Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Back to Blog
Emerging Threats

Zero-Day Markets: The Economics of Vulnerability Trading

A zero-day exploit for iOS full-chain remote code execution with persistence is worth between $1 million and $2.5 million on the private market. An Android equivalent fetches $2 to $2.5 million. A Chr…

30 Mar 20262 min read0 views

Introduction

A zero-day exploit for iOS full-chain remote code execution with persistence is worth between $1 million and $2.5 million on the private market. An Android equivalent fetches $2 to $2.5 million. A Chrome RCE with sandbox escape goes for $500,000 to $1 million. These are not theoretical numbers — they are published prices from commercial exploit brokers like Zerodium and Crowdfense. Understanding this market is essential for understanding the threat landscape.

The Three Markets

The white market is bug bounty programs. Apple pays up to $2 million for zero-click kernel code execution. Google pays up to $250,000 for Chrome exploits. These programs incentivize disclosure to the vendor, and they work — Google's Vulnerability Reward Program has paid out over $50 million since inception. But bug bounty payouts are a fraction of what the gray and black markets pay.

The gray market consists of exploit brokers who purchase vulnerabilities and sell them to government agencies and law enforcement. Companies like Zerodium, Crowdfense, and (historically) Hacking Team and NSO Group operate in this space. The buyers are typically intelligence agencies and law enforcement organizations that use the exploits for surveillance and national security operations. This market is legal in most jurisdictions but ethically controversial.

The black market is criminal. Exploit developers sell to ransomware groups, cybercrime syndicates, and anyone willing to pay. Prices are lower than the gray market (a ransomware group cannot pay $2 million for an exploit), but the volume is higher and the exploitation is indiscriminate.

What This Means for Defenders

The existence of a multi-billion-dollar vulnerability market means that zero-day exploits are being used against organizations right now by actors who can afford them. You cannot patch a zero-day (by definition), so your defense must be layered: assume that any single security control can be bypassed and invest in detection and response capabilities that work even when the initial compromise succeeds.

Reduce your attack surface. Every application, every service, every protocol you expose is a potential zero-day target. Disable unnecessary services. Remove unused applications. Minimize your internet-facing footprint. The fewer targets you present, the fewer zero-days are relevant to your environment.

Vulnerability Disclosure Ethics

The security community has debated responsible disclosure for decades. Coordinated disclosure — reporting to the vendor first and allowing time to patch before public disclosure — remains the gold standard. But when vendors are slow to patch, or when exploitation is detected in the wild, the calculus changes. The goal should always be to minimize harm to end users, even when that means uncomfortable conversations with vendors about their patching timelines.

Comments

Keep Reading

Explore Related Topics and Insights

Insider Threat Detection Without Becoming Big Brother
EMERGING THREATS

Insider Threat Detection Without Becoming Big Brother

Insider threat programs have a PR problem. Announce that you are monitoring employee behavior and you will get pushback from HR, legal, works councils, and the employees themselves. And they are not w…

S

Spakto Team

30 Mar 2026
Read article →
Cloud Security Posture Management: Choosing and Deploying CSPM
CLOUD SECURITY

Cloud Security Posture Management: Choosing and Deploying CSPM

When I ran a cloud security assessment for a logistics company last year, we found 847 misconfigurations across their AWS and Azure environments. Seventeen of them were critical — including an S3 buck…

S

Spakto Team

30 Mar 2026
Read article →
Secure Code Review: What Senior Engineers Actually Look For
APPLICATION SECURITY

Secure Code Review: What Senior Engineers Actually Look For

Automated tools find about 40% of security vulnerabilities in code. The other 60% — business logic flaws, race conditions, authorization bypasses, and subtle injection vectors — require human eyes. Af…

S

Spakto Team

30 Mar 2026
Read article →
Threat Hunting: Moving From Reactive to Proactive Security
THREAT INTELLIGENCE

Threat Hunting: Moving From Reactive to Proactive Security

Your SIEM generates alerts. Your EDR generates alerts. Your firewall generates alerts. You triage them, you respond to them, you close them. And then one day you discover that an attacker has been in…

S

Spakto Team

30 Mar 2026
Read article →
Securing the Software Build Pipeline: From Code to Production
APPLICATION SECURITY

Securing the Software Build Pipeline: From Code to Production

Your CI/CD pipeline is the most privileged system in your organization. It has access to source code, secrets, production credentials, cloud provider APIs, and the ability to deploy code that your use…

S

Spakto Team

30 Mar 2026
Read article →
Building a Security Culture That Outlasts Your CISO
EMERGING THREATS

Building a Security Culture That Outlasts Your CISO

I have seen security programs thrive under one CISO and collapse under their successor. I have seen organizations where security is everyone's responsibility and organizations where it is "the securit…

S

Spakto Team

30 Mar 2026
Read article →
OT/ICS Security: Bridging the IT-OT Divide
EMERGING THREATS

OT/ICS Security: Bridging the IT-OT Divide

I spent the first half of my career in IT security and the last decade increasingly focused on operational technology. The cultural divide between IT and OT is wider than the technical one, and until…

S

Spakto Team

30 Mar 2026
Read article →
Quantum Computing and Cryptography: Preparing for Q-Day
EMERGING THREATS

Quantum Computing and Cryptography: Preparing for Q-Day

Q-Day — the day a quantum computer can break RSA-2048 and ECC in practical time — is not here yet. Estimates range from 2030 to 2040, with considerable uncertainty. But if you wait for Q-Day to start…

S

Spakto Team

30 Mar 2026
Read article →