How Hackers Can Control Your Phone Without You Clicking on a Link

5Mind. The Meme Platform

Zero-click attacks have evolved from being used to primarily target high-profile people for information to becoming a threat to anyone with a smart device.

In 2025, most people are inseparable from their laptops and smartphones. With that familiarity has come a wariness of the dangers of clicking on unsolicited emails, SMS, or WhatsApp messages.

But there is a new and growing menace called zero-click attacks, which have previously targeted only VIPs or the very wealthy because of their cost and sophistication.

A zero-click attack is a cyberattack that hacks a device without the user clicking anything. It can happen just by receiving a message, call, or file. The attacker uses hidden flaws in apps or systems to take control of the device, with no action needed from the user and the user remains unaware of the attack.

“Although public awareness has increased recently, these attacks have steadily evolved over many years, becoming more frequent as smartphones and connected devices proliferated,” Nathan House, CEO of StationX, a UK-based cybersecurity training platform, told The Epoch Times.

“The key vulnerability is in the software, rather than the type of device, meaning any connected device with exploitable weaknesses could potentially be targeted,” he said.

Aras Nazarovas, an information security researcher at Cybernews, told The Epoch Times why zero-click attacks usually target VIPs, rather than ordinary individuals.

“Since finding such zero-click exploits is difficult and expensive, most of the time such exploits are used to gain access to information from key figures, such as politicians or journalists in authoritarian regimes,” he said.

“They are often used in targeted campaigns. Using such exploits to steal money is rare.”

In June 2024, the BBC reported that social media platform TikTok had admitted that a “very limited” number of accounts, including those of media outlet CNN, had been compromised.

While ByteDance, the owner of TikTok, did not confirm the nature of the hack, cybersecurity companies such as Kaspersky and Assured Intelligence suggested it stemmed from a zero-click exploit.

“The part that requires high levels of sophistication is finding bugs that allow such attacks and writing exploits for these bugs,” Nazarovas said.

“It has been a billion-dollar market for years, selling zero-click exploits and exploit chains. Some gray/dark market exploit brokers often offer $500,000 to $1 million for such exploit chains for popular devices and apps.”

Nazarovas added that while ordinary users have been hit in the past by zero-click ‘drive-by’ attacks. These are attacks that emerge after the unintentional installation of malicious software onto a device, often without the user even realizing it. They have become more infrequent with the growing gray market for such exploits.

House said zero-click exploits often seek out vulnerabilities in software and apps that are expensive to discover, which means the perpetrators are usually “nation-state actors or highly-funded groups.”

By Chris Summers

Read Full Article on TheEpochTimes.com

Contact Your Elected Officials
The Epoch Times
The Epoch Timeshttps://www.theepochtimes.com/
Tired of biased news? The Epoch Times is truthful, factual news that other media outlets don't report. No spin. No agenda. Just honest journalism like it used to be.

Are Epstein’s Worst Sins Being Confirmed?

WARNING: THIS ARTICLE HAS DISTURBING CONTENT OF A SENSITIVE...

Sadly, Minnesota has become a battleground, once again

Minnesota is again a battleground. Five years after George Floyd protests, demonstrators now target ICE agents enforcing the law.

Stolen Land or Stolen Context?: What We Are No Longer Teaching Our Children

To assess whether “stolen land” is accurate, we must examine how U.S. land was acquired — historically, not emotionally or rhetorically.

Repeal the National Childhood Vaccine Injury Act: The Original Petition

In 1986, Congress granted vaccine makers unique legal protections, shielding them from most lawsuits over injuries caused by vaccines.

Bad Bunny’s Legal Troubles Coming

The NFL and NBC’s “Big Game” halftime show featuring Bad Bunny has ignited controversy, unleashing a wave of backlash and unexpected fallout for all involved.

Tom Homan Announces End to Immigration Enforcement Surge in Minnesota

Tom Homan said that the administration has made significant progress in Minnesota and will therefore conclude the immigration enforcement surge in the state.

White House Fires Interim US Attorney in New York Hours After Judicial Selection

The White House fired the interim U.S. attorney for New York’s Northern District just hours after federal judges selected him to fill the vacancy.

DOJ Asks Prosecutors to Flag ‘Rogue’ Judges for Impeachment

The DOJ asked federal prosecutors nationwide to identify examples of what it calls “judicial activism” for possible impeachment referrals to Congress.

Kraft Heinz Pauses Split as New CEO Says Packaged Foods Giant Is ‘Fixable’

Kraft Heinz is pausing plans to split into two companies as new CEO Steve Cahillane says its problems are “fixable and within our control.”

Trump Warns Republicans Will ‘Suffer the Consequences’ If They Vote Against Tariffs

President Trump warned GOP lawmakers they’ll face consequences if they oppose his tariff agenda after some sided with Democrats on a measure.

Trump Orders Military to Purchase Electricity From Coal-Fueled Power Plants

President Donald Trump signed an executive order on Feb. 11 directing the U.S. military to purchase its power from coal-fired electricity plants.

Trump Says Meeting With Netanyahu Yields No Definitive Agreement on Iran

President Trump hosted Israeli PM Benjamin Netanyahu at the White House on Feb. 11 amid ongoing tensions with Iran over its nuclear program.

Why Canada’s China Pivot Makes US Tariff Relief Harder

Analysts say Ottawa’s Beijing outreach is raising new security and trade concerns in Washington—making U.S. tariff relief even harder to secure.
spot_img

Related Articles