Chinese hackers target smartphones in sophisticated cyberattacks, exploiting vulnerabilities without user interaction. A significant investigation linked these attacks to sensitive individuals in government, tech, and journalism. Federal officials warn of a broader security crisis, as mobile devices and apps become prime targets for exploitation, raising alarms about the safety of sensitive information.
In a worrying trend, cybersecurity experts have highlighted a growing threat posed by Chinese hackers who are exploiting vulnerabilities in smartphones. This issue was first identified when an unusual software crash affected a small group of mobile devices utilized by professionals in government, technology, and journalism. These crashes, observed since late last year and extending into 2025, signaled a sophisticated cyberattack capable of breaching phones without any user interaction.
According to iVerify, the cybersecurity firm investigating the matter, many victims of the crashes had previously been targeted by Chinese cybercriminals and are individuals working in sectors of interest to the Chinese government. Mobile devices face increasing scrutiny as attackers increasingly view smartphones as weak points in U.S. cyber defences. National security and tech experts warn that these vulnerabilities could expose sensitive data and leave Americans at risk of cyberattacks.
Rocky Cole, a former cybersecurity expert at the NSA and now chief operations officer at iVerify, stated, “The world is in a mobile security crisis right now. No one is watching the phones.” In December, U.S. authorities flagged a large-scale Chinese hacking initiative aimed at intercepting American phone conversations and text messages.
Representative Raja Krishnamoorthi of Illinois, who serves on the House Intelligence Committee, sounded the alarm stating that hackers managed to listen in on phone calls in real time and access text messages. It is also worth noting that Chinese hackers reportedly sought access to phones used by high-profile individuals, including Donald Trump and his campaign partner JD Vance.
The Chinese government, however, has vehemently denied these accusations of cyber espionage and argues that the U.S. has long been involved in its own covert cyber operations, using national security concerns as a pretext to sanction Chinese firms. Lin Jian, a spokesman for China’s foreign ministry, claimed during a press conference, “The U.S. has long been using all kinds of despicable methods to steal other countries’ secrets.”
U.S. intelligence officials continue to view China as a persistent threat to national interests, employing various strategies including online propaganda and cyber surveillance. Mobile networks are particularly vulnerable, prompting the U.S. and its allies to ban Chinese telecommunications firms from their critical infrastructure.
Despite this, many countries, including Germany, still deal with the ramifications of Chinese technology presence. Rep. John Moolenaar from Michigan has expressed serious concerns about the potential for state-owned Chinese companies to infiltrate U.S. infrastructure.
The capabilities of mobile devices have expanded dramatically, from stock trading to powering entire power plants. However, this rapid growth has often outstripped their security measures. Often, high-ranking government officials carry smartphones filled with sensitive data, making them prime targets.
Most recently, the White House disclosed that a fraudster impersonated Susie Wiles, Trump’s chief of staff, to make unauthorized outreach to senators and business leaders. While the method of acquiring her contacts is unclear, it raises significant concerns over the security of personal mobile devices staying protected.
Apps and connected devices often lack the robust security and regular updates that smartphones boast. This opens doors for hackers looking to exploit weaknesses, turning seemingly benign smart devices into potential pathways for malicious intrusion. A new federal initiative aims to introduce a “cyber trust mark” to ensure connected devices meet security criteria, however, experts urge caution.
The vulnerabilities within smartphones are compounded by user negligence and poor security practices. For instance, Mike Waltz, who previously served as Trump’s national security adviser, inadvertently included The Atlantic’s editor-in-chief in a sensitive military chat. Similarly, Secretary of Defense Pete Hegseth used personal computing to engage on Signal, a messaging app that is not approved for classified communication, raising further concerns.
As China and other nations look to exploit security lapses, experts like Syracuse University’s Michael Williams stress that national security officials must be vigilant in preventing such oversights in the future. “They all have access to a variety of secure communications platforms,” noted Williams, underscoring that information sharing must be carefully controlled.
The rising incidents of cyberattacks, particularly involving smartphones, have raised alarms regarding mobile device security in the U.S. With Chinese hackers increasingly infiltrating devices of high-profile professionals, experts emphasize the ongoing vulnerabilities and user lapses. National security officials must adopt stringent measures to secure sensitive communication and ensure that mobile devices can withstand such sophisticated cyber threats. The focus must be on improved user practices and robust protective technology to mitigate these risks.
Original Source: www.al.com