vcslab's profile picture. This is the Twitter channel of VCSLab - the research team of Viettel Cyber Security

VCSLab

@vcslab

This is the Twitter channel of VCSLab - the research team of Viettel Cyber Security

VCSLab reposted

We have another collision. Team Viettel used two bugs to exploit the Lexmark CX532adwe. While their heap based buffer over was unique, the other bug has been seen earlier in the contest. They still earn $7,500 and 1.5 Master of Pwn points. #Pwn2Own

thezdi's tweet image. We have another collision. Team Viettel used two bugs to exploit the Lexmark CX532adwe. While their heap based buffer over was unique, the other bug has been seen earlier in the contest. They still earn $7,500 and 1.5 Master of Pwn points. #Pwn2Own
thezdi's tweet image. We have another collision. Team Viettel used two bugs to exploit the Lexmark CX532adwe. While their heap based buffer over was unique, the other bug has been seen earlier in the contest. They still earn $7,500 and 1.5 Master of Pwn points. #Pwn2Own

VCSLab reposted

Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

VCSLab reposted

Another confirmation! Dinh Ho Anh Khoa (@_l0gg) and Phan Vinh Khang (@pivik_) of Viettel Cyber Security used a unique command injection and two bugs that collided with previous bugs to exploit the Home Automation Green. They earn $12,500 and 2.75 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Another confirmation! Dinh Ho Anh Khoa (@_l0gg) and Phan Vinh Khang (@pivik_) of Viettel Cyber Security used a unique command injection and two bugs that collided with previous bugs to exploit the Home Automation Green. They earn $12,500 and 2.75 Master of Pwn points. #Pwn2Own

VCSLab reposted

🏠Boom! @ViettelCyberSec kicks off Day 2 of #Pwn2Own Ireland as they slip past the @home_assistant Green’s defenses! Smart home, smarter hack. They head off for the first disclosure of the day. #P2OIreland


VCSLab reposted

Our researcher Khoa Dinh just published his findings for ToolShell Check it here

Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. blog.viettelcybersecurity.com/sharepoint-too… #SharePoint #ToolShell

_l0gg's tweet image. Blog for ToolShell
Disclaimer: The content of this blog is provided for educational and informational purposes only.
blog.viettelcybersecurity.com/sharepoint-too…
#SharePoint #ToolShell


VCSLab reposted

🚨 VCS warns of active attacks on a critical SharePoint vuln we first discovered & reported. Hackers can bypass auth & take over on-prem servers. 📌 Read our guidance: prevention, detection, hunting & more. viettelsecurity.com/microsoft-shar…

ViettelCyberSec's tweet image. 🚨 VCS warns of active attacks on a critical SharePoint vuln we first discovered & reported.
Hackers can bypass auth & take over on-prem servers.
📌 Read our guidance: prevention, detection, hunting & more.
viettelsecurity.com/microsoft-shar…

🌟 Huge shoutout to our brilliant researcher @_l0gg for discovering the critical SharePoint vulnerability at Pwn2Own Berlin! 🔍 His in-depth analysis of the widely exploited ToolShell flaw is a must-read for the cybersecurity community.

Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. blog.viettelcybersecurity.com/sharepoint-too… #SharePoint #ToolShell

_l0gg's tweet image. Blog for ToolShell
Disclaimer: The content of this blog is provided for educational and informational purposes only.
blog.viettelcybersecurity.com/sharepoint-too…
#SharePoint #ToolShell


🚨 Shocking impact from the SharePoint vulnerability we found at Pwn2Own! 😱 Despite our efforts to patch it 🤝, many systems are still at risk ⚠️. Secure yours now! 🔒 Details: blog.viettelcybersecurity.com/toolshell-a-cr…


VCSLab reposted

Viettel Cyber Security Press Release for Customer alert, Latest research and Recommendations. Blog is comming viettelsecurity.com/microsoft-shar… #SharePoint #ToolShell

_l0gg's tweet image. Viettel Cyber Security Press Release for Customer alert, Latest research and Recommendations. 
Blog is comming
viettelsecurity.com/microsoft-shar…
#SharePoint #ToolShell

VCSLab reposted

That brings Day Two of #Pwn2Own Berlin. So far, we have awarded $695,000 for 20 unique 0-days. STAR Labs has a commanding lead in Master of Pwn points and seem untouchable. Tune in tomorrow for the final day to see how it ends!

thezdi's tweet image. That brings Day Two of #Pwn2Own Berlin. So far, we have awarded $695,000 for 20 unique 0-days. STAR Labs has a commanding lead in Master of Pwn points and seem untouchable. Tune in tomorrow for the final day to see how it ends!

VCSLab reposted

Confirmed! Viettel Cyber Security (@vcslab) used an OOB Write for their Guest-to-Host escape on #Oracle VirtualBox. The earn themselves $40,000 and 4 Master of Pwn points.

thezdi's tweet image. Confirmed! Viettel Cyber Security (@vcslab) used an OOB Write for their Guest-to-Host escape on #Oracle VirtualBox. The earn themselves $40,000 and 4 Master of Pwn points.
thezdi's tweet image. Confirmed! Viettel Cyber Security (@vcslab) used an OOB Write for their Guest-to-Host escape on #Oracle VirtualBox. The earn themselves $40,000 and 4 Master of Pwn points.

Blockbuster from @_l0gg Congratulation 🥳🥳🥳

Confirmed!! Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit #Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OBerlin

thezdi's tweet image. Confirmed!! Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit #Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OBerlin
thezdi's tweet image. Confirmed!! Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit #Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OBerlin


First successful entry for the Pwn2Own Berlin 2025 from our team 🍾🍾🍾

Boom! Viettel Cyber Security @vcslab was successful in demonstrating their attempt against NVIDIA Triton Inference Server - they are headed off to the disclosure room now. #Pwn2Own #P2OBerlin

thezdi's tweet image. Boom!  Viettel Cyber Security @vcslab was successful in demonstrating their attempt against NVIDIA Triton Inference Server - they are headed off to the disclosure room now.  #Pwn2Own #P2OBerlin


🚨 Pwn2Own Automotive 2025 is a wrap! 🚗💥 🎉 We proudly made it to the Top 5 teams in our debut in the Automotive category! With 4 entries, 8.75 points, and $53,750 awarded, we’re just getting started in this exciting new field. 💪 Here's to more breakthroughs ahead! 🌍🔥

And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. #P2OAuto

thezdi's tweet image. And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we  awarded $886,250 for 49 0-days over the three day competition. With 30.5  points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. #P2OAuto


VCSLab reposted

After 2 thrilling days, our journey has come to an end, and guess what? Our white-hat hacker team is proudly in the Top 5 of the world’s greatest! 📷📷 Now it’s time to pack those trophies, head back to Vietnam, and celebrate Tet! 📷📷 Welcome home, our champions @vcslab

Day 2 of #Pwn2Own Automotive comes to a close. We awarded $335,500, which brings the event total to $718,250. So far, 39 unique 0-days have been disclosed, & we've seen research never before demonstrated. @SinSinology has a commanding lead for Master of Pwn. Stay tuned for Day 3.

thezdi's tweet image. Day 2 of #Pwn2Own Automotive comes to a close. We awarded $335,500, which brings the event total to $718,250. So far, 39 unique 0-days have been disclosed, & we've seen research never before demonstrated. @SinSinology has a commanding lead for Master of Pwn. Stay tuned for Day 3.


VCSLab reposted

In an #Pwn2Own After Dark entry, the team from @vcslab exploited the Sony XAV-AX8500, but the bug they used was previously know. They earn $5,000 and 1 Master of Pwn point. #P2OAuto #Pwn2Own

thezdi's tweet image. In an #Pwn2Own After Dark entry, the team from @vcslab exploited the Sony XAV-AX8500, but the bug they used was previously know. They earn $5,000 and 1 Master of Pwn point. #P2OAuto #Pwn2Own

VCSLab reposted

初日が無事に終了しました。ご支援いただき、本当にありがとうございます。明日もさらに多くの勝利が待っています!#アルパイン #Kenwood Our first day has come to an end with two successful exploitations 😊 and we got into Top 5 Thank you for your support. More victories await us…

ViettelCyberSec's tweet image. 初日が無事に終了しました。ご支援いただき、本当にありがとうございます。明日もさらに多くの勝利が待っています!#アルパイン #Kenwood  
Our first day has come to an end with two successful exploitations 😊 and we got into Top 5
Thank you for your support. More victories await us…

VCSLab reposted

Confirmed! @vcslab used an OS command injection bug to exploit the #Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points.

thezdi's tweet image. Confirmed! @vcslab used an OS command injection bug to exploit the #Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points.
thezdi's tweet image. Confirmed! @vcslab used an OS command injection bug to exploit the #Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points.

🚨Proud to join Pwn2Own Tokyo 2025! 🌏💥 💪 Ready to take on the challenge and own it! 🔥 #CyberSecurity #Pwn2Own #vcslab #Viettel

vcslab's tweet image. 🚨Proud to join Pwn2Own Tokyo 2025! 🌏💥

💪 Ready to take on the challenge and own it! 🔥

#CyberSecurity #Pwn2Own #vcslab #Viettel

The schedule for #Pwn2Own Automotive is live! We have 50 entries from 21 teams across three categories. EV Chargers and IVI systems turned out to be popular choices. See the full schedule at zerodayinitiative.com/blog/2025/1/21… #P2OAuto



Rock on🤘🤘🤘 It is interesting to hear the legendary stories surrounding the rocks here. #Pwn2Own #Ireland #MasterOfPwn


Loading...

Something went wrong.


Something went wrong.