Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Here are the 40 best Presidents Day deals you can already shop

    Here are the 40 best Presidents Day deals you can already shop

    February 11, 2026
    Samsung’s offering up to 0 of trade-in credit toward its new phones

    Samsung’s offering up to $900 of trade-in credit toward its new phones

    February 11, 2026
    Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

    Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

    February 11, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Did a Chinese University Hacking Competition Target a Real Victim?
    Security

    Did a Chinese University Hacking Competition Target a Real Victim?

    News RoomBy News RoomSeptember 19, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Did a Chinese University Hacking Competition Target a Real Victim?

    Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking and security skills, and to assist employers and government agencies with discovering and recruiting new talent.

    But one security conference in China may have taken its contest a step further—potentially using it as a secret espionage operation to get participants to collect intelligence from an unknown target.

    According to two Western researchers who translated documentation for China’s Zhujian Cup, also known as the National Collegiate Cybersecurity Attack and Defense Competition, one part of the three-part competition, held last year for the first time, had a number of unusual characteristics that suggest its potentially secretive and unorthodox purpose.

    Capture the flag (CTF) and other types of hacking competitions are generally hosted on closed networks or “cyber ranges”—dedicated infrastructure set up for the contest so that participants don’t risk disrupting real networks. These ranges provide a simulated environment that mimics real-world configurations, and participants are tasked with finding vulnerabilities in the systems, obtaining access to specific parts of the network, or capturing data.

    There are two major companies in China that set up cyber ranges for competitions. The majority of the competitions give a shout out to the company that designed their range. Notably, Zhujian Cup didn’t mention any cyber range or cyber range provider in its documentation, leaving the researchers to wonder if this is because the contest was held in a real environment rather than a simulated one.

    The competition also required students to sign a document agreeing to several unusual terms. They were prohibited from discussing the nature of the tasks they were asked to do in the competition with anyone; they had to agree not to destroy or disrupt the targeted system; and at the end of the competition, they had to delete any backdoors they planted on the system and any data they acquired from it. And unlike other competitions in China the researchers examined, participants in this portion of the Zhujian Cup were prohibited from publishing social media posts revealing the nature of the competition or the tasks they performed as part of it.

    Participants also were prohibited from copying any data, documents, or printed materials that were part of the competition; disclosing information about vulnerabilities they found; or exploiting those vulnerabilities for personal purposes. If a leak of any of this data or material occurred and caused harm to the contest organizers or to China, according to the pledge that participants signed, they could be held legally responsible.

    “I promise that if any information disclosure incident (or case) occurs due to personal reasons, causing loss or harm to the organizer and the country, I, as an individual, will bear legal responsibility in accordance with the relevant laws and regulations,” the pledge states.

    The contest was hosted last December by Northwestern Polytechnical University, a science and engineering university in Xi’an, Shaanxi, that is affiliated with China’s Ministry of Industry and Information Technology and also holds a top-secret clearance to conduct work for the Chinese government and military. The university is overseen by China’s People’s Liberation Army.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleGoogle employees’ attempts to hide messages from investigators might backfire
    Next Article Did Google monopolize the ad market?

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Samsung’s offering up to 0 of trade-in credit toward its new phones

    Samsung’s offering up to $900 of trade-in credit toward its new phones

    February 11, 2026
    Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

    Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

    February 11, 2026
    Instagram and X have an impossible deepfake detection deadline

    Instagram and X have an impossible deepfake detection deadline

    February 11, 2026
    TikTok launches Local Feeds in the US

    TikTok launches Local Feeds in the US

    February 11, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Diesel’s wired earbuds look exactly like wired earbuds from Diesel News

    Diesel’s wired earbuds look exactly like wired earbuds from Diesel

    By News RoomFebruary 11, 2026

    Despite evidence to the contrary, not only are wired earbuds alive and well, they’re enjoying…

    The iPhone’s anti-algorithm camera app looks better with a little processing

    The iPhone’s anti-algorithm camera app looks better with a little processing

    February 11, 2026
    How an ‘icepocalypse’ raises more questions about Meta’s biggest data center project

    How an ‘icepocalypse’ raises more questions about Meta’s biggest data center project

    February 11, 2026
    T-Mobile will live translate regular phone calls without an app

    T-Mobile will live translate regular phone calls without an app

    February 11, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.