
Weeks after Apple had released an emergency security update to patch two zero-day exploits, security researchers stumbled upon another zero-day vulnerability.
In August, the technology giant patched two previously unknown vulnerabilities – CVE-20220-32893 and CVE-2022-32894 – threat actors could use to hijack devices and plant malware on them.
Webz.io, the company that monitors web databases, claims to have discovered a new Apple zero-day vulnerability being traded on the dark web. A few days after the initial vulnerability was exposed, the researchers found a post in which a hacker was offering a new zero-day around the same CVE-2022-32893 for €2.5 million.

"This is what we consider to be a unique publication of a zero-day because it is rare that a hacker publicly sells zero-day, especially related to a large enterprise such as Apple. This specific hacker has a history of selling zero days for Apple and Android," the company said.
It's common to see a higher level of malicious activity around the time of publication of new vulnerabilities. We've witnessed the Log4j exploitation party after the flaw became publicly known, then the exploitation of the first patch followed. We also saw at least ten advanced persistent threat (APT) groups jumping on the Microsoft Exchange Server exploitation train.
Given Apple's recent zero-days affect the majority of its devices, it's no wonder threat actors tried to exploit the flaws as soon as possible.
Webz.io ran a search of the two vulnerabilities by using their Dark Web API and found threat actors discussing the zero-days on different platforms, from Telegram to Tor.
The image below illustrates a specific discussion between hackers about CVE-2022-32893/4 and looking for additional zero-days around the already existing patch.

Cybernews has approached Apple for comment and will update the article accordingly.
More from Cybernews:
Log4j saga: the first patch is already being exploited
10 APT groups that joined the MS Exchange exploitation party
Microsoft zero-day bug “exploited by threat actors”
Atlassian zero-day vulnerability exploited in the wild
Governments pay millions for 0days: more harm than good?
Subscribe to our newsletter
Your email address will not be published. Required fields are marked