vcslab Profile Banner
VCSLab Profile
VCSLab

@vcslab

Followers
3K
Following
202
Media
15
Statuses
111

This is the Twitter channel of VCSLab - the research team of Viettel Cyber Security

Hanoi, Vietnam
Joined August 2021
Don't wanna be here? Send us removal request.
@thezdi
Trend Zero Day Initiative
25 days
We have another collision. Team Viettel used two bugs to exploit the Lexmark CX532adwe. While their heap based buffer over was unique, the other bug has been seen earlier in the contest. They still earn $7,500 and 1.5 Master of Pwn points. #Pwn2Own
0
2
15
@thezdi
Trend Zero Day Initiative
25 days
Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
0
2
32
@thezdi
Trend Zero Day Initiative
26 days
Another confirmation! Dinh Ho Anh Khoa (@_l0gg) and Phan Vinh Khang (@pivik_) of Viettel Cyber Security used a unique command injection and two bugs that collided with previous bugs to exploit the Home Automation Green. They earn $12,500 and 2.75 Master of Pwn points. #Pwn2Own
0
7
69
@thezdi
Trend Zero Day Initiative
26 days
๐Ÿ Boom! @ViettelCyberSec kicks off Day 2 of #Pwn2Own Ireland as they slip past the @home_assistant Greenโ€™s defenses! Smart home, smarter hack. They head off for the first disclosure of the day. #P2OIreland
0
3
17
@ViettelCyberSec
Viettel Cyber Security
4 months
Our researcher Khoa Dinh just published his findings for ToolShell Check it here
@_l0gg
Khoa Dinh
4 months
Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.co/gT0aoKXkig #SharePoint #ToolShell
0
1
6
@ViettelCyberSec
Viettel Cyber Security
4 months
๐Ÿšจ VCS warns of active attacks on a critical SharePoint vuln we first discovered & reported. Hackers can bypass auth & take over on-prem servers. ๐Ÿ“Œ Read our guidance: prevention, detection, hunting & more. https://t.co/nbzLcN0rWp
0
4
15
@vcslab
VCSLab
4 months
๐ŸŒŸ Huge shoutout to our brilliant researcher @_l0gg for discovering the critical SharePoint vulnerability at Pwn2Own Berlin! ๐Ÿ” His in-depth analysis of the widely exploited ToolShell flaw is a must-read for the cybersecurity community.
@_l0gg
Khoa Dinh
4 months
Blog for ToolShell Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.co/gT0aoKXkig #SharePoint #ToolShell
0
0
4
@vcslab
VCSLab
4 months
๐Ÿšจ Shocking impact from the SharePoint vulnerability we found at Pwn2Own! ๐Ÿ˜ฑ Despite our efforts to patch it ๐Ÿค, many systems are still at risk โš ๏ธ. Secure yours now! ๐Ÿ”’ Details:
1
9
37
@_l0gg
Khoa Dinh
4 months
Viettel Cyber Security Press Release for Customer alert, Latest research and Recommendations. Blog is comming https://t.co/JY6zGnTg6T #SharePoint #ToolShell
0
4
26
@thezdi
Trend Zero Day Initiative
6 months
That brings Day Two of #Pwn2Own Berlin. So far, we have awarded $695,000 for 20 unique 0-days. STAR Labs has a commanding lead in Master of Pwn points and seem untouchable. Tune in tomorrow for the final day to see how it ends!
0
9
58
@thezdi
Trend Zero Day Initiative
6 months
Confirmed! Viettel Cyber Security (@vcslab) used an OOB Write for their Guest-to-Host escape on #Oracle VirtualBox. The earn themselves $40,000 and 4 Master of Pwn points.
0
12
79
@vcslab
VCSLab
6 months
Blockbuster from @_l0gg Congratulation ๐Ÿฅณ๐Ÿฅณ๐Ÿฅณ
@thezdi
Trend Zero Day Initiative
6 months
Confirmed!! Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit #Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OBerlin
0
0
8
@vcslab
VCSLab
6 months
First successful entry for the Pwn2Own Berlin 2025 from our team ๐Ÿพ๐Ÿพ๐Ÿพ
@thezdi
Trend Zero Day Initiative
6 months
Boom! Viettel Cyber Security @vcslab was successful in demonstrating their attempt against NVIDIA Triton Inference Server - they are headed off to the disclosure room now. #Pwn2Own #P2OBerlin
0
0
6
@vcslab
VCSLab
10 months
๐Ÿšจ Pwn2Own Automotive 2025 is a wrap! ๐Ÿš—๐Ÿ’ฅ ๐ŸŽ‰ We proudly made it to the Top 5 teams in our debut in the Automotive category! With 4 entries, 8.75 points, and $53,750 awarded, weโ€™re just getting started in this exciting new field. ๐Ÿ’ช Here's to more breakthroughs ahead! ๐ŸŒ๐Ÿ”ฅ
@thezdi
Trend Zero Day Initiative
10 months
And thatโ€™s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. #P2OAuto
0
1
12
@ViettelCyberSec
Viettel Cyber Security
10 months
After 2 thrilling days, our journey has come to an end, and guess what? Our white-hat hacker team is proudly in the Top 5 of the worldโ€™s greatest! ๐Ÿ“ท๐Ÿ“ท Now itโ€™s time to pack those trophies, head back to Vietnam, and celebrate Tet! ๐Ÿ“ท๐Ÿ“ท Welcome home, our champions @vcslab
@thezdi
Trend Zero Day Initiative
10 months
Day 2 of #Pwn2Own Automotive comes to a close. We awarded $335,500, which brings the event total to $718,250. So far, 39 unique 0-days have been disclosed, & we've seen research never before demonstrated. @SinSinology has a commanding lead for Master of Pwn. Stay tuned for Day 3.
1
2
10
@thezdi
Trend Zero Day Initiative
10 months
In an #Pwn2Own After Dark entry, the team from @vcslab exploited the Sonyโ€ฏXAV-AX8500, but the bug they used was previously know. They earn $5,000 and 1 Master of Pwn point. #P2OAuto #Pwn2Own
0
1
7
@ViettelCyberSec
Viettel Cyber Security
10 months
ๅˆๆ—ฅใŒ็„กไบ‹ใซ็ต‚ไบ†ใ—ใพใ—ใŸใ€‚ใ”ๆ”ฏๆดใ„ใŸใ ใใ€ๆœฌๅฝ“ใซใ‚ใ‚ŠใŒใจใ†ใ”ใ–ใ„ใพใ™ใ€‚ๆ˜Žๆ—ฅใ‚‚ใ•ใ‚‰ใซๅคšใใฎๅ‹ๅˆฉใŒๅพ…ใฃใฆใ„ใพใ™๏ผ#ใ‚ขใƒซใƒ‘ใ‚คใƒณ #Kenwood Our first day has come to an end with two successful exploitations ๐Ÿ˜Š and we got into Top 5 Thank you for your support. More victories await us
0
1
7
@thezdi
Trend Zero Day Initiative
10 months
Confirmed! @vcslab used an OS command injection bug to exploit the #Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points.
1
2
14
@vcslab
VCSLab
10 months
๐ŸšจProud to join Pwn2Own Tokyo 2025! ๐ŸŒ๐Ÿ’ฅ ๐Ÿ’ช Ready to take on the challenge and own it! ๐Ÿ”ฅ #CyberSecurity #Pwn2Own #vcslab #Viettel
@thezdi
Trend Zero Day Initiative
10 months
The schedule for #Pwn2Own Automotive is live! We have 50 entries from 21 teams across three categories. EV Chargers and IVI systems turned out to be popular choices. See the full schedule at https://t.co/Cfz5xKvMYV #P2OAuto
1
1
12
@vcslab
VCSLab
1 year
Rock on๐Ÿค˜๐Ÿค˜๐Ÿค˜ It is interesting to hear the legendary stories surrounding the rocks here. #Pwn2Own #Ireland #MasterOfPwn
2
4
41