The Invisible Bazaar: Inside the Global Zero-Day Market

HmadHmad
6 min read

In the world of cybersecurity, most people focus on patching known vulnerabilities, detecting threats, and strengthening perimeter defences. But there’s another, murkier corner of this domain that remains hidden from public view. A secretive, high-stakes marketplace where unknown software flaws are bought and sold for millions. This is the world of zero-day vulnerabilities.

Zero-days are the ultimate currency in offensive cybersecurity. They are software bugs that have never been seen before, for which no patch exists. In the hands of an attacker, a zero-day is a skeleton key, one that can silently unlock systems, bypass defences, and remain undetected for weeks, months, or years. When militaries, intelligence agencies, and cybercriminals want to make a move, they often begin here.

This post takes a deep look at the modern zero-day market, how it works, who participates, what it means for global security, and how this invisible bazaar is quietly reshaping digital life.

What Is a Zero-Day?

A “zero-day” vulnerability gets its name from the number of days a vendor has had to fix the issue: zero. As soon as the flaw is discovered, it’s a race against time. If the researcher reports it, the vendor can patch it. If the researcher sells it, the flaw becomes a weapon.

Zero-days exist in operating systems, mobile apps, hardware firmware, browsers, and enterprise software. They can be used for data theft, espionage, surveillance, or even physical sabotage, as was the case with Stuxnet, the worm that destroyed Iranian centrifuges. You can read my post on Stuxnet here.

Because zero-days are unknown by nature, they are incredibly valuable. The fewer people who know about one, the longer it can be used undetected.

The Players in the Market

The global zero-day economy is composed of both legitimate and shadowy participants:

1. Government Buyers

Agencies such as the NSA (U.S.), GCHQ (UK), Mossad (Israel), and the MSS (China) purchase zero-days to support surveillance, counterterrorism, and espionage operations. Many of these agencies maintain internal exploit development teams, but also buy from contractors to fill capability gaps.

2. Private Brokers

Companies like Zerodium, Crowdfense, and Exodus Intelligence serve as middlemen, offering six or seven-figure sums for high-quality exploits. They resell these to government clients.

3. Bug Bounty Programs

Some companies offer legal payouts for vulnerabilities through platforms like HackerOne and Bugcrowd. These are generally defensive in nature and offer far less than offensive buyers ($10,000 instead of $1,000,000).

4. Cybercriminals

Some zero-days end up in the hands of criminal groups, used in ransomware campaigns or sold on underground forums. These groups typically buy second-rate or burned exploits rather than the highest-value tools.

5. Hacktivists and Whistleblowers

Occasionally, security researchers will disclose zero-days publicly as a form of protest. While rare, these disclosures can force vendors to act quickly and shine a light on unethical surveillance.


Inside a Multi-Million Dollar Transaction

Imagine a researcher finds a remote code execution vulnerability in the iOS kernel, the kind that can jailbreak a phone remotely without user interaction. It’s a true zero-click exploit. Instead of reporting it to Apple, the researcher contacts a broker like Zerodium.

Zerodium might offer between $1.5 million and $2.5 million, depending on how reliable, stealthy, and versatile the exploit is. Once purchased, the zero-day is delivered exclusively to Zerodium’s government customers, who may then use it in highly targeted intelligence operations.

Zerodium Offers $1.5 Million Bounty For iOS Zero-Day Exploits

The seller signs a non-disclosure agreement. The buyer uses the exploit in complete secrecy. Apple may not find out for months, or years. During that time, journalists, dissidents, and business executives may be unknowingly targeted.

If you’ve enjoyed reading this so far, I’d also highly recommend reading this article.

Why Zero-Days Matter

The existence of the zero-day market presents a dilemma:

  • Should governments disclose vulnerabilities to protect public safety?

  • Or should they keep them secret to maintain strategic advantage?

Keeping a zero-day secret means leaving millions of devices at risk. Disclosing it reduces surveillance capability. The choice is political as much as technical.

In 2014, the U.S. introduced the Vulnerabilities Equities Process (VEP) to evaluate whether to retain or disclose newly discovered flaws. But critics argue it’s opaque and subject to national security interests.

In practice, most zero-days bought by intelligence agencies are not disclosed. They are hoarded, reused, and eventually leaked, as seen with the Shadow Brokers dump of NSA tools in 2016.

Supply and Demand

The price of a zero-day is shaped by several factors:

  • Target Surface: Mobile OS exploits (iOS, Android) fetch higher prices than Windows due to better sandboxing and stricter controls.

  • Reliability: Exploits that work across many devices without crashing are more valuable.

  • Persistence: If the exploit survives a reboot or is hard to detect, it’s worth more.

  • Zero Click: Exploits that require no user interaction are the gold standard.

Zerodium’s public price list in 2021 offered up to $2 million for a full chain exploit on iOS. Android chains ranged from $500,000 to $2.5 million. Browser exploits, like those targeting Chrome or Safari, also fetched high prices depending on stealth.

Ethics and Accountability

The zero-day market is often compared to the arms trade. It exists in legal grey zones. It’s international. And it’s almost entirely unregulated.

Some researchers argue that private zero-day sales are unethical because they prioritize offense over defence. Others see it as legitimate. They see it as a way to monetize skills and provide capabilities to lawful agencies.

The biggest concern, however, is collateral damage. When zero-days leak, as they did with the Shadow Brokers or through the Hacking Team breach, the results can be devastating. Malware built on these leaks has caused billions in damage.


Regulation: What’s Being Done?

There are ongoing efforts to regulate the trade of cyber exploits:

  • Wassenaar Arrangement: A voluntary export control agreement among 42 countries. It includes provisions for intrusion software, but implementation has been inconsistent.

  • Bug Bounty Expansion: Companies are raising payouts in an attempt to compete with offensive buyers.

  • International Norms: UN and EU bodies are discussing cyber norms, but there’s no binding treaty.

Ultimately, most of the market remains shadowy. Brokers rarely name clients. Governments rarely disclose what they purchase. And vendors are often left out of the loop.

Zero Day attack - How to protect your company

The Future of the Bazaar

The demand for zero-days is not going away. If anything, it’s growing:

  • As more of life moves online, the value of digital access increases.

  • As encryption becomes the norm, endpoint exploits become more important.

  • As geopolitical tensions rise, so too does the appetite for silent, deniable access.

AI and automation may lower the bar to discovering exploitable bugs. At the same time, better defences and memory safety techniques (like Rust adoption) may shrink the attack surface.

What’s clear is this: the invisible bazaar of zero-days sits at the intersection of technology, law, ethics, and national power. It is where the future of cybersecurity will be decided; quietly, expensively, and often without our knowledge.

Final Thoughts

We live in a world where the most valuable secrets are no longer locked in safes but hidden in code. And the tools to unlock them are traded in digital whispers, behind layers of legalese, NDAs, and encrypted chats.

As cybersecurity professionals, users, and citizens, we must ask hard questions. Who gets to decide what vulnerabilities are worth keeping? Who bears the cost when they’re abused? And what kind of internet do we want to defend?

Because while the zero-day market may be invisible, its consequences are anything but.

— Hmad

0
Subscribe to my newsletter

Read articles from Hmad directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Hmad
Hmad

I'm a cybersecurity enthusiast with a growing focus on offensive security. Currently studying for the eJPT & ICCA, building hands-on projects like Infiltr8, and sharing everything I learn through blog posts and labs.