Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Guarding Against Zero-Click Threats: Phones Targeted by Chinese Hackers

by Jane Doe
June 11, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

Mobile cybersecurity has reached a disconcerting new horizon in recent months, with the rise of so-called “zero-click” attacks, said to be used by Chinese state hackers, who are targeting prominent members of society and elements of critical national infrastructure.

These are high-tech break-ins that, unlike many others, don’t require the target to click on a link, download a file or otherwise interact — meaning your phone calling and text messages can be monitored, in real time, remotely, from anywhere.

Recent probes by cyber security firms, such as iVerify, discovered abnormal crashes in software on iPhones of U.S. and EU individuals in politics, government, media, and tech. These crashes, which we noticed starting in late 2024 and continuing through 2025, are highly suggestive of zero-click exploitation.

Although direct attribution is difficult, circumstantial evidence suggests as much, as Chinese state-sponsored groups have previously shown an interest in these individuals.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

One of the vulnerabilities, referred to as “Nickname”, affects the iMessage process and can potentially be exploited with the repeated rapid-fire nickname updates that are sent to an iMessage user.

This would give attackers entry to the device and potential to affect data, such as changing SMS attachments and message metadata. Apple has fixed this particular vulnerability in iOS 18.3.1, but it is worth mentioning that the very nature of zero-click exploits implies that there may always be new, and unaddressed (zero-day) flaws out there.

U.S. officials have long warned of extensive Chinese hacking campaigns in which they have sought to break into mobile networks and listen in on private communications.

There has been particular concern about Chinese telecom companies’ role in building network infrastructure around the world that experts fear could be used for cyber espionage. Lawmakers have also raised concerns about Chinese hackers trying to tap into the phones of high-profile American political figures.

The surge of zero-click threats highlights a fundamental problem for cybersecurity: All the traditional defenses that depend on users being conscientious and suspicious are failing. Experts recommend users be vigilant about software updates, reboot their devices every day to thwart memory-resident malware and look at advanced mobile threat protection tools.

This dynamic threat environment requires increased attention and a proactive defensive strategy that can safeguard against these new, more powerful, and invisible threats.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

June 23, 2025

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

April 21, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.