Zerodium
Zerodium is an American information security company founded in 2015 with operations in Washington, D.C., and Europe. Its main business is developing and acquiring premium zero-day exploits from security researchers and reporting the research, along with protective measures and security recommendations to its government clients as part of the ZERODIUM Zero Day Research Feed. The company reportedly has more than 2000 researchers and has paid more than $100,000,000 in bounties between 2015 and 2023.[1]
Founded | 2015 |
---|---|
Headquarters | , United States |
Area served | Information security |
Website | www |
History
Launched on July 25, 2015, by Vupen's founders, Zerodium was the first company to release a full pricing chart for zero-days, ranging from $5,000 to $1,500,000 per exploit.[2] The company was reported to have spent between $400,000 to $600,000 per month for vulnerability acquisitions in 2015.[3]
In 2016, the company increased its permanent bug bounty for iOS exploits to $1,500,000.[4]
Zerodium published a new pricing chart exclusively for mobile zero-days ranging from $10,000 to $500,000 per exploit in 2017. The company also announced a time-limited bounty of $1,000,000 for Tor browser exploits.[5]
New products were added by the company in 2018 to its bounty program including cPanel, Webmin, Plesk, Direct Admin, ISP Config, OpenBSD, FreeBSD, and NetBSD. It also then increased its payouts for various software including a bounty of up to $500,000 for Windows remote code execution exploits.[6]
In January of 2019, Zerodium once again increased its bounties for almost every product including a payout of $2,000,000 for remote iOS jailbreaks; $1,000,000 for WhatsApp, iMessage, SMS, and MMS RCEs; and $500,000 for Chrome exploits.[7]
Fast forward to September 2019, Zerodium increased its bounty for Android exploits to $2,500,000, and for the first time, the company is paying more for Android exploits than iOS. Payouts for WhatsApp and iMessage have also been increased. The company is now reportedly spending between $1,000,000 to $3,000,000 each month for vulnerability acquisitions.[8]
Its official website claims that Zerodium has more than 2000 researchers as of July 2023 and has launched additionally to its permanent bounties, a time-limited bug bounty program which aims to acquire other zero-day exploits that are not within Zerodium's usual scope or for which the company is temporarily increasing the payouts.[9]
Criticism
Reporters Without Borders criticized Zerodium for selling information on exploits used to spy on journalists to foreign governments.[10]
See also
References
- Zerodium. "ZERODIUM Official Website".
{{cite journal}}
: Cite journal requires|journal=
(help) - Andy Greenbrg (18 November 2015). "Here's a Spy Firm's Price List for Secret Hacker Techniques". Wired. Retrieved 26 August 2016.
- Sean Michael Kerner (21 September 2015). "Zerodium Offering a $1 Million iOS 9 Bug Bounty". eWeek.
- Lily Hay Newman (29 September 2016). "A Top-Shelf iPhone Hack Now Goes for $1.5 Million". Wired.
- Zerodium (13 September 2017). "Tor Browser Zero-Day Exploits Bounty for $1.0 Million".
{{cite journal}}
: Cite journal requires|journal=
(help) - Zerodium (13 September 2018). "Zerodium is increasing its bounties for browsers, servers, mobiles, and more".
{{cite journal}}
: Cite journal requires|journal=
(help) - Zerodium (7 January 2019). "Zerodium is increasing its bounties for iOS to up to $2,000,000".
{{cite journal}}
: Cite journal requires|journal=
(help) - Sophos (9 January 2019). "Zerodium's waving fatter payouts for zero-day bug hunters".
{{cite journal}}
: Cite journal requires|journal=
(help) - Zerodium (5 July 2021). "Zerodium Time Limited Bug Bounties".
{{cite journal}}
: Cite journal requires|journal=
(help) - "RSF unveils 20/2020 list of press freedom's digital predators | Reporters without borders". RSF. 2020-03-10. Retrieved 2021-10-31.