Researcher awarded $50,000 for discovering Samsung Galaxy S21 hack
UK researcher Sam Thomas won the Pwn2Own bounty using a "unique three-bug chain"


A senior UK-based cyber security researcher has been awarded $50,000 (£37,168) for successfully hacking a Samsung Galaxy S21 device using a novel exploit.
Sam Thomas, director of research at Pentest Limited, broke into one of Samsung's premium smartphones while competing in Pwn2Own Austin, a regular hacking competition run by Trend Micro's Zero Day Initiative (ZDI).
Thomas used a "unique three-bug chain" to compromise the Samsung Galaxy S21, a feat no other competitor was able to achieve.
The specific methods Thomas used to achieve compromise the device have not been detailed by either the researcher or the ZDI. IT Pro contacted Thomas for further details but he did not reply at the time of publication.
The researcher's success came a day after two other researchers from Singapore-based STARLabs also successfully achieved code execution on the Samsung Galaxy S21.
In Pwn2Own competitions, researchers are required to enter a disclosure room with the affected vendor after the competition round is over to detail the vulnerability they exploited. At this stage, it was revealed that the bug STARLabs researchers used to break the smartphone was already known to Samsung, though not known to the public.
Because of this, the STARLabs researchers were given a reduced prize of $25,000 (£18,620). Thomas received the biggest prize due to the novel nature of the exploit he used.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
A day before Thomas' Samsung success, he also demonstrated how a different three-bug chain could be used to achieve code execution on a My Cloud Pro Series PR4100 network attached storage (NAS) device. The chain included an unsafe redirect and a command injection - a piece of work which earned Thomas a further $40,000 (£29,790) in prize money.
Pwn2Own tournaments see security experts compete against each other in a series of rounds over a number of days to accumulate prize money and 'Master of Pwn' points. The researcher with the most points wins the competition, a trophy, a champion's jersey, and 65,000 ZDI points.
The ZDI points give the researcher Platinum status in the ZDI, meaning they receive a one-time payout of $25,000 (£18,620), a 25% bonus on rewards for any future vulnerability disclosures, and a 50% point multiplier for further discoveries.
At the time of writing, and with one day remaining in the event, Thomas sits in fourth place with a total of nine points and $90,000 (£66,960) in accumulated prize money.
RELATED RESOURCE
The devices to be targeted in Pwn2Own competitions are chosen before each event by the organisers. NAS drives were introduced last year, returning this year, with printers also being included as a new addition to the competition.
Apple's iPhone 12 and Google's Pixel 5 were both in the smartphone category for this year, but no attempts had been made on either of them at the time of writing.
The full list of device categories for Pwn2Own 2021 includes smartphones, printers, NAS drives, home automation, televisions, routers, and external SSDs.
So far, the ZDI has awarded $1,016,250 (£756,908) in prize money with one day left to go.
In previous Pwn2Own events, high-profile disclosures have been found in major products such as Microsoft Teams, Apple's iPhone, Zoom, Adobe Reader, Oracle VirtualBox, Google Chrome and many more.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
The Race Is On for Higher Ed to Adapt: Equity in Hyflex Learning
By ITPro
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro