search Nothing found
Main Dictionary Z

Zero-Day Attack

The term zero-day attack is used for describing recently discovered intrusions in a security system that can be exploited by hackers to break through the system. A zero-day attack occurs as a result of attackers exploiting a sensitivity before developers have managed to fix it.

Zero-Day Attack explained

In general, zero-day attacks are those that  take advantage of new software vulnerabilities not yet known to the community. For example, from the moment an computer trespasser discovers a vulnerability until a patch is released and installed, it can take a long time for the sensitivity to be actively exploited to block resources and steal information. To stage a successful zero-day attack, a hacker needs to assemble a botnet within a short period of time, and it is better if the bots are previously uncompromised servers. 

The tactic of using zero-day vulnerabilities is perfectly suited for these purposes. That is why this practice is becoming increasingly popular among hackers around the world. In order to execute the intended action, a hacker needs to gain access to a server that is running software with a 0-day vulnerability. He would then be able to use it to carry out the attacks mentioned above. Thus, there is no need for a large number of bots.

How does Zero-Day Attack work

Programs normally have vulnerabilities in security systems that facilitate hackers in zero-day attacks. Software developers are always looking for zero-day attack vulnerabilities that need to be fixed. As a result, software updates are developed and released.

Sometimes, however, attackers discover a vulnerability before the developers do. Until the sensitivity is closed, computer trespassers can write and inject code to  take advantage of it. This is called exploit code.

Program users can be harmed by malware. For example, hackers can steal the user’s identity or perform other cybercrimes. When finding a zero-day vulnerability, hackers need to gain access to the vulnerable system. This is often done through social engineering emails impersonating the attackers messages from known legitimate senders. The goal of the message is to make the user perform a certain action, they can ask to open a certain file or visit a malicious website. This action starts the zero-day attack and downloads the computer trespasser's malware, penetrating the user's files and stealing sensitive data.

One promising way to confront it is to create a digital immune system based on artificial intelligence. Google, in particular, is doing this in its Chronicle system, which is under development and will analyze security threats in large enterprises.

Not all zero-day attack vulnerabilities are immediately known to the general public. On the contrary, there are companies that make a business out of buying information about such vulnerabilities and reselling it on the dark market. By the way, the buyers are not always criminal structures. Often they are purchased by various government organizations in different countries. For example, in order to conduct cyberattacks on unfriendly countries or to hack the correspondence of criminals. Corporations are also interested in such vulnerabilities and use them for industrial espionage.