DEV Community

Rahul Varma
Rahul Varma

Posted on

What Are Zero-Day Exploits?

Zero-day attack is used to attack applications with bugs which are not identified by the creator of such application. These are the type of vulnerabilities that are discovered first by the attackers while the average user is still out there seeking a patch or fix to this problem but unfortunately there is none when the attack is actually taking place.

Example: There is a vulnerability in one of the most widely used messaging apps which let attackers add any malicious code they want to a user’s device by sending them a message. It was further revealed that before the vulnerability is addressed by the company to release a patch, millions of users may be affected.

Zero-day attack is often employed in such goals as a targeted assault of specific company or government, as well as famous person. For example, the Stuxnet worm that targeted the Iran nuclear facilities has been developed to fully exploit several zero days.

To protect against zero-day attacks, users should:

Never leave default in the software and operating system as this leads to many vulnerabilities.

Employ the services of antivirus that works with heuristics and responds to movements of unknown threats.
Be informed on new threats by reading cybersecurity news.
A company can set IDS and behavior analysis tools to curb suspicious activity.

Tip: Unfortunately, people have no say over zero-day vulnerabilities, but being up to date and alert can help avoid such risks as much as possible. As mentioned above large networks should make the use of patch management systems in its execution.

Top comments (0)