“The world is in a mobile safety crisis” where Chinese infiltrators and user rolls put smartphones at risk

Photo of author

By [email protected]



Cyber ​​security investigators have noticed the failure of very unusual software – it affected a small number of smartphones belonging to the people who worked in the government, politics, technology and the press.

The incidents, which began late last year and transferred to 2025, were the advanced electronic attack that perhaps allowed infiltrators to infiltrate the phone without one click of the user.

The attackers did not leave any evidence about their identities, but the investigators of the cyber security company iverify noticed that all the victims had a common thing: they worked in the areas of interest in the China government and they wereTargetsin the past.

Foreign infiltrators have increased smartphones, other mobile devices and applications they use as a weak link in the United States of America. Communities associated with the service of the army and intelligence in ChinaSmartphones targeted for prominent AmericansandHapper in the depths of communications networksAccording to national security and technology experts.

This shows how weak mobile devices and applications and risks that security failure can offer sensitive information or leave American interests open to electronic attack, as these experts say.

“The National Security Agency Google And now IVERIORIONG operational officials. “Nobody watches phones.”

American zeros in China is a threat, and Beijing organizes its own accusations

American authoritiesCaution in DecemberFor the sprawling Chinese piracy holders designed to reach texts and phone conversations for an unknown number of Americans.

“They managed to listen to phone calls in the actual time and are able to read the text messages,” said MP Raja Krishnamori from Illinois. He is a member of the Intelligence Committee in the House of Representatives and the senior Democrats of the Communist Party of China, which was created to study the geopolitical threat from China.

Chinese infiltrators alsoRequest access to phonesDonald Trump uses it and running Matti Verse during the 2024 campaign.

Its Chinese government hasThe allegations of electronic diarrhea refusedHe accused the United StatesIts internet combinations. It says America is citing national security as an excuse forPenaltyAgainst Chinese organizations and preserving Chinese technology companies from the global market.

Lin Jian, a spokesman for the Chinese Foreign Ministry, told a recent press conference in response to questions aboutPaying the CIA to recruit the Chinese informants.

US intelligence officials said that China poses a major and continuous threat to American economic and political interests, and the tools of digital conflict have settled:Online advertisementandMisinformationArtificial intelligence and electronic monitoring andto spyDesigned to provide a great feature inAny military conflict.

Mobile phone networks are a great concern. The United States and many of its closest allies have banned Chinese telecommunications companies from its networks. Other countries, including Germany, areGradually get rid of Chinese participationBecause of the security concerns. But experts that Chinese technology companies remain a large part of the systems in many countries, giving the state -controlled companies a global imprint that they can use for electronic attacks.

Chinese telecommunications companies still retain some cloud guidance and storage systems in the United States – a growing concern for legislators.

“The American people deserve to know if Beijing calmly uses state -owned companies to infiltrate our critical infrastructure,” American MP John Molinaar, R. Mitch. And the Chairman of the China Committee, which in April issued notes of Chinese telecommunications companies seeking information about its American operations.

Intel Trease treasure has become

Mobile devices can buy stocks, launch drones and operate power plants. They often spread their security.

Phones of senior government officials of special value, containingSensitive government informationPasswords and point of the interior in politics and decision -making discussions.

The White House said last week thatA person impersonated Suzy and ElsTrump Chief of Staff communicates with rulers, business leaders and business leaders with texts and phone calls.

It is not clear how the person got Wales Etisalat, but it seems that he had access to contacts on their personal mobile phone, according to the Wall Street Journal. The newspaper reported that messages and calls were not coming from the number of Wales.

While most smartphones and tablets come with strong safety and applications andRelated devicesIt often lacks this protection or regular software updates needed to stay at the forefront of new threats. This makes every fitness follower, child control, or another smart deviceA possible footholdFor infiltrators looking to penetrate networks, recover information or systems with harmful programs.

Federal officials launched this year’s program to create a “Cyber ​​confidence brand” for connected devices that meet federal security standards. Siniel Antanani, a former chief technology official to lead special operations in the Pentagon, said consumers and officials should not reduce their guard.

“They find background factors in Barbie Dolls,” said Antanani, the CEO of Horizon3.AI, a cybersecurity security company, referring to fears of researchers who penetrated the microphone from a digital connected version of the game.

The risks appear when smart phone users do not take precautions

It does not matter how securing the mobile device if the user does not follow the basic safety precautions, especially if his devices contain classified or sensitive information, experts say.

Mike Walz, who leftAs a national security adviser at Trump, Atlantic Trestended Editorial added to a signal chat used to discuss military plans with senior officials.

Defense Minister Hitzisith wasThe internet connection that exceeded the Pentagon security protocolsHe created in his office so that he couldUse the signal messaging appOn a personal computer, I mentioned AP.

Higseth refused the assurancesHe shared secret information about Signal, which is a famous encrypted messaging application that did not depend on the use of the classified information.

China and other countries will try to benefit from such lapses, and national security officials must take steps to prevent them from repetition.

“They all have access to a variety of safe communication platforms,” ​​Williams said. “We cannot share the things Willy.”

This story was originally shown on Fortune.com



https://fortune.com/img-assets/wp-content/uploads/2025/06/AP25149163043530-e1749394497706.jpg?resize=1200,600

Source link

Leave a Comment