Do not click on strange links or your phone will be hijacked
Fraudsters took advantage of message vulnerabilities to take control of the device without the victim clicking on the link sent. Users just need to open and view the message to be infected with malicious code.
Many people believe that there is nothing to worry about malware infection without clicking on dangerous links, opening suspicious files, or installing programs from untrusted sources. However, the truth is not as it appears to be.
Sophisticated "zero click"
In fact, there is an exploit called "zero-click", which does not require any action on the part of the target user (clicking on the mouse or clicking on the message) and yet the scammer can still take control of it. device.
Specifically, scammers took advantage of message vulnerabilities to take control of the device without the victim needing to click on the sent link. Users just need to open and view the message to be infected with malicious code.
To be able to use this difficult and complex technique, hackers need to invest a lot and research zero-click security vulnerabilities.
These vulnerabilities are very dangerous and highly effective in financial fraud attacks, so they are often sold on the black market for prices that can even reach millions of dollars.
Information about security vulnerabilities (including those suitable for creating zero-click exploits) is also often posted by leading security companies.
So, cybercriminals can follow news in the security world for information and exploit this vulnerability in their malware.
Preventing zero-click attacks
Software developers try to fix vulnerabilities in their products as soon as possible. However, not all users install and upgrade updates to fix security vulnerabilities.
This is extremely dangerous because bad guys do not need to be professional hackers to create malicious code based on zero-click vulnerabilities to directly attack a series of users who do not update patches. So users, update your devices and applications regularly, including web browsers.
You should read it
- What do you know about the first 'cyber attack' in the world?
- What is a zero-click attack? How dangerous is it?
- Keysight's security expert warns against the new cyber attack process
- Cyber-Attack attacked the US military network
- Facebook is a new trend in cyber attacks
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- Will 5G make us more vulnerable to cyber attacks?
- Configure Windows XP SP2 network protection technologies on a computer
- Cisco sends fake phishing emails to employees to teach them not to click miscellaneous
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Phishing attack: The most common techniques used to attack your PC
- The basic steps in dealing with network security issues that you need to understand
Maybe you are interested
New Intel microcode '0x129' tested on Linux, did not show a major impact on performance Learn about Hamster AI: The best free all-in-one AI tool Why does opening MOV file have no image? How to fix? How to install HEVC and HEIF codecs on Windows 11 How to print Excel on 1 A4 page - Display full content on 1 page More than 60% of passwords are cracked by AI in less than 60 seconds