The zero-day and exploit broker Zerodium, founded by former VUPEN co-founder Chaouki Bekrar, offers $500,000 for a zero-day exploit in secure messaging Messaging (i.e. such as WhatsApp, Signal, Facebook Messenger, iMessage, Telegram, WeChat, Viber) and Email App.
Secure messaging apps continues to represent a serious obstacle to the investigations conducted by law enforcement agencies and secret services, for this reason, zero-day exploits are precious commodities.
The firm has officially announced that it will reward experts for remote code execution and privilege escalation vulnerabilities affecting popular instant messaging and email applications.
The company published separate payout lists for mobile device exploits and desktop and server exploits.
Zerodium offers half a million dollars for SMS/MMS flaws and exploits targeting default email apps on both iOS and Android.
Looking at the payout lists we can notice new entries in the mobile category, such as baseband, and media file and document vulnerabilities.
Zerodium will pay up to $100,000 for sandbox escapes, code-signing bypasses, kernel LPE, Wi-Fi RCE and LPE, and SS7 attacks.
Zerodium also announced that it would offer $300,000 for Windows 10 remote code execution zero days, especially exploits for Windows services such as SMB or RDP.
Web server zero days, specifically Apache on Linux and Microsoft IIS remote code execution attacks, goes for $150,000, while a Microsoft Outlook RCE is worth $100,000. Mozilla Thunderbird RCE and VMware ESXi guest-to-host escapes are both worth $80,000.
Zerodium payouts for Chrome, PHP, and OpenSSL attacks nearly doubled, meanwhile prices for antivirus privilege escalation flaws dropped from $40,000 to $10,000.
Tor RCEs on Linux and Windows jumped from $30,000 up to $100,000 and $80,000 respectively.
Zerodium payouts for Adobe Flash are up to $100,000 for exploits targeting the application.
(Security Affairs – Zerodium payouts, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.