What Is 0 Day Attack on Earth
Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.
Last updated: April 11, 2026
Key Facts
- The term 'zero-day' originated in software piracy communities during the 1980s-1990s before cybersecurity adopted it as standard terminology
- Approximately 20,000+ zero-day vulnerabilities are believed to exist undisclosed in software globally
- Zero-day exploits sell for $100,000 to $2.5+ million on underground markets, depending on the target software
- Notable zero-day attacks include Stuxnet (2009-2010), WannaCry (2017 affecting 200,000+ computers), and the 2017 Equifax breach (147 million people compromised)
- The average time from vulnerability discovery to patch availability is 7-14 days in modern software ecosystems
Overview
A zero-day attack is a cybersecurity threat that exploits a previously unknown vulnerability in software or hardware before the vendor or developer becomes aware of it. The term "zero-day" refers to the fact that the software vendor has had zero days to develop and deploy a security patch to fix the vulnerability. Once exploited, these attacks can compromise systems, steal sensitive data, or grant unauthorized access to networks with no existing defense in place.
The origins of the term trace back to the 1980s and 1990s software piracy communities, where "zero-day" referred to newly released software before it appeared in retail channels. Today, the cybersecurity industry has adopted this terminology to describe vulnerabilities that pose the greatest risk. Zero-day attacks are highly sought after by cybercriminals, state-sponsored actors, and security researchers, making them among the most valuable and dangerous threats in the digital landscape.
How It Works
Understanding the mechanics of a zero-day attack requires examining each stage of the exploitation process:
- Vulnerability Discovery: A hacker, security researcher, or state actor identifies a previously unknown flaw in widely-used software, such as a web browser, operating system, or enterprise application. This vulnerability may exist for months or years before being discovered by anyone.
- Exploit Development: The attacker creates specialized code (an "exploit") that can reliably trigger the vulnerability and achieve their objective—installing malware, stealing data, or gaining system control. This development phase can take days to weeks depending on complexity.
- Attack Deployment: The attacker uses the exploit to target vulnerable systems through email attachments, malicious websites, network intrusion, or supply chain compromise. Because no patch exists, antivirus software and security tools cannot detect the attack.
- Vendor Discovery and Response: Once the attack is discovered or the vendor learns of the vulnerability through responsible disclosure, they begin emergency patch development. The time window between discovery and patch release—typically 7 to 14 days—creates critical exposure.
- Patch Deployment and Continued Risk: After vendors release patches, users must apply them promptly to gain protection. Organizations that delay updates remain vulnerable even after patches become available, which is why zero-day campaigns continue causing damage weeks after disclosure.
Key Comparisons
| Aspect | Zero-Day Attack | Known Vulnerability Attack |
|---|---|---|
| Vendor Awareness | Vendor is completely unaware of the vulnerability | Vendor knows about the vulnerability and has released a patch |
| Detection Capability | Extremely difficult; signature-based detection is impossible | Can be detected using security patches and threat signatures |
| Protection Timeline | 7-14+ days minimum from discovery to patch availability | Protection available immediately upon patch release |
| Underground Market Value | $100,000 to $2.5+ million per exploit, depending on targets | Low or no market value; information is publicly available |
| Potential Impact Scope | Can affect hundreds of thousands of users worldwide until patched | Only unpatched systems at risk; can be mitigated relatively quickly |
Why It Matters
- Highest Security Risk: Zero-day attacks represent the maximum level of cybersecurity risk because organizations cannot defend against threats they do not know exist. Attackers have a significant advantage—they can operate without detection until the vulnerability becomes public.
- Economic Incentive and Black Markets: Zero-day exploits command premium prices on dark web markets, ranging from $100,000 to over $2 million depending on software and exploit reliability. This economic incentive drives sophisticated cybercriminals and nation-state actors to invest heavily in discovery.
- Historical Precedent and Real-World Impact: The 2017 WannaCry ransomware attack exploited a Windows zero-day, affecting over 200,000 computers in 150 countries and causing billions in damage. The Equifax data breach that same year used an unpatched zero-day in Apache Struts, compromising 147 million people.
Zero-day attacks will remain a critical threat as long as software complexity increases and economic incentives for exploitation exist. Organizations must adopt defense-in-depth strategies, including network segmentation, behavioral monitoring, and rapid patching practices to minimize exposure. Even as vendors work to reduce vulnerability lifecycles, zero-days will continue shaping cybersecurity policy and investment priorities worldwide.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Zero-day ComputingCC-BY-SA-4.0
- CISA Alerts and AdvisoriesPublic Domain
- Kaspersky - Zero-Day Attack DefinitionCC-BY-SA-4.0
Missing an answer?
Suggest a question and we'll generate an answer for it.