{"id":12142,"date":"2011-10-21T17:50:17","date_gmt":"2011-10-21T17:50:17","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/zero-day-threat\/"},"modified":"2012-11-18T10:38:23","modified_gmt":"2012-11-18T10:38:23","slug":"zero-day-threat","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/27451\/zero-day-threat","title":{"rendered":"Zero-Day Threat"},"content":{"rendered":"
A zero-day threat is a threat that exploits an unknown computer security vulnerability. The term is derived from the age of the exploit, which takes place before or on the first (or \u201czeroth\u201d) day of a developer\u2019s awareness of the exploit or bug. This means that there is no known security fix because developers are oblivious to the vulnerability or threat.<\/p>\n
Attackers exploit zero-day vulnerabilities through different vectors. Web browsers are the most common, due to their popularity. Attackers also send emails with attachments exploiting software attachment vulnerabilities.<\/p>\n
A zero-day threat is also known as a zero-hour attack or day-zero attack.<\/p>\n
Zero-day exploits are often put up by renowned hacker groups. Typically, the zero-day attack exploits a bug that neither developers, nor the users, know about. Indeed, this is exactly what the malicious coders anticipate. By discovering a software vulnerability before the software’s developers do, a hacker can make a worm or virus that can be used to exploit the vulnerability and harm computers.<\/p>\n
Not all zero-day attacks actually take place before the software developers discover the vulnerability. In certain cases, the developers discover and understand the vulnerability; however, it may take some time to develop the patch to fix it. Also, software makers may occasionally postpone a patch release to avoid flooding users with several individual updates. If the developers find that the vulnerability is not extremely dangerous, they may decide to postpone the patch release until a number of patches are collected together. Once these patches are collected, they are released as a package. However, this strategy is risky because could invite a zero-day attack.<\/p>\n
Zero-day attacks occur within a time frame, known as the vulnerability window. This extends from the first vulnerability exploit to the point at which a threat is countered. Attackers engineer malicious software (malware) to exploit common file types, compromise attacked systems and steal valuable data. Zero-day attacks are carefully implemented for maximum damage – usually in the span of one day. The vulnerability window could range from a small period to multiple years. For instance, in 2008, Microsoft revealed an Internet Explorer vulnerability that infected a few versions of Windows released during 2001. The date in which this vulnerability was initially discovered by the attacker is unknown, but the vulnerability window in such a case might have been as much as seven years.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Zero-Day Threat Mean? A zero-day threat is a threat that exploits an unknown computer security vulnerability. The term is derived from the age of the exploit, which takes place before or on the first (or \u201czeroth\u201d) day of a developer\u2019s awareness of the exploit or bug. This means that there is no known […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,227,239,216],"class_list":["post-12142","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-data-management","definitioncat-productivity-software","definitioncat-software-development"],"acf":[],"yoast_head":"\n