Tuesday, April 21, 2026
Independent Technology Journalism  ·  Est. 2026
Cybersecurity

Zero-Day Discovery in 2026: Who Finds It, Who Buys It

A Single Bug, a $2.5 Million Payout, and No Patch in Sight Earlier this October, a researcher going by the handle "nullroute_k" posted a cryptic message on a private Signal group used by mem...

Zero-Day Discovery in 2026: Who Finds It, Who Buys It

A Single Bug, a $2.5 Million Payout, and No Patch in Sight

Earlier this October, a researcher going by the handle "nullroute_k" posted a cryptic message on a private Signal group used by members of the offensive security community: "kernel-level, Windows 11 24H2, pre-auth. Interested parties know where to find me." Within 72 hours, three separate brokers had reportedly made contact. The vulnerability — which we're told affects a component of the Windows kernel transaction manager — still has no CVE assignment, no Microsoft advisory, and no patch. The asking price, according to two people familiar with the negotiation, was $2.5 million.

That number isn't shocking anymore. It's almost expected. The zero-day market, once a murky backroom operation, has industrialized in ways that most enterprise security teams haven't fully processed. And the implications — for defenders, vendors, and governments — are getting harder to ignore.

What "Zero-Day" Actually Means in Practice (and Why the Definition Is Slippery)

A zero-day vulnerability is, technically, a flaw that the software vendor doesn't yet know about — meaning zero days have elapsed for them to develop a fix. But practitioners will tell you that definition is too clean. Dr. Amara Osei, a senior vulnerability researcher at Carnegie Mellon's CyLab, described it to us this way: "You can have a bug that's been circulating in private exploit markets for eighteen months before the vendor hears about it. Calling that 'day zero' is technically accurate but functionally absurd."

The formal tracking system — the CVE (Common Vulnerabilities and Exposures) database, maintained by MITRE and funded largely by CISA — only captures what's been disclosed. In 2025, MITRE published 28,902 CVEs, a 19% increase over 2024. But researchers we spoke with estimate that for every vulnerability that enters the public CVE system, somewhere between three and eight exist in private hands — undisclosed, unpatched, and actively exploited or held in reserve.

The gap between discovery and disclosure is where the real story lives.

The Broker Ecosystem: Zerodium, Crowdfense, and the Price Sheet Problem

The modern zero-day economy has a few dominant intermediaries. Zerodium, founded by Chaouki Bekrar, publishes a public price list — a move that was genuinely controversial when it launched and has since become a strange kind of industry benchmark. As of late 2026, their published payouts for a full iOS 18 remote code execution chain with persistence sit at $2.5 million. Android equivalent: $2 million. A zero-click exploit against WhatsApp: up to $1.5 million.

Target Platform / Attack Surface Zerodium Max Payout (2026) Crowdfense Estimated Range Government Direct (est.)
iOS 18 — Full RCE + persistence, zero-click $2,500,000 $1,800,000–$2,200,000 $3,000,000–$5,000,000
Android 15 — Full chain, zero-click $2,000,000 $1,500,000–$1,900,000 $2,500,000–$4,000,000
Windows 11 — Kernel LPE, pre-auth $400,000 $300,000–$500,000 $800,000–$1,500,000
Chrome — Full sandbox escape $500,000 $350,000–$450,000 $700,000–$1,200,000
SCADA / ICS systems (unspecified vendor) Up to $400,000 $250,000–$600,000 $1,000,000+

Government direct purchases — typically through intelligence contractors — consistently outprice the brokers, which is exactly the problem. "The vendors' bug bounties can't compete," said Marcus Thiele, a principal security architect at Recorded Future's threat intelligence division. "Google's maximum Chrome payout is $250,000. A nation-state will pay five times that and ask no questions about intended use."

"When the economics favor silence over disclosure by a factor of five or ten, you've designed a system that structurally rewards hoarding vulnerabilities. No amount of responsible disclosure policy fixes that math." — Marcus Thiele, Principal Security Architect, Recorded Future

How Researchers Actually Find Zero-Days in 2026

The methodology has shifted significantly. Fuzzing — the practice of throwing malformed input at a target until something breaks — used to dominate. It's still essential, but coverage-guided fuzzers like AFL++ and libFuzzer have matured to the point where the "easy" bugs in well-fuzzed codebases are mostly gone. What's left requires either deeper semantic analysis or tooling that didn't exist five years ago.

That tooling, increasingly, involves large language models. Several research teams we spoke with are using fine-tuned models to generate variant analysis — essentially asking an LLM to read a patched CVE, understand the class of vulnerability it represents, and then generate hypotheses about where similar logic errors might exist in adjacent code. It's not magic. The false positive rate is high, and a human researcher still has to verify every lead. But it's meaningfully accelerating the discovery cycle for teams with the resources to run it.

Keep reading
More from Verodate