Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Realme C71 Launched in India With 6,300mAh Battery, Reverse Charging Support

15 July 2025

You Can Skip Locations And Parts Of The Story In Donkey Kong Bananza, Thanks To The Game’s Destruction

15 July 2025

Tech Billionaires Back Erebor in the Wake of Silicon Valley Bank Collapse

15 July 2025
Facebook X (Twitter) Instagram
Just In
  • Realme C71 Launched in India With 6,300mAh Battery, Reverse Charging Support
  • You Can Skip Locations And Parts Of The Story In Donkey Kong Bananza, Thanks To The Game’s Destruction
  • Tech Billionaires Back Erebor in the Wake of Silicon Valley Bank Collapse
  • Global Smartphone Market Grew 1 Percent YoY in Q2 2025; Samsung, Vivo Witness Biggest Jump in Shipments: IDC
  • Tony Hawk’s Pro Skater 3 + 4 Review And Xbox Layoffs (Feat. Ash Parrish)
  • Samsung Said to Have Begun Testing One UI 8 on Galaxy Z Fold 4 and Galaxy Z Flip 4
  • The Outlast Trials Season 4 Adds Conjoined Twins Killer, Shopping Mall Level, And More Today
  • iPhone 17 Lineup to Launch in the Second Week of September: Report
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Did a Chinese University Hacking Competition Target a Real Victim?
News

Did a Chinese University Hacking Competition Target a Real Victim?

News RoomBy News Room18 September 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking and security skills, and to assist employers and government agencies with discovering and recruiting new talent.

But one security conference in China may have taken its contest a step further—potentially using it as a secret espionage operation to get participants to collect intelligence from an unknown target.

According to two Western researchers who translated documentation for China’s Zhujian Cup, also known as the National Collegiate Cybersecurity Attack and Defense Competition, one part of the three-part competition, held last year for the first time, had a number of unusual characteristics that suggest its potentially secretive and unorthodox purpose.

Capture the flag (CTF) and other types of hacking competitions are generally hosted on closed networks or “cyber ranges”—dedicated infrastructure set up for the contest so that participants don’t risk disrupting real networks. These ranges provide a simulated environment that mimics real-world configurations, and participants are tasked with finding vulnerabilities in the systems, obtaining access to specific parts of the network, or capturing data.

There are two major companies in China that set up cyber ranges for competitions. The majority of the competitions give a shout out to the company that designed their range. Notably, Zhujian Cup didn’t mention any cyber range or cyber range provider in its documentation, leaving the researchers to wonder if this is because the contest was held in a real environment rather than a simulated one.

The competition also required students to sign a document agreeing to several unusual terms. They were prohibited from discussing the nature of the tasks they were asked to do in the competition with anyone; they had to agree not to destroy or disrupt the targeted system; and at the end of the competition, they had to delete any backdoors they planted on the system and any data they acquired from it. And unlike other competitions in China the researchers examined, participants in this portion of the Zhujian Cup were prohibited from publishing social media posts revealing the nature of the competition or the tasks they performed as part of it.

Participants also were prohibited from copying any data, documents, or printed materials that were part of the competition; disclosing information about vulnerabilities they found; or exploiting those vulnerabilities for personal purposes. If a leak of any of this data or material occurred and caused harm to the contest organizers or to China, according to the pledge that participants signed, they could be held legally responsible.

“I promise that if any information disclosure incident (or case) occurs due to personal reasons, causing loss or harm to the organizer and the country, I, as an individual, will bear legal responsibility in accordance with the relevant laws and regulations,” the pledge states.

The contest was hosted last December by Northwestern Polytechnical University, a science and engineering university in Xi’an, Shaanxi, that is affiliated with China’s Ministry of Industry and Information Technology and also holds a top-secret clearance to conduct work for the Chinese government and military. The university is overseen by China’s People’s Liberation Army.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Sheets vs. Microsoft Excel: Which is better?
Next Article NYT Connections: hints and answers for Wednesday, September 18

Related Articles

News

Tech Billionaires Back Erebor in the Wake of Silicon Valley Bank Collapse

15 July 2025
News

Do You Need a Box Spring?

15 July 2025
News

The Best Baby Bottle Washers

15 July 2025
News

The Best Android Tablets

15 July 2025
News

This Guy Attached 21 Chef’s Knives to a Slicing Robot Arm to Determine Which One Is Best

15 July 2025
News

The Enshittification of American Power

15 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Phones

Samsung Said to Have Begun Testing One UI 8 on Galaxy Z Fold 4 and Galaxy Z Flip 4

News Room15 July 2025
Gaming

The Outlast Trials Season 4 Adds Conjoined Twins Killer, Shopping Mall Level, And More Today

News Room15 July 2025
Phones

iPhone 17 Lineup to Launch in the Second Week of September: Report

News Room15 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Global Smartphone Market Grew 1 Percent YoY in Q2 2025; Samsung, Vivo Witness Biggest Jump in Shipments: IDC

15 July 2025

Tony Hawk’s Pro Skater 3 + 4 Review And Xbox Layoffs (Feat. Ash Parrish)

15 July 2025

Samsung Said to Have Begun Testing One UI 8 on Galaxy Z Fold 4 and Galaxy Z Flip 4

15 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.