest after accumulating nine points across the two-day competition, which was just enough to extend their dominance and win their fourth tournament in a row.<\/p>\n<p>But this year&#8217;s edition was a notable event for another reason. While the spring edition of the Pwn2Own hacking contest takes place at the CanSecWest cyber-security conference, held each spring in Vancouver, Canada, this year was different.<\/p>\n<p>Due to the ongoing coronavirus (<span class=\"link\"><a href=\"https:\/\/www.cbsnews.com\/coronavirus\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">COVID-19<\/a><\/span>) outbreak and travel restrictions imposed in many countries around the globe, many security researchers couldn&#8217;t attend or weren&#8217;t willing to travel to Vancouver and potentially put their health at risk.<\/p>\n<p>Instead, this year&#8217;s Pwn2Own edition has become the first-ever hacking contest that has been hosted in a virtual setting.<\/p>\n<p>Participants sent exploits to Pwn2Own organizers in advance, who ran the code during a live stream with all participants present.<\/p>\n<p>During the competition&#8217;s two-day schedule, six teams managed to hack apps and operating systems like Windows, macOS, Ubuntu, Safari, Adobe Reader, and Oracle VirtualBox. All bugs exploited during the contest were immediately reported to their respective companies.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The results of the two-day contest are below, broken down per each team&#8217;s attempt. The table at the bottom of the article is the competition&#8217;s final ranking.<\/p>\n<h3>Day One<\/h3>\n<p><strong>EXPLOIT #1:<\/strong> The Georgia Tech Systems Software &amp; Security Lab (<a href=\"https:\/\/twitter.com\/SSLab_Gatech\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">SSLab_Gatech<\/a>) team of Yong Hwi Jin (<a href=\"https:\/\/twitter.com\/jinmo123\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@jinmo123<\/a>), Jungwon Lim (<a href=\"https:\/\/twitter.com\/setuid0x0_\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@setuid0x0_<\/a>), and Insu Yun (<a href=\"https:\/\/twitter.com\/insu_yun_en\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@insu_yun_en<\/a>) targeted Apple Safari with a macOS kernel escalation of privilege.<\/p>\n<p><strong><em>The exploit was successful<\/em><\/strong> &#8211; The Georgia Tech team used a six-bug exploit chain to pop the calculator app on macOS and escalate its access rights to root. They earn $70,000 USD and 7 Master of Pwn points.<\/p>\n<hr>\n<p><strong>EXPLOIT #2:<\/strong> <a href=\"https:\/\/twitter.com\/RZ_fluorescence\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Flourescence<\/a> (Richard Zhu) targeted Microsoft Windows with a local privilege escalation.<\/p>\n<p><strong><em>The exploit was successful<\/em><\/strong> &#8211; The Pwn2Own veteran used a use-after-free vulnerability in Windows to escalate privileges. He earned $40,000 USD and 4 points towards Master of Pwn.<\/p>\n<hr>\n<p><strong>EXPLOIT #3:<\/strong> Manfred Paul of the <a href=\"https:\/\/twitter.com\/redrocket_ctf\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">RedRocket CTF<\/a> team targeted Ubuntu Desktop with a local privilege escalation.<\/p>\n<p><strong><em>The exploit was successful<\/em><\/strong> &#8211; The Pwn2Own newcomer used an improper input validation bug to escalate privileges. This earned him $30,000 and 3 Master of Pwn points.<\/p>\n<hr>\n<p><strong>EXPLOIT #4:<\/strong> The <a href=\"https:\/\/www.twitter.com\/fluoroacetate\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Fluoroacetate<\/a> team of Amat Cama and Richard Zhu targeted Microsoft Windows with a local privilege escalation.<\/p>\n<p><strong><strong><em>The exploit was successful<\/em><\/strong><\/strong> &#8211; The returing Master of Pwn winners leveraged a use-after-free bug in Windows to escalate to SYSTEM. The exploit earns them $40,000 and 4 Master of Pwn points.<\/p>\n<h3>Day Two<br \/><\/h3>\n<p><strong>EXPLOIT #5:<\/strong> Phi Ph\u1ea1m H\u1ed3ng (<a href=\"https:\/\/twitter.com\/4nhdaden\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@4nhdaden<\/a>) of STAR Labs (<a href=\"https:\/\/twitter.com\/starlabs_sg\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@starlabs_sg<\/a>) targeted Oracle VirtualBox in the Virtualization category.<\/p>\n<p><strong><strong><em>The exploit was successful<\/em><\/strong><\/strong> &#8211; The researcher used an out-of-bounds read bug for an info leak and an unitialized variable for code execution on the VirtualBox hypervisor. He earns himself $40,000 and 4 Master of Pwn points.<\/p>\n<hr>\n<p><strong>EXPLOIT #6:<\/strong> The <a href=\"https:\/\/www.twitter.com\/fluoroacetate\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Fluoroacetate<\/a> team of Amat Cama and Richard Zhu targeted Adobe Reader with a Windows local privilege escalation.<\/p>\n<p><strong><strong><em>The exploit was successful<\/em><\/strong><\/strong> &#8211; The Fluoroacetate duo used a pair of use-after-free bugs &#8211; one in Acrobat and one in the Windows kernel &#8211; to elevate privilieges and to over the system. They earn $50,000 and 5 points towards Master of Pwn.<\/p>\n<hr>\n<p><strong>EXPLOIT #7:<\/strong> The <a href=\"https:\/\/twitter.com\/Synacktiv\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Synacktiv<\/a> team of Corentin Bayet (<a href=\"https:\/\/twitter.com\/OnlyTheDuck\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@OnlyTheDuck<\/a>) and Bruno Pujos (<a href=\"https:\/\/twitter.com\/BrunoPujos\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">@BrunoPujos<\/a>) targeted the VMware Workstation in the Virtualization category.<\/p>\n<p><strong><strong><em>The exploit attempt failed<\/em><\/strong><\/strong> &#8211; The team was unable to demonstrate their exploit in the time allotted.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/\" class=\"lazy\" alt=\"pwn2own-2020-spring-winners.jpg\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/03\/20\/ceae5074-56a5-4b40-bb39-aadf094ce168\/pwn2own-2020-spring-winners.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/03\/20\/ceae5074-56a5-4b40-bb39-aadf094ce168\/pwn2own-2020-spring-winners.jpg\" class alt=\"pwn2own-2020-spring-winners.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Trend Micro<\/span> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Team Fluoroacetate wins fourth tournament in a row.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33937,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-33936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-20T08:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest\",\"datePublished\":\"2020-03-20T08:06:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/\",\"name\":\"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg\",\"datePublished\":\"2020-03-20T08:06:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg\",\"width\":1000,\"height\":455},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/","og_locale":"en_US","og_type":"article","og_title":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-20T08:06:09+00:00","og_image":[{"width":1000,"height":455,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest","datePublished":"2020-03-20T08:06:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/"},"wordCount":621,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/","url":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/","name":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg","datePublished":"2020-03-20T08:06:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest.jpg","width":1000,"height":455},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33936"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33936\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33937"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}