What Is a “Zero-Day” Attack? A Cybersecurity Nightmare Explained

What Is a “Zero-Day” Attack? A Cybersecurity Nightmare Explained

Cybersecurity is becoming more important by the day as an ever-growing portion of people’s lives is tied to an online world. Talk of viruses, cyberwarfare and brute-force attacks makes cybersecurity experts sound more like they’re on the frontlines of a battlefield than working behind computer screens.

In some ways, cybersecurity has become a battle—one that never stops or calls a truce. Some of these attacks are easy enough to protect against, but others are the nightmare of cybersecurity pros everywhere. A zero-day attack falls into the latter category.

What is a zero-day attack, and what can cybersecurity experts do to stop them? We spoke with experts in the field to get to the bottom of this type of cyber threat.

What is a zero-day attack?

A zero-day attack occurs when hackers take advantage of a software or network vulnerability that developers don’t know about. Think of it as having a broken window in your garage—but you don’t know it’s broken. Until you fix it, wrongdoers could take advantage of the situation without your knowledge.

“The name derives from the fact that developers are completely unaware of the weak point until after the attack occurs,” says Kristen Bolig, founder of SecurityNerd. “They’ve known about the vulnerability for zero days.”

The term “zero day” only refers to the fact that developers are unaware of the situation. As soon as they discover it, it’s no longer considered a zero-day attack or exploit. This means a zero-day attack can come in many different forms, from malware to spear phishing.

According to a 2017 report from Cybersecurity Ventures, zero-day attacks briefly decreased from 2014 to 2016, but now they are once again becoming more commonplace.1 This report predicted that zero-day attacks would rise from one per week in 2015 to one per day in 2021, largely due to the expanding use of technology.1 Put simply, the more code there is in the world, the more opportunities there are to find weak spots.

The growing remote workforce caused by the COVID-19 pandemic may also be playing a part in this increase. When companies allow their employees to work remotely without having the proper network protections in place, they become easier targets for zero-day attacks that may exploit devices many organizations wouldn’t have on their radars—for example, smart refrigerators and televisions sharing the same network. “They have affected virtually any kind of enterprise—from government agencies to big-name companies and Internet of Things devices,” Bolig says.

The implications of zero-day attacks

Not only are zero-day attacks on the rise, but they also tend to be more serious than other type of cybersecurity breaches. There’s big money to be made in discovering and selling these “zero-day exploits,” such as hackers who sold code that exploited a Zoom vulnerability for half a million dollars at the beginning of the pandemic. This has given rise to an entire economic market surrounding the demand for zero-day exploits.

Dan L. Dodson, CEO of Fortified Health Security, finds that the real question is not, “Who is most vulnerable to zero-day attacks?” but “Who are the most valuable targets?”

“Entities with access to information relevant to national security or valuable trade secrets would likely top the list,” Dodson says. The more sensitive the information being breached, the more damage a zero-day attack is capable of. Healthcare systems, which house sensitive medical and financial information for patients, can be especially vulnerable to these types of attacks.

Those with nefarious intentions aren’t the only ones making use of zero-day vulnerabilities. Government agencies, such as the National Security Agency (NSA), keep close tabs on zero-day exploits, storing them for future use in their own operations. “Government agencies also use them to fight back against known security threats. They can gain valuable insights and information against hackers and organizations that they perceive to be a risk,” Bolig says.

How to recover from a zero-day attack

The solution to zero-day attacks is simple in theory, if not in execution: patches. Just like a bandage that closes a scraped knee and protects it from germs, a software patch is a piece of code that improves security and closes the vulnerability being exploited. “Software patches will identify and destroy zero-day attacks, so it’s important to run them as soon as you are aware of the attack,” Bolig says.

That’s the catch—you can only run a patch if you’re aware that a vulnerability exists. Zero-day exploits and related vulnerabilities have an astonishingly long lifespan, running an average of 6.9 years according to data from a RAND Corporation report.2

Step one to stopping a zero-day attack is finding it in the first place. There’s no foolproof system for this since zero-day attacks can come in many forms. However, experts share that routinely running updates and having a “defense in depth” approach that layers multiple types of security measures can help developers detect zero-day attacks faster.

Once a vulnerability has been identified, it’s all hands on deck to create and employ a patch and communicate any information breaches to stakeholders. This is an urgent task, but it’s maybe not the dramatic race to save the day you’re probably envisioning. A 2015 report found that it takes an average of 100 to 120 days for most companies to patch vulnerabilities—which gives hackers plenty of time to exploit the data they find in the meantime.3

That lengthy time to create a patch is part of why it’s so important to have a response plan in place so that developers aren’t scrambling in the moment. “The key to recovery from any attack, regardless of impact, is to have clearly defined and well-rehearsed incident response procedures,” Dodson says.

How to prevent zero-day attacks

Of course, it’s best to prevent a zero-day attack from occurring in the first place. Unfortunately, that’s easier said than done. Many companies rely on artificial intelligence (AI) to shut down threats and other suspicious activity in a process called “signature detection.” But the whole point of zero-day attacks is exploiting vulnerabilities that are unknown, meaning that AI programs aren’t able to look for them.

Prevention relies largely on human developers who thoroughly follow best practices to stop all types of attacks before they start. This includes strategies like performing regular penetration testing and offering “bug bounties,” in which companies reward “good hackers” who identify and alert them to vulnerabilities.

Examples of this prevention strategy include Google’s Project Zero, a team of security analysts tasked with finding zero-day vulnerabilities, and the Zero-Day Initiative (ZDI), an organization devoted to rewarding researchers who identify vulnerabilities, then passing the information along to affected vendors so it can be fixed.

By making good use of the efforts of these researchers and the skilled developers employed by tech companies, zero-day attacks can be reduced or minimized.

Do you have what it takes to fight zero-day attacks?

What is a zero-day attack? Now you know all about these challenging cybersecurity threats and how tricky they can be to stop.

But you’ve never been someone who backs down from a challenge! If you think you have what it takes to fight zero-day attacks and minimize any damage done by them, learn more by checking out our article “How to Become an Information Security Analyst and Fill the Gap in the Tech Field.”

1“Zero Day Report 2017,” Cybersecurity Ventures [accessed March 2021] https://cybersecurityventures.com/zero-day-vulnerabilities-attacks-exploits-report-2017/
2Ablon, L., & Bogart, A., Rand Corporation, “Zero Days, Thousands of Nights The Life and Times of Zero-Day Vulnerabilities and Their Exploits.” [accessed March 2021] https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf
3Kenna Security, "New Kenna Research: The Remediation Gap” [accessed March 2021], https://www.kennasecurity.com/blog/new-kenna-research-remediation-gap-greg-howard/

About the author

Ashley Brooks

Ashley is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen University. She believes in the power of words and knowledge and enjoys using both to encourage others on their learning journeys

female writer

Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star