• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Was ist ein Zero Day Exploit

What is a Zero-Day Exploit?

Stefan Feist | Technischer Redakteur
Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

Zero-day exploits are among the most dangerous threats in IT security. They exploit previously unknown vulnerabilities in software for which no protective measures yet exist, which makes them particularly insidious. This type of attack is often used by hackers, but also by secret services, to compromise systems undetected. In this article, you will learn how zero-day exploits work, what forms they can take and how you can best protect yourself against them.

23.04.2025|zuletzt aktualisiert:23.04.2025

A zero day is a vulnerability in software that is not yet known to the manufacturer and for which no patch or fix is yet available. In other words, the manufacturer has had ‘zero days’ to fix the vulnerability, because they didn’t know it existed. An exploit is the code or technique used to exploit this vulnerability.

A zero-day exploit is therefore an attempt to utilise such a vulnerability. Accordingly, we refer to a zero-day attack when the affected system is threatened by a zero-day exploit. Hackers and state actors like to keep zero-day exploits secret so that they can be utilised for a long time or sold at the right time for a profit.

Such vulnerabilities can remain undiscovered for months or years before they are discovered. During this time, attackers can steal or copy data and damage sensitive systems until the manufacturer recognises and fixes the error.

How does a zero-day exploit work?

In a zero-day exploit, an unknown vulnerability in software is utilised. In most cases, the aim is to execute unauthorised code or bypass security mechanisms. This requires three things:

  • a vulnerability
  • an exploit code that takes advantage of the vulnerability and is distributed by email, for example
  • a target system that has not yet patched this vulnerability.

To discover vulnerabilities, hackers either use ‘fuzzing’, i.e. automated testing with random data, or they manually analyse existing code using reverse engineering.

If a vulnerability is found, code is written with the aim of gaining administrator rights or directly tapping into data, for example.

Once the malicious code has been tested, it is ‘packaged’, i.e. embedded in a PDF document, a website or an Office document, and sent to the victims.

What types of zero-day exploits are there?

The most common zero-day exploits include:

Remote Code Execution (RCE)

The starting point for attacks using Remote Code Execution is usually a vulnerability in a publicly accessible application that enables the execution of malware and thus the execution of unwanted commands on the underlying computer.

Privilege escalation

Privilege escalation refers to the unauthorised elevation of privileges assigned to a logged-in user who belongs to a specific privilege group. Example: An attacker has access to a simple user account and uses the exploit to gain root rights.

Zero-click exploits

A zero-click exploit is designed to work without user interaction. Most zero-click exploits attempt to exploit vulnerabilities in applications that accept and process untrusted data. These exploits are particularly dangerous on smartphones, for example via iMessage, WhatsApp or MMS.

Sandbox escape

A sandbox exploit is the use of a vulnerability in software to break out of a secure or quarantined environment – the sandbox.

Supply chain exploit

A supply chain exploit is not directed against the actual target, but against supporting processes in which there is a certain amount of trust. The attack itself is therefore directed against third parties and can be directed against people/companies as well as hardware or software.

Network exploits

The exploits target network services such as RDP, VPNs or routers and can be carried out via a network connection.

File-based exploits

These exploits are embedded in files, such as Word documents, PDF documents or ZIP files.

Web exploits

Web exploits target the browser or web plugins (Flash, PDF, JavaScript) and are often triggered by visiting websites.

Zero-day vulnerability in Google Chrome 2021

In 2021, a critical zero-day vulnerability was discovered in Google Chrome that was actively exploited. The vulnerability, known as CVE-2021-30563, affected the JavaScript engine V8 and allowed attackers to execute arbitrary code on the affected systems through specially crafted websites. Google responded immediately with a security update for Windows, macOS and Linux to close the gap. Users were urged to update their browsers to version 91.0.4472.164 to prevent potential attacks.

Zero-day exploits and email security

In terms of email and email security, infected attachments (e.g. a PDF or Office document or HTML attachments) are the main gateway for zero-day exploits. However, links in emails that lead to infected websites are also used by criminals.

Spear fishing is often used to prepare such attacks. These targeted attacks are intended to persuade victims to perform certain actions or to disclose information. The challenge for the criminals is always to establish credibility, and they succeed.

Why is a zero-day exploit dangerous?

A zero-day exploit is so dangerous because it is a secret door into a system that nobody but the attacker knows about. As the vulnerability is not yet known, there are also no countermeasures – attacks can therefore take place without any defence: no updates, patches, warnings or similar are available at the time of the attack.

Many victims are not aware that they are being attacked. This allows criminals to take over systems undisturbed, steal data, infiltrate networks and much more.

Accordingly, zero-day exploits have a high value for criminals: the exploits are traded for up to several million dollars and sold on the darknet, and in many cases bought by secret services.

However, there is also legal trade in zero-day exploits, as providers such as Google Project Zero or CrowdStrike pay large sums of money to track down vulnerabilities as part of bug bounty programmes.

How can zero-day exploits be prevented?

In principle, zero-day attacks cannot be prevented, because if you were aware of the existence of a vulnerability, you would eliminate it. However, there are ways of minimising the risk of an attack and containing the possible consequences:

  • Least privilege principle

    Employees are only given access to what they need. This means that a hacked computer cannot compromise the entire network.

  • Behavioural training

    Phishing is often the gateway for zero-day attacks. Training courses help to sensitise employees and recognise suspicious emails.

  • Regular updates of the email security software

    Many attacks are based on old vulnerabilities. The prompt installation of updates closes known vulnerabilities and prevents a zero day from being combined with other vulnerabilities.

  • Segmentation of networks

    Dividing networks into zones (e.g. development, accounting and marketing) prevents the spread of malware.

  • Network monitoring

    Systems monitoring is used to recognise unusual data traffic activities, file share requests, database queries etc.

  • Firewalls

    A firewall prevents unauthorised scanning of ports and blocks access to various services.

  • Use content filters

    Use a filter that automatically converts Office or PDF attachments into low-risk PDF files, rule-based and without manual effort.

  • Check sender reputation

    Protect your email communication by systematically checking the trustworthiness of senders.

  • Detect CxO fraud

    Use suitable software to check whether the first and last names of company users are being misused and whether domains similar to yours are being used by criminals.

  • Periodic scans

    Scanning for vulnerabilities can uncover zero-day exploits. Certain software can simulate attacks on software code, perform code checks and try to find new vulnerabilities.

Not yet using NoSpamProxy?

With NoSpamProxy you can reliably protect your company from scamming attacks and benefit from many other security functions. Request your free trial version now!

Get your free NoSpamProxy trial now!
  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Was ist ein Zero Day Exploit Preview
    What is a Zero-Day Exploit?23.04.2025 - 14:00
  • Info Icon
    UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
  • Was ist Spoofing Preview
    What is spoofing?11.04.2025 - 14:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: UPDATE: New Google email sender guidelines: What you need to do Link to: UPDATE: New Google email sender guidelines: What you need to do UPDATE: New Google email sender guidelines: What you need to doInfo Icon
Scroll to top Scroll to top Scroll to top