‘Mobile Security Crisis’ Attributed to Chinese Hackers Exploiting Smartphone Flaws and User Lapses

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

Chinese hackers have targeted high-profile individuals in government, politics, technology, and journalism via advanced zero-clicks. The attacks add to already heightened tensions between the U.S. and China.

These attacks manipulate software vulnerabilities to infiltrate devices without requiring any user interaction, gaining access to critical communications and sensitive data.  

Intrusions have included real-time interception of calls, unauthorized access to SMS communications, and, notably, breaches into campaign devices during critical political events in 2024.

A recent report from EDR firm iVerify suggested that unexpected iPhone crashes could happen due to sophisticated zero-click attacks targeting an iMessage flaw.

The U.S. has accused China of broad cyberespionage efforts, alleging state-controlled hackers’ repeated attempts to access classified communications and exploit telecom infrastructures. Beijing, in turn, deflects allegations while accusing Washington of similar underhanded tactics.

Numerous nations, including the U.S., have responded by phasing out Chinese-owned telecom companies from their critical infrastructure, citing surveillance concerns. However, fragments of these firms' technology remain integrated into global systems, offering potential footholds for additional attacks.

Despite advances in mobile device security, the rapid pace of app development and tech innovation creates inherent risks. From fitness trackers to connected toys, insecure IoT devices further expand the attack surface. 

While federal initiatives like the introduction of a “cyber trust mark” aim to reassure users, they cannot fully offset the dangers posed by human error, such as poor password management or misuse of secure communication platforms.

Michael Williams, a security expert at Syracuse University, warns, “Even with sophisticated tools, users must remain vigilant. Security lapses provide easy opportunities for adversaries.”


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: