Categories: Bug BountyExploit

Zerodium Now Paying You $2.5 Million For Android Zero-day Exploit and $1.5 Million for WhatsApp RCE Exploit

Exploit acquisition platform Zerodium released a new payout for mobile exploits with surprising payment for both Android and iOS platforms.

Zerodium, a Cybersecurity company known for buying premium exploits from security researchers for several platforms including Operating Systems, Web Browsers, Mobiles,  Web Servers, Email Servers, WebApps/ Panels.

Unlike the majority of existing bug bounty programs that accept almost any kind of vulnerabilities and PoCs but pay very low rewards but Zerodium mainly focuses on very high-risk vulnerabilities and with fully functional exploits.

According to New payout release, Zerodium now paying more for Android Exploits than iOS, In which, they are paying $2,500,000 for Android full chain (Zero-Click) with persistence exploit and $1,500,000 for iMessage RCE with LPE( Local Privilege Escalation).

It’s a surprising moment for bug bounty community to earn more money by reporting quality of mobile zero-day exploits and there is no price changes for Desktops/Servers exploits.

In the Mobile platform, Zerodium Increased Payouts for WhatsApp RCE and iMessage RCE + LPE (Zero-Click) without persistence from $1,000,000 to $1,500,000.

Also decreased the payout from $1,500,000 to $1,000,000 for Apple iOS full chain exploit and $1,000,000 to $500,000 for iMessage RCE + LPE  without persistance.

According to ZERODIUM new report, “The amounts paid to researchers to acquire their original zero-day exploits depend on the popularity and security level of the affected software/system, as well as the quality of the submitted exploit (full or partial chain, supported versions/systems/architectures, reliability, bypassed exploit mitigations, default vs. non-default components, process continuation, etc). 

New changes applied only for mobile platform and there is no changes in Desktops/Servers based zero-day exploit acquisition.

Zerodium takes one week and less to verify all submitted research. Once they confirm the then the payment will be initiated via various medium including bank transfer or cryptocurrencies such as Bitcoin or Monero.

You can also take Master in Bug Bounty course online to enhance your skill in Bub Bounty programs and ethically reporting the vulnerabilities.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations

EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…

9 seconds ago

AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hours

Web applications are facing a growing challenge from "gray bots," a category of automated programs…

5 minutes ago

New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data

A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate stolen…

8 minutes ago

Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to…

9 minutes ago

Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords

Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper's Session Smart Networking…

19 minutes ago

Google’s Quick Share for Windows Vulnerability Allows Remote Code Execution

Cybersecurity researchers from SafeBreach Labs have revealed new vulnerabilities in Google’s Quick Share file-transfer utility…

31 minutes ago