Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»China Revives Tianfu Cup Hacking Contest Under Increased Secrecy
    Cybersecurity

    China Revives Tianfu Cup Hacking Contest Under Increased Secrecy

    adminBy adminFebruary 14, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Tianfu Cup hacking competition
    Share
    Facebook Twitter LinkedIn Pinterest Email

    China’s Tianfu Cup hacking contest made its return in 2026, now overseen by the government and marked by limited transparency.

    Tianfu Cup was launched as an alternative to the Zero Day Initiative’s Pwn2Own competition, which regularly pays out more than $1 million to white hat hackers who demonstrate critical vulnerabilities in consumer and enterprise hardware and software, industrial control systems, and automotive products. 

    Tianfu Cup made headlines in 2021, when participants earned a total of $1.9 million for exploits targeting Windows, Ubuntu, iOS, Microsoft Exchange, Chrome, Safari, Adobe Reader, Asus routers, and various virtualization products.

    The hacking competition took a break in 2022 and returned in 2023 with a focus on domestic products from companies such as Huawei, Xiaomi, Tencent, and Qihoo 360. Little information was provided about the results of the 2023 event.

    After a two-year hiatus in 2024 and 2025, the Tianfu Cup returned in 2026, but again little information has been made public. The event took place January 29-30. 

    According to threat intelligence firm Natto Thoughts, the hacking competition is now organized by China’s Ministry of Public Security (MPS) and it appears to be even more secretive.

    Advertisement. Scroll to continue reading.

    Eugenio Benincasa, an ETH Zurich cybersecurity researcher focusing on China, pointed out in a Natto Thoughts blog post that the MPS announced the Tianfu Cup on January 16. A few days later, a post announcing the event was also published on Tianfu Cup’s X account, but it was quickly removed.

    A day later, the competition’s official website became inaccessible to visitors from outside of China, and after the event ended the website was completely taken offline. 

    Tianfu Cup targets

    Natto Thoughts obtained the list of Tianfu Cup targets before the site was taken down. It included smartphones such as the iPhone 17, Xiaomi 14 Ultra, Honor Magic 7 Pro, Samsung Galaxy S24 Ultra, Google Pixel 9 Pro XL, Vivo X300, and Oppo Find X9 Pro. 

    A translation of the requirements for hacking these devices reads, “Ability to achieve remote code execution, sandbox escape, kernel privilege escalation, and local kernel privilege escalation on the competition device, thereby obtaining device privileges and data.”

    In the operating systems category, hackers were invited to demonstrate exploits against Windows 11, Ubuntu, macOS, UOS, and KylinOS. The browsers category included Chrome, Edge, and Safari. 

    Targeted cloud and virtualization products included VMware ESXi, Oracle VirtualBox, ZStack Cloud, QEMU, and Docker Engine, with participants being asked to gain elevated privileges on the host system.

    Hackers were also invited to fully compromise cybersecurity products from Hillstone Networks, Palo Alto Networks, and the Chinese firm Topsec.

    The target list also included Microsoft Exchange Server and Coremail mail servers; WeChat, Feishu (Lark), Teams, Zoom, and DingTalk communication apps; and PostgreSQL, Dameng, TiDB, KingbaseES, GBase, and Redis databases.

    Office applications such as Microsoft Office 365, WPS Office, Foxit PDF Editor, Adobe Acrobat Reader, Sogou, Weaver E-cology, Seeyon, and Yonyou YonBIP were also on the list.

    Tianfu Cup 2026 also had an AI category that included Hugging Face, Ollama, OpenLLM, vLLM, Text Generation Inference (TGI), Dify, RagFlow, Coze Studio, LangChain, and ComfyUI, with the goal of achieving remote code execution in the default configuration. 

    New rules and smaller prizes

    An industry insider with knowledge of the Tianfu Cup told SecurityWeek that “rules and targets have changed a lot” this year, but could not provide additional information.

    Natto Thoughts noted that this year’s event featured a track in which participants used AI agents to identify vulnerabilities during the competition.

    Another new track focused on reproducing exploits for known vulnerabilities. 

    While there appears to be no public information on individual rewards from this year’s competition, a press release from China’s MPS states a total prize pool of CN¥ 1 million (approximately $140,000), significantly smaller than five years ago.

    The exploits will likely go to the Chinese government

    Regulations implemented by China in 2021 require Chinese citizens who discover a zero-day vulnerability to report the details to the government and not disclose it to any third party outside the country. 

    One year later, Microsoft warned that Chinese nation-state threat actors had been leveraging the law to stockpile zero-days for their sophisticated attacks.

    Evidence indicates that the exploits demonstrated at previous editions of the Tianfu Cup were used in cyberespionage operations by Chinese state-sponsored groups, and Natto Thoughts believes the vulnerabilities disclosed now will face a similar fate. 

    “The central role of the MPS in organizing the competition, combined with past episodes that raised long-standing suspicions and the absence of transparent [coordinated vulnerability disclosure] rules, suggests a system oriented toward vulnerability retention and state control rather than on vendor notification or coordinated disclosure,” the threat intel firm noted.

    Related: $2.5 Million Offered at Upcoming ‘Matrix Cup’ Chinese Hacking Contest

    Related: Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom Firms

    Related: Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

    China Contest Cup hacking Increased Revives Secrecy Tianfu
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis Firefox extension saves me so much time every day
    Next Article Why dual-connectors are mandatory in 2026
    admin
    • Website

    Related Posts

    Quantum Decryption of RSA is Much Closer than Expected

    March 3, 2026

    Quantum-Resistant Data Diode Secures Data on Edge Devices

    March 3, 2026

    AI Agents: The Next Wave Identity Dark Matter

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    A Practical Guide for GTM Teams

    March 3, 2026

    This new Samsung slidable phone concept expands from the top

    March 3, 2026

    Quantum Decryption of RSA is Much Closer than Expected

    March 3, 2026

    Meta introduces click and engage-through attribution updates

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (578)
    • Privacy & Online Earning (81)
    • SEO & Digital Marketing (362)
    • Tech Tools & Mobile / Apps (715)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    A Practical Guide for GTM Teams

    March 3, 2026

    This new Samsung slidable phone concept expands from the top

    March 3, 2026

    Quantum Decryption of RSA is Much Closer than Expected

    March 3, 2026
    Most Popular
    • A Practical Guide for GTM Teams
    • This new Samsung slidable phone concept expands from the top
    • Quantum Decryption of RSA is Much Closer than Expected
    • Meta introduces click and engage-through attribution updates
    • How to Prevent Your Smartwatch Band From Irritating Your Skin
    • Quantum-Resistant Data Diode Secures Data on Edge Devices
    • I ditched my gas generator for battery backup, and I’m never looking back
    • AI Agents: The Next Wave Identity Dark Matter
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.