HT TECH wants to start sending you push notifications. Click allow to subscribe

iPhone hacking price list: Here’s how much hackers charge for zero-day iOS exploits

The market for zero-day exploits is booming, with prices soaring for hacks targeting iPhones, iMessage, and more.

By: HT TECH
Updated on: Apr 07 2024, 15:56 IST
Crowdfense's latest pricing list reveals the escalating value of vulnerabilities, with iPhone hacks commanding up to $7 million. (Unsplash)

In the world of cybersecurity, the market for zero-day exploits is booming, with prices skyrocketing for hacks targeting popular devices and software. Crowdfense, a startup specializing in acquiring and reselling zero-day vulnerabilities, recently unveiled its latest pricing list, revealing staggering sums for exploits targeting iPhones, iMessage, and more.

Pricing Revealed: Valuation of Zero-Day Hacks

Zero-day exploits, named for their reliance on undisclosed vulnerabilities unknown to software developers, fetch hefty sums due to their potential for covert surveillance and espionage. Crowdfense's pricing list indicates that it will pay anywhere from $5 to $7 million for zero-days capable of infiltrating iPhones, while Android exploits can net up to $5 million. Similarly, exploits targeting popular web browsers and messaging platforms command top dollar, with Google Chrome and Safari vulnerabilities fetching up to $3 million and $3.5 million, respectively, and iMessage and WhatsApp hacks fetching between $3 and $5 million, reported techcrunch.

You may be interested in

Mobiles Tablets Laptops
Apple iPhone 15 Pro Max 1TB
  • Black Titanium
  • 8 GB RAM
  • 1 TB Storage
₹184,900
Buy now
Apple iPhone 14 Pro Max 1TB
  • Gold
  • 6 GB RAM
  • 1 TB Storage
₹177,999
Check details
5% OFF
Apple iPhone 15 Pro
  • Black Titanium
  • 8 GB RAM
  • 128 GB Storage
₹127,990₹134,900
Buy now
9% OFF
Apple iPhone 15
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹72,690₹79,900
Buy now
Acer Swift Go SFG14 41 NX KG3SI 002 Laptop
  • Pure Silver
  • 8 GB RAM
  • 512 GB SSD
₹54,990
Check details
Acer Aspire 5 A515 57G Laptop Core I5 12th Gen 16 GB 512 GB SSD Windows 11 UN K9TSI 002
  • Gray
  • 16 GB RAM
  • 512 GB SSD
₹54,990
Check details
Asus VivoBook 15 X515JA BQ322WS Laptop
  • Transparent Silver
  • 8 GB RAM
  • 512 GB SSD
₹32,990
Check details
Acer Aspire 3 A315 24 NX KDESI 004 Laptop
  • Silver
  • 8 GB RAM
  • 512 GB SSD
₹32,790
Check details
35% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹25,999₹39,999
Buy now
53% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹21,999₹47,000
Buy now
30% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹20,399₹28,999
Buy now
Honor Pad X9
  • Gray
  • 4 GB RAM
  • 128 GB Storage
₹15,999
Check details

Also read: Bought a new iPhone 15? Check these data transfer tips to ensure secure migration

Also read: Looking for a smartphone? To check mobile finder click here.

Escalating Prices: Factors Driving the Surge

These figures mark a significant increase from Crowdfense's previous pricing, reflecting the growing demand for sophisticated hacking tools. The surge in prices can be attributed to heightened security measures implemented by tech giants like Apple and Google, prompting hackers to seek out increasingly rare and elusive vulnerabilities.

While Crowdfense's payouts are among the highest in the industry, other players, particularly in Russia, offer even more lucrative rewards. Last year, a Russian company named Operation Zero announced plans to pay up to $20 million for iPhone and Android exploits, though geopolitical tensions and sanctions may impact the accessibility of such deals.

Despite the allure of lucrative payouts from third-party brokers, tech companies like Apple also offer their own bug bounty programs. Apple's Security Research Bounty program, for instance, offers rewards of up to $2 million for critical security vulnerabilities discovered in its products.

The escalating prices for zero-day exploits underscore the evolving landscape of cybersecurity, where the race to discover and exploit vulnerabilities is driven by both financial incentives and geopolitical interests. As technology continues to advance, the demand for effective cybersecurity measures and ethical hacking practices becomes increasingly vital in safeguarding digital ecosystems against malicious actors.

One more thing! We are now on WhatsApp Channels! Follow us there so you never miss any updates from the world of technology. ‎To follow the HT Tech channel on WhatsApp, click here to join now!

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on ,Twitter, Facebook, , and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 07 Apr, 15:56 IST
Tags:
NEXT ARTICLE BEGINS