{"id":34448,"date":"2020-04-16T15:30:36","date_gmt":"2020-04-16T15:30:36","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31123\/Hackers-Are-Selling-A-Critical-Zoom-Zero-Day-Exploit-For-500-000.html"},"modified":"2020-04-16T15:30:36","modified_gmt":"2020-04-16T15:30:36","slug":"hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/","title":{"rendered":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/test-uploads\/articles\/5e9620686d545a0097139dbd\/lede\/1586957150181-zoom-call.jpeg?crop=0.9077xw:0.8985xh;0.0051xw,0.0495xh&amp;resize=1200:*\" class=\"ff-og-image-inserted\"><\/div>\n<p>Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned.<\/p>\n<p>The two flaws are so-called <a href=\"https:\/\/www.vice.com\/en_us\/topic\/zero-days\" target=\"_blank\" rel=\"noopener noreferrer\">zero-days<\/a>, and are currently present in Zoom\u2019s Windows and MacOS clients, according to three sources who are knowledgeable about the market for these kinds of hacks. The sources have not seen the actual code for these vulnerabilities, but have been contacted by brokers offering them for sale.<\/p>\n<p>Zero-day exploits or just zero-days or <a href=\"https:\/\/www.vice.com\/en_us\/article\/mg79v4\/hacking-glossary\" target=\"_blank\" rel=\"noopener noreferrer\">0days<\/a> are unknown vulnerabilities in software or hardware that hackers can take advantage of to hack targets. Depending on what software they\u2019re in, <a href=\"https:\/\/www.vice.com\/en_us\/article\/8xdayg\/iphone-zero-days-inside-azimuth-security\" target=\"_blank\" rel=\"noopener noreferrer\">they can be sold for thousands or even millions of dollars<\/a>.<\/p>\n<p>Last week, <a href=\"https:\/\/www.vice.com\/en_us\/article\/akwpxp\/zoom-hacks-zero-day-exploits\" target=\"_blank\" rel=\"noopener noreferrer\">Motherboard reported that there was an increased interest in zero-days<\/a> for Zoom as millions of people, including employees and executives at big companies around the world, moved onto the platform for sensitive or confidential meetings, due to the coronavirus pandemic.<\/p>\n<p>\u201cFrom what I&#8217;ve heard, there are two zero-day exploits in circulation for Zoom. [&#8230;] One affects OS X and the other Windows,\u201d said Adriel Desautels, the founder of <a href=\"https:\/\/www.netragard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Netragard<\/a>, a company that <a href=\"https:\/\/www.vice.com\/en_us\/article\/qkv9ym\/where-did-hacking-team-buy-its-hacks-three-accused-brokers-deny-involvement\" target=\"_blank\" rel=\"noopener noreferrer\">used to sell and trade zero-days<\/a>. \u201cI don&#8217;t expect that these will have a particularly long shelf-life because when a zero-day gets used it gets discovered.\u201d<\/p>\n<p>Two other independent sources, who asked to remain anonymous to discuss sensitive topics, confirmed the existence of these two exploits on the market.<\/p>\n<p>\u201c[The Windows zero-day] is nice, a clean RCE [Remote Code Execution],\u201d said one of the sources, who is a veteran of the cybersecurity industry. \u201cPerfect for industrial espionage.\u201d<\/p>\n<p class=\"article__blockquote\"><strong><em>Do you work in exploit development or trade zero-days? We\u2019d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email<\/em> <a href=\"mailto:lorenzofb@vice.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><em>lorenzofb@vice.com<\/em><\/strong><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/searchwindowsserver.techtarget.com\/definition\/remote-code-execution-RCE\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Code Execution exploits<\/a> are the most sought after bugs, as they allow hackers to break in without having to rely on the target falling for a phishing attack, for example. These attacks allow hackers to execute code on the target\u2019s computer, hence the name. Generally speaking, an RCE exploit allows hackers to access the target\u2019s whole machine, not just the app they are attacking.<\/p>\n<p>The zero-day for Zoom on Windows would allow hackers to access the app, but would need to be coupled with another bug to access the whole machine. The MacOS one is not an RCE, according to the two anonymous sources.<\/p>\n<p>The asking price for the zero-day for the Zoom Windows app is $500,000, according to one of the sources, who deals with the procurement of exploits but has decided not to purchase this one.<\/p>\n<p>The source said the exploit requires the hacker to be in a call with the target, making it less valuable for a government spy agency that aims to be stealthy and doesn\u2019t want to get caught.<\/p>\n<p>\u201cI don\u2019t see how it makes sense compared to the concrete potential in terms of intelligence, I think it\u2019s just kids who hope to make a bang,\u201d said the source, who estimated the exploit to be worth around half the asking price.<\/p>\n<p>The MacOS bug is not an RCE, making it less dangerous and harder to use in a real hack, according to the two anonymous sources.<\/p>\n<p>\u201cZoom takes user security extremely seriously. Since learning of these rumors, we have been working around the clock with a reputable, industry-leading security firm to investigate them,\u201d the company said in a statement. \u201cTo date, we have not found any evidence substantiating these claims.\u201d<\/p>\n<p>The FBI <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/boston\/news\/press-releases\/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic\" target=\"_blank\" rel=\"noopener noreferrer\">issued a warning about Zoom hijacking<\/a>. The U.S. Senate <a href=\"https:\/\/www.politico.com\/news\/2020\/04\/09\/internal-senate-memo-warns-zoom-poses-high-risk-to-privacy-security-177347\" target=\"_blank\" rel=\"noopener noreferrer\">has also advised government agencies not to use Zoom<\/a>, citing \u201chigh risk\u201d to privacy. And Motherboard <a href=\"https:\/\/www.vice.com\/en_us\/article\/k7e95m\/zoom-leaking-email-addresses-photos?\" target=\"_blank\" rel=\"noopener noreferrer\">has<\/a> <a href=\"https:\/\/www.vice.com\/en_us\/article\/pke4vb\/zoom-faces-class-action-lawsuit-for-sharing-data-with-facebook?\" target=\"_blank\" rel=\"noopener noreferrer\">recently<\/a> <a href=\"https:\/\/www.vice.com\/en_us\/article\/z3b745\/zoom-removes-code-that-sends-data-to-facebook?\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> <a href=\"https:\/\/www.vice.com\/en_us\/article\/k7e599\/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account?\" target=\"_blank\" rel=\"noopener noreferrer\">on<\/a> a series of privacy issues affecting Zoom.<\/p>\n<p>Despite these issues, for the vast majority of people who are using Zoom to catch up with friends and family, it\u2019s totally OK to use the software, <a href=\"https:\/\/www.vice.com\/en_us\/article\/n7jg7m\/zoom-has-security-flaws-its-still-fine-to-use\" target=\"_blank\" rel=\"noopener noreferrer\">as Motherboard\u2019s editor-in-chief Jason Koebler explained recently<\/a>. All software has bugs and flaws, Zoom is no different. And in Zoom\u2019s defense, the company has responded quickly to the recently reported security and privacy issues, and <a href=\"https:\/\/www.theverge.com\/2020\/4\/2\/21204018\/zoom-security-privacy-feature-freeze-200-million-daily-users\" target=\"_blank\" rel=\"noopener noreferrer\">has recently announced<\/a> a large investment to improve the security of its products.<\/p>\n<p><em>This story has been updated to clarify that the FBI issued a warning about Zoom hijackings, and did not warn against using it.<\/em><\/p>\n<p><strong><em>Subscribe to our new cybersecurity podcast,<\/em><\/strong> <strong><a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CYBER<\/em><\/a>.<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31123\/Hackers-Are-Selling-A-Critical-Zoom-Zero-Day-Exploit-For-500-000.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34449,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-34448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T15:30:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000\",\"datePublished\":\"2020-04-16T15:30:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\"},\"wordCount\":759,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\",\"name\":\"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg\",\"datePublished\":\"2020-04-16T15:30:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg\",\"width\":2560,\"height\":1439},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-16T15:30:36+00:00","og_image":[{"width":2560,"height":1439,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000","datePublished":"2020-04-16T15:30:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/"},"wordCount":759,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/","name":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg","datePublished":"2020-04-16T15:30:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000-scaled.jpg","width":2560,"height":1439},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-selling-a-critical-zoom-zero-day-exploit-for-500000\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34448"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34448\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34449"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}