Mobile cybersecurity has reached a disconcerting new horizon in recent months, with the rise of so-called “zero-click” attacks, said to be used by Chinese state hackers, who are targeting prominent members of society and elements of critical national infrastructure.
These are high-tech break-ins that, unlike many others, don’t require the target to click on a link, download a file or otherwise interact — meaning your phone calling and text messages can be monitored, in real time, remotely, from anywhere.
Recent probes by cyber security firms, such as iVerify, discovered abnormal crashes in software on iPhones of U.S. and EU individuals in politics, government, media, and tech. These crashes, which we noticed starting in late 2024 and continuing through 2025, are highly suggestive of zero-click exploitation.
Although direct attribution is difficult, circumstantial evidence suggests as much, as Chinese state-sponsored groups have previously shown an interest in these individuals.
One of the vulnerabilities, referred to as “Nickname”, affects the iMessage process and can potentially be exploited with the repeated rapid-fire nickname updates that are sent to an iMessage user.
This would give attackers entry to the device and potential to affect data, such as changing SMS attachments and message metadata. Apple has fixed this particular vulnerability in iOS 18.3.1, but it is worth mentioning that the very nature of zero-click exploits implies that there may always be new, and unaddressed (zero-day) flaws out there.
U.S. officials have long warned of extensive Chinese hacking campaigns in which they have sought to break into mobile networks and listen in on private communications.
There has been particular concern about Chinese telecom companies’ role in building network infrastructure around the world that experts fear could be used for cyber espionage. Lawmakers have also raised concerns about Chinese hackers trying to tap into the phones of high-profile American political figures.
The surge of zero-click threats highlights a fundamental problem for cybersecurity: All the traditional defenses that depend on users being conscientious and suspicious are failing. Experts recommend users be vigilant about software updates, reboot their devices every day to thwart memory-resident malware and look at advanced mobile threat protection tools.
This dynamic threat environment requires increased attention and a proactive defensive strategy that can safeguard against these new, more powerful, and invisible threats.