黑客如何通过“零点击”攻击控制你的手机
How Hackers Can Control Your Phone With "Zero-Click" Attack

原始链接: https://www.zerohedge.com/technology/how-hackers-can-control-your-phone-zero-click-attack

零点击攻击,即无需用户任何交互即可入侵设备的网络攻击,正日益成为一种威胁。由于成本和复杂性,此类攻击过去主要针对重要人物(VIP),它们利用软件和应用程序中隐藏的漏洞,无需用户任何操作即可完成攻击。专家强调,漏洞存在于软件本身,任何联网设备都可能成为目标。 虽然普通用户偶尔也会成为“开车经过式”(drive-by)攻击的目标,但零点击攻击主要针对政客、记者等高知名度人士,因为他们的信息价值更高。这类攻击的增多,归因于间谍软件市场的扩张以及更复杂的漏洞利用工具的普及,而非人工智能技术的发展。 “飞马”间谍软件事件,该事件据称对全球记者和政治人物进行监控,充分体现了零点击攻击的严重性。为了防止非法利用,公司会通过“漏洞赏金”计划激励黑客报告漏洞。


原文

Authored by Chris Summers via The Epoch Times (emphasis ours),

In 2025, most people are inseparable from their laptops and smartphones. With that familiarity has come a wariness of the dangers of clicking on unsolicited emails, SMS, or WhatsApp messages.

But there is a growing menace called zero-click attacks, which have previously targeted only VIPs or the very wealthy because of their cost and sophistication.

Illustration by The Epoch Times, Shutterstock

A zero-click attack is a cyberattack that hacks a device without the user clicking anything. It can happen just by receiving a message, call, or file. The attacker uses hidden flaws in apps or systems to take control of the device, with no action needed from the user and the user remains unaware of the attack.

“Although public awareness has increased recently, these attacks have steadily evolved over many years, becoming more frequent as smartphones and connected devices proliferated,” Nathan House, CEO of StationX, a UK-based cybersecurity training platform, told The Epoch Times.

The key vulnerability is in the software, rather than the type of device, meaning any connected device with exploitable weaknesses could potentially be targeted,” he said.

Aras Nazarovas, an information security researcher at Cybernews, told The Epoch Times why zero-click attacks usually target VIPs, rather than ordinary individuals.

“Since finding such zero-click exploits is difficult and expensive, most of the time such exploits are used to gain access to information from key figures, such as politicians or journalists in authoritarian regimes,” he said.

“They are often used in targeted campaigns. Using such exploits to steal money is rare.”

In June 2024, the BBC reported that social media platform TikTok had admitted that a “very limited” number of accounts, including those of media outlet CNN, had been compromised.

While ByteDance, the owner of TikTok, did not confirm the nature of the hack, cybersecurity companies such as Kaspersky and Assured Intelligence suggested it stemmed from a zero-click exploit.

The part that requires high levels of sophistication is finding bugs that allow such attacks and writing exploits for these bugs,” Nazarovas said.

“It has been a billion-dollar market for years, selling zero-click exploits and exploit chains. Some gray/dark market exploit brokers often offer $500,000 to $1 million for such exploit chains for popular devices and apps.”

An attendee inspects the new iPhone 16 Pro Max during event at the Apple headquarters in Cupertino, Calif., on Sept. 9, 2024. Experts warn of a rise in zero-click attacks—cyberattacks that compromise devices without any user interaction. Justin Sullivan/Getty Images

Nazarovas added that while ordinary users have been hit in the past by zero-click ‘drive-by’ attacks. These are attacks that emerge after the unintentional installation of malicious software onto a device, often without the user even realizing it. They have become more infrequent with the growing gray market for such exploits.

House said zero-click exploits often seek out vulnerabilities in software and apps that are expensive to discover, which means the perpetrators are usually “nation-state actors or highly-funded groups.”

Although there have been recent innovations in AI that have made certain cyber crimes, such as voice-cloning or vishing, more prevalent, Nazarovas says there is no evidence yet that it has increased the risk from zero-click attacks.

House said people could use AI to “write zero-click exploit chains for people who would have otherwise lacked the time, experience, or knowledge to be able to discover and write such exploits.”

But, he said, the increase in zero-click attacks in recent years, “stems mainly from expanded spyware markets and greater availability of sophisticated exploits, rather than directly from AI-driven techniques.”

He said zero-click attacks have existed for more than a decade, the most infamous of which was the Pegasus spyware affair.

In July 2021, The Guardian and 16 other media outlets published a series of articles, alleging that foreign governments used the Israeli-based NSO Group’s Pegasus software to surveil at least 180 journalists and numerous other targets around the world.

Alleged targets of Pegasus surveillance included French President Emmanuel Macron, Indian opposition leader Rahul Gandhi, and Washington Post writer Jamal Khashoggi, who was slain in Istanbul on Oct. 2, 2018.

A woman checks the website of Israel-made Pegasus spyware at an office in Nicosia, Cyprus, on July 21, 2021. Pegasus has been tied to several high-profile international zero-click attacks in recent years. Mario Goldman/AFP via Getty Images

In a statement at the time, NSO Group said, “As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi.”

On May 6, a California jury awarded WhatsApp’s parent company, Meta, $444,719 in compensatory damages and $167.3 million in punitive damages, in a privacy case against NSO Group.

The WhatsApp complaint was focused on the Pegasus spyware, which, according to the lawsuit, was developed “to be remotely installed and enable the remote access and control of information—including calls, messages, and location—on mobile devices using the Android, iOS, and BlackBerry operating systems.”

While ordinary users can occasionally become collateral targets, attackers generally reserve these costly exploits for individuals whose information is especially valuable or sensitive,” Nazarovas said.

According to Nazarovas, corporations offer hackers ‘bug bounties’ to incentivize them to find these exploits and report them to the company, rather than selling them to a broker who then sells them on to parties who use them illegally.

Read the rest here...

Loading...

联系我们 contact @ memedata.com