Tag - exploits

AIs Exploiting Smart Contracts
I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature. Here’s some interesting research on training AIs to automatically exploit smart contracts: > AI models are increasingly good at cyber tasks, as we’ve written about before. > But what is the economic impact of these capabilities? In a recent MATS and > Anthropic Fellows project, our scholars investigated this question by > evaluating AI agents’ ability to exploit smart contracts on Smart CONtracts > Exploitation benchmark (SCONE-bench)­a new benchmark they built comprising 405 > contracts that were actually exploited between 2020 and 2025. On contracts > exploited after the latest knowledge cutoffs (June 2025 for Opus 4.5 and March > 2025 for other models), Claude Opus 4.5, Claude Sonnet 4.5, and GPT-5 > developed exploits collectively worth $4.6 million, establishing a concrete > lower bound for the economic harm these capabilities could enable. Going > beyond retrospective analysis, we evaluated both Sonnet 4.5 and GPT-5 in > simulation against 2,849 recently deployed contracts without any known > vulnerabilities. Both agents uncovered two novel zero-day vulnerabilities and > produced exploits worth $3,694, with GPT-5 doing so at an API cost of $3,476. > This demonstrates as a proof-of-concept that profitable, real-world autonomous > exploitation is technically feasible, a finding that underscores the need for > proactive adoption of AI for defense...
AI
Uncategorized
academic papers
exploits
blockchain
Apple’s Bug Bounty Program
Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website: > Today we’re announcing the next major chapter for Apple Security Bounty, > featuring the industry’s highest rewards, expanded research categories, and a > flag system for researchers to objectively demonstrate vulnerabilities and > obtain accelerated awards. > > 1. We’re doubling our top award to $2 million for exploit chains that can > achieve similar goals as sophisticated mercenary spyware attacks. This is > an unprecedented amount in the industry and the largest payout offered by > any bounty program we’re aware of ­ and our bonus system, providing > additional rewards for Lockdown Mode bypasses and vulnerabilities > discovered in beta software, can more than double this reward, with a > maximum payout in excess of $5 million. We’re also doubling or > significantly increasing rewards in many other categories to encourage > more intensive research. This includes $100,000 for a complete Gatekeeper > bypass, and $1 million for broad unauthorized iCloud access, as no > successful exploit has been demonstrated to date in either category. ...
Apple
Uncategorized
spyware
vulnerabilities
exploits
Zero-Day Exploit in WinRAR File
A zero-day vulnerability in WinRAR is being exploited by at least two Russian criminal groups: > The vulnerability seemed to have super Windows powers. It abused alternate > data streams, a Windows feature that allows different ways of representing the > same file path. The exploit abused that feature to trigger a previously > unknown path traversal flaw that caused WinRAR to plant malicious executables > in attacker-chosen file paths %TEMP% and %LOCALAPPDATA%, which Windows > normally makes off-limits because of their ability to execute code. More details in the article...
Russia
Uncategorized
malware
zero-day
exploits