Zero-Day Attack
A zero-day attack exploits a software vulnerability that the developer or vendor does not yet know about. Because the flaw is unknown to the party responsible for fixing it, there are “zero days” to prepare a patch before the vulnerability can be exploited.
How zero-day attacks work
- A previously unknown flaw exists in software, firmware, or an IoT device.
- An attacker develops an exploit that takes advantage of that flaw (malware, spyware, remote code execution, etc.).
- The exploit is deployed before the vendor issues a fix or patch, allowing attackers to operate without immediate detection or defense.
- Once the vulnerability becomes known, the vendor typically issues a patch; until then, defenders have limited options.
Typical exploit vectors
- Malicious attachments or links in email and documents
- Malicious websites or drive-by downloads
- Compromised third-party libraries or plugins
- Supply-chain and firmware attacks
Prevention and mitigation
Zero-day attacks are difficult to prevent completely, but organizations and individuals can reduce risk:
* Keep systems and software updated and enable automatic updates.
* Use endpoint detection and response (EDR), intrusion prevention systems (IPS), and behavior-based defenses that can catch suspicious activity even without specific signatures.
* Apply principle of least privilege and network segmentation to limit attacker lateral movement.
* Employ application allow-listing and strong patch management processes.
* Use multi-factor authentication and strict access controls.
* Run vulnerability disclosure and bug-bounty programs to encourage responsible reporting of flaws.
* Monitor logs and alerts for anomalous behavior that could indicate an unknown exploit.
Explore More Resources
Markets for zero-day vulnerabilities
Zero-day information moves in different markets:
* White market: security researchers disclose vulnerabilities to vendors or through coordinated programs; payments may be made via bug bounties.
* Gray market: vulnerabilities are sold to government agencies or private buyers, sometimes under restrictive terms.
* Dark market: attackers trade exploits among criminals; transactions may use anonymity tools and cryptocurrencies.
Prices vary widely depending on exploit reliability, target software, and buyer. Sellers commonly provide proof-of-concept (PoC) demonstrations to establish credibility.
Real-world examples
- Microsoft Word / Dridex (2017): Attackers embedded malicious code in Word documents to deliver a banking trojan, exploiting an unpatched Office vulnerability.
- Google Chrome (2022): Multiple zero-day vulnerabilities prompted urgent user updates; browser vendors frequently release emergency patches for actively exploited flaws.
- Sony Pictures (2014): A high-profile breach used previously unrecognized vulnerabilities and malware to damage systems and exfiltrate data, causing major financial and reputational harm.
Short FAQs
Q: Why is it called a “zero-day” attack?
A: Because the software maker has zero days’ notice to fix the vulnerability once it is discovered or exploited.
Explore More Resources
Q: How are zero-day vulnerabilities fixed?
A: Developers issue a software patch or upgrade that eliminates or mitigates the vulnerability; coordinated disclosure helps ensure patches are released before wide exploitation.
Q: Can antivirus stop zero-day attacks?
A: Signature-based antivirus often can’t detect unknown exploits. Behavior-based tools, EDR, and layered defenses provide better protection.
Explore More Resources
Key takeaways
- A zero-day attack targets a vulnerability unknown to the vendor, giving attackers a window of advantage until a patch is issued.
- Complete prevention is difficult; a layered security approach, timely patching, and proactive disclosure programs are essential to reduce risk.