Do not click on strange links or your phone will be hijacked
Many people believe that there is nothing to worry about malware infection without clicking on dangerous links, opening suspicious files, or installing programs from untrusted sources. However, the truth is not as it appears to be.
Sophisticated "zero click"
In fact, there is an exploit called "zero-click", which does not require any action on the part of the target user (clicking on the mouse or clicking on the message) and yet the scammer can still take control of it. device.
Specifically, scammers took advantage of message vulnerabilities to take control of the device without the victim needing to click on the sent link. Users just need to open and view the message to be infected with malicious code.
To be able to use this difficult and complex technique, hackers need to invest a lot and research zero-click security vulnerabilities.
These vulnerabilities are very dangerous and highly effective in financial fraud attacks, so they are often sold on the black market for prices that can even reach millions of dollars.
Information about security vulnerabilities (including those suitable for creating zero-click exploits) is also often posted by leading security companies.
So, cybercriminals can follow news in the security world for information and exploit this vulnerability in their malware.
Preventing zero-click attacks
Software developers try to fix vulnerabilities in their products as soon as possible. However, not all users install and upgrade updates to fix security vulnerabilities.
This is extremely dangerous because bad guys do not need to be professional hackers to create malicious code based on zero-click vulnerabilities to directly attack a series of users who do not update patches. So users, update your devices and applications regularly, including web browsers.
You should read it
- What do you know about the first 'cyber attack' in the world?
- What is a zero-click attack? How dangerous is it?
- Keysight's security expert warns against the new cyber attack process
- Cyber-Attack attacked the US military network
- Facebook is a new trend in cyber attacks
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- Will 5G make us more vulnerable to cyber attacks?
- Configure Windows XP SP2 network protection technologies on a computer
- Cisco sends fake phishing emails to employees to teach them not to click miscellaneous
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Phishing attack: The most common techniques used to attack your PC
- The basic steps in dealing with network security issues that you need to understand
Maybe you are interested
Detecting software vulnerabilities Samsung can be rewarded with 1 million USD
Serious security vulnerabilities in Safari and Chrome have existed for 18 years
GPT-4 exploits vulnerabilities faster and cheaper than humans
Warning of 16 security vulnerabilities causing Microsoft products to be attacked
16 new security vulnerabilities can cause systems using Microsoft software to be attacked
Microsoft fixes 149 security vulnerabilities on Windows, users should update immediately