Zero-day exploits increased in significance after services such as Apple, Google,
Facebook, and Microsoft encrypted servers and messages, meaning that the most feasible way to access a user's data was to intercept it at the source before it was encrypted. One of the best-known use of zero-day exploits was the
Stuxnet worm, which used four zero-day vulnerabilities to damage
Iran's nuclear program in 2010. The worm showed what could be achieved by zero-day exploits, unleashing an expansion in the market. The United States
National Security Agency (NSA) increased its search for zero-day vulnerabilities after large tech companies refused to install
backdoors into their software, tasking the
Tailored Access Operations (TAO) with discovering and purchasing zero-day exploits. In 2007, former NSA employee
Charlie Miller publicly revealed for the first time that the
United States government was buying zero-day exploits. Some information about the NSA involvement with zero-days was revealed in the documents leaked by NSA contractor
Edward Snowden in 2013, but details were lacking. Reporter
Nicole Perlroth concluded that "either Snowden’s access as a contractor didn’t take him far enough into the government’s systems for the intel required, or some of the government’s sources and methods for acquiring zero-days were so confidential, or controversial, that the agency never dared put them in writing". One of the most infamous vulnerabilities discovered after 2013,
Heartbleed (CVE-2014-0160), was not a zero-day when publicly disclosed but underscored the critical impact that
software bugs can have on global cybersecurity. This flaw in the
OpenSSL cryptographic library could have been exploited as a zero-day prior to its discovery, allowing attackers to steal sensitive information such as private keys and passwords. In 2016 the
hacking group known as
The Shadow Brokers released a trove of sophisticated zero-day exploits reportedly stolen from the NSA. These included tools such as
EternalBlue, which leveraged a vulnerability in
Microsoft Windows'
Server Message Block (SMB) protocol. EternalBlue was later weaponized in high-profile attacks like
WannaCry and
NotPetya, causing widespread global damage and highlighting the risks of stockpiling vulnerabilities. The year 2020 saw one of the most sophisticated
cyber espionage campaigns to date, in which attackers exploited multiple vulnerabilities, including zero-day vulnerabilities, to compromise
SolarWinds' Orion software. This allowed access to numerous government and corporate networks. In 2021 Chinese state-sponsored group,
Hafnium, exploited zero-day vulnerabilities in
Microsoft Exchange Server to conduct cyber espionage. Known as
ProxyLogon, these flaws allowed attackers to bypass authentication and execute arbitrary code, compromising thousands of systems globally. In 2022 the spyware
Pegasus, developed by
Israel's
NSO Group, was found to exploit zero-click vulnerabilities in messaging services like
iMessage and
WhatsApp. These exploits allowed attackers to access targets' devices without requiring user interaction, heightening concerns over surveillance and privacy. == References ==