Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

What are zero-day brokers? Discovering the underground market of security vulnerabilities

Redazione RHC : 19 July 2025 09:41

Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them.

These vulnerabilities, known as “zerodays,” are exploited by cybercriminals to attack companies’ computer systems and networks. Zeroday brokers seek to profit by selling these vulnerabilities to governments, intelligence agencies, corporations, and other organizations, who use them to develop hacking tools and conduct surveillance.

In this article, we’ll understand the phenomenon of zeroday brokers, why it’s gaining popularity, and the dangers of this model in a digitally globalized world.

What Are Zeroday Brokers

Trading zeroday vulnerabilities is a highly controversial practice and raises ethical questions about cybersecurity. Many cybersecurity experts argue that buying and selling vulnerabilities doesn’t make the digital world more secure, but rather increases its risk, as these tools can end up in the wrong hands.

Zeroday brokers purchase these vulnerabilities from security researchers or other individuals who discover them and then sell them to governments, intelligence agencies, security firms, and other interested entities. Zeroday brokers act as intermediaries between security researchers who discover the vulnerabilities and clients interested in purchasing them.

Purchasing a zero-day vulnerability can be very expensive, as it is a very powerful weapon for an attacker. Zeroday brokers can make a lot of money in this market because the supply of zero-day vulnerabilities is limited and clients are willing to pay very high prices for access to these vulnerabilities.

Why choose a zero-day broker

There are several reasons why a security researcher might choose to provide a zeroday to a broker rather than the product vendor:

  1. Making money: Zeroday brokers pay significant sums for vulnerabilities that can compromise product security. For security researchers, this could be a source of income, especially if they are able to discover very rare or particularly harmful vulnerabilities.
  2. Preserve anonymity: Some researchers may prefer to remain anonymous and may feel more comfortable selling their findings to a broker rather than contacting the product vendor directly. This can be especially true if the researcher fears retaliation or legal action from the vendor or others.
  3. Ensure the vulnerability is fixed: If a security researcher has notified a product vendor of a vulnerability and the vendor has not responded or refused to fix the vulnerability, the researcher may decide to sell the vulnerability to a broker to ensure it is fixed. This may be especially important if the vulnerability is particularly critical or if the product is widely used and poses a significant security risk.

However, it’s important to note that selling a vulnerability to a zeroday broker can also pose risks, such as the broker potentially spreading the vulnerability or engaging in illegal activity.

Therefore, security researchers should carefully evaluate their options before deciding to sell a vulnerability to a zeroday broker.

Zeroday Resale by Brokers

As we’ve reported, zeroday brokers can resell zero-day vulnerabilities to governments, intelligence agencies, or other interested organizations. These organizations could use the vulnerabilities to conduct intelligence operations or develop hacking tools for remote access to target systems.

In some cases, intelligence agencies could also use the vulnerabilities to compromise the systems of foreign organizations for intelligence purposes, economic espionage, or to support military operations.

In fact, companies that develop intelligence systems (such as NSO Group, which has been widely discussed in connection with the Pegasus malware) can acquire zerodays from brokers in various ways. In some cases, the companies themselves may contact brokers directly to purchase the rights to a specific zeroday, which they can then use to improve their own products or sell to their own customers. In other cases, brokers may approach companies directly and offer them the zerodays they’ve collected.

It’s important to note that many of these practices occur in a gray area of legality and morality, as zerodays can be used for controversial purposes, such as mass surveillance or violating user privacy.

It’s inappropriate to reference or promote specific zeroday brokers, as we’ve seen, the acquisition and sale of zeroday vulnerabilities could pose a threat to cybersecurity. Furthermore, many zeroday brokerage activities are suspicious and may violate cybersecurity laws or human rights. However, there have been media reports indicating the existence of several well-known zeroday brokers, including Zerodium, Exodus Intelligence and Vupen Security.

Intelligence systems

Zero-day exploits are used by intelligence and spyware companies to improve their products and then resell them to governments, which use them to monitor specific devices. Zero-day no-click exploits are particularly popular because they allow spyware to be installed on devices without any user interaction.

For example, zero-day exploits can be used to monitor phone conversations and text messages, gather information about online activity, access sensitive files, steal login credentials, and much more. All this happens without the target noticing the intrusion.

This type of activity can be carried out for various purposes, including gathering information on specific individuals, preventing threats to national security, or fighting terrorism. However, the use of zero-days is often debated, as it raises questions about privacy and the legality of surveillance activities.

Conclusions

In conclusion, zero-day brokers are companies that specialize in buying and selling cyber vulnerabilities unknown to software vendors. While these brokers can be used to sell vulnerabilities to those who use them for malicious purposes, many of their clients have been described as governments and intelligence agencies seeking to protect their countries by discovering exploitable cyber vulnerabilities.

The nature of these brokers, however, raises many concerns about user security and privacy, as exploited vulnerabilities can cause irreparable damage. Furthermore, zeroday trading raises ethical questions about the use of cybersecurity and the responsibility of governments and companies to protect users.

For this reason, many cybersecurity experts are working to develop safer and more transparent methods for disclosing vulnerabilities to better protect users and prevent malicious use of zerodays.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli