“The world is in a mobile security crisis” as Chinese hackers and users put smartphones at risk
Cybersecurity investigators noticed a very unusual software crash. It had an impact on a small number of smartphones belonging to people who worked in government, politics, technology and journalism.
The crash, which began late last year and was carried in 2025, was a tip-off to sophisticated cyberattacks that allowed hackers to sneak into phones without clicking from users.
While the attackers left no clues about their identity, investigators at cybersecurity firm Iverify realized that all the victims had something in common.Chinese hackers are targeting itIn the past.
Foreign hackers are increasingly identifying smartphones, other mobile devices, and apps they use as weak links to US cyber defense. There are groups related to China’s military and intelligence agencyTargeted prominent American smartphonesandI’ve been deeply digged into the communications networkaccording to national security and technology experts.
This shows how vulnerable mobile devices and apps are, and the risk that security obstacles can reveal sensitive information and open American interests to cyberattacks, experts say.
“The world is currently in a mobile security crisis,” said Rocky Cole, a former cybersecurity expert at the National Security Agency. Google And now he is Iverify’s chief operating officer. “No one’s looking at the phone.”
We’ll be zero in China as a threat, and Beijing level its own accusations
US AuthorityWarning in Decemberof a vast Chinese hacking campaign designed to access unknown numbers of Americans’ texts and phone conversations.
“They were able to listen in real time on the phone and read text messages,” said Illinois Rep. Raja Krishnamoorti. He is a member of the House Intelligence Election Committee of China’s Communist Party Committee and is a senior Democrat from the Communist Party Committee of China, created to study geopolitical threats from China.
Chinese hackers tooI asked for access to the phoneIt was used by Donald Trump during the 2024 campaign and ran fellow JD Vance.
It is in the Chinese governmentCyber Epion claim has been deniedand criticised the United StatesInstalling your own cyber operations. It says America is quoting national security as an excuseIssues sanctionsIt opposes Chinese organizations and maintains Chinese technology companies from the global market.
“The US has long used all sorts of sly methods to steal secrets from other countries,” said Lin Jiang, a spokesman for China’s Foreign Ministry, at a recent press conference.We are looking for information providers for CIA Push China.
The US intelligence agency says China poses a critical and lasting threat to US economic and political concerns and uses tools for digital conflict.Online propagandaandFalse informationartificial intelligence and cyber surveillancespyIt is designed to bring great benefits inMilitary conflict.
Mobile networks are of greatest concern. The United States and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, arePhasing out China’s involvementDue to security concerns. However, Chinese tech companies maintain a large portion of the systems of many countries, giving state-owned companies a global footprint that can be used for cyberattacks, experts say.
Chinese telecoms still maintain several routing and cloud storage systems in the US. This has led to growing concern for lawmakers.
“The American people deserve to know if Beijing is quietly using state-owned businesses to infiltrate our critical infrastructure,” U.S. Rep. R-Mich. He is the chairman of the China Committee that issued a subpoena to a Chinese telecommunications company in April seeking information about US operations.
Mobile devices now Intel Treasure Trove
Mobile devices can purchase inventory, launch drones, and operate power plants. Their spread often outweighs their security.
Mobile phones from high-ranking government officials are especially valuable.Sensitive government informationpasswords and insiders get a glimpse into policy discussion and decision-making.
The White House said last weekSomeone impersonating Susie WillTrump’s Chief of Staff contacted the governor, senator and business leaders via text and phone.
It is unclear how the person gained Wiles’ connections, but apparently he has gained access to her personal cell phone contacts, according to the Wall Street Journal. The messages and calls were not from Wills’ number, the newspaper reported.
Most smartphones and tablets offer robust security, apps, andConnected devicesOften there is a lack of these protections and the regular software updates needed to stay ahead of new threats. It makes all fitness trackers, baby monitors, or smart appliances differentPotential scaffoldingIf you are a hacker trying to penetrate your network, you will either get information or infect your system with malware.
This year, federal officials launched a program that creates “cybertrustmarks” for connected devices that meet federal security standards. But consumers and officials should not lower security guards, said Sunehar Antani, former chief technology officer at the Pentagon’s joint special operations headquarters.
“They are finding backdoors with Barbie dolls,” said Antani, CEO of Horizon3.ai, a cybersecurity company.
If smartphone users do not take precautions, risk arises
If users do not follow basic security precautions, it doesn’t matter how secure your mobile device is, especially if it contains information classified or sensitive information on the device, experts say.
Mike Waltz departedAs Trump’s national security adviser, he accidentally added the Atlantic editor-in-chief to the signal chat used to discuss military plans with other senior officials.
It was held by Secretary of Defense Pete Hegses.Internet connection bypassing Pentagon security protocolsSet up in his office so he canUse the Signal Messaging appOn personal computers, the AP reports.
Hegseth rejected the claimHe shared classification information about Signal, a popular encrypted messaging app that is not approved to communicate classified information.
Michael Williams, a national security expert at Syracuse University, said that if China and other countries try to take advantage of such lapses, national security authorities need to take steps to prevent them from repeating it.
“They all have access to a variety of secure communication platforms,” Williams said. “We can’t share anything ambitious.”
This story was originally introduced Fortune.com