Logo

Chinese Hackers Exploit Phantom Crashes to Target US Officials' Smartphones

A sophisticated cyberattack involving phantom software crashes has targeted smartphones of US government officials, political figures, and journalists. Linked to Chinese state-affiliated hackers, this breach exposes vulnerabilities in mobile security, with experts warning of the risks posed by connected devices and the need for stronger safeguards against espionage.

Chinese Hackers Exploit Phantom Crashes to Target US Officials' Smartphones

Unraveling the Phantom Crash Cyberattack on US Smartphones

Security experts have uncovered a covert cyberattack involving a mysterious software crash affecting smartphones belonging to US government officials, political figures, technology professionals, and journalists. This suspicious activity, emerging in late 2024 and continuing into 2025, signals a highly sophisticated intrusion allowing hackers to breach devices without any user action.

Who Were Targeted and Why?

Investigations reveal that the victims work in sectors of strategic interest to the Chinese government. These individuals had previously been targeted by hackers linked to China, suggesting a persistent, focused surveillance campaign. This campaign underlines an escalating vulnerability in mobile security across critical US cyber defenses, with foreign actors, notably those connected to China’s military and intelligence apparatus, exploiting glaring weaknesses.

The Mobile Security Crisis

"The world is in a mobile security crisis right now," asserted a cybersecurity veteran now leading operations at a prominent security firm. This vulnerability leaves sensitive data and national interests susceptible to compromise, as mobile devices continue to be a prime gateway for espionage.

Scope of the Chinese Cyberespionage Campaign

Earlier warnings in 2024 detailed a broad Chinese espionage operation aimed at intercepting phone calls and reading text messages from Americans, including politicians and journalists. Members of congressional committees focused on intelligence and China’s geopolitical threat have confirmed real-time eavesdropping capabilities presented by the campaign.

The campaign’s targets were not limited to government officials; it also extended to phones used by prominent political candidates during the 2024 election, highlighting the attackers’ intent to influence or gather intelligence on key political figures.

Official Denials and Counterclaims

The Chinese government has repeatedly denied involvement in cyberespionage activities, accusing the US of conducting similar operations against China under the guise of national security. At recent diplomatic briefings, Chinese spokespersons defended their position by labeling US sanctions and trade restrictions on Chinese tech companies as politically motivated.

Strategic Importance of Mobile Networks and Devices

Mobile networks remain a critical battlefield. Many Western nations, including the US, have barred Chinese telecom firms from operating within their infrastructure due to security fears. Nevertheless, Chinese technology still has a foothold globally, including partial control over cloud systems and routing, which experts warn could be exploited for cyberattacks.

US lawmakers have expressed deep concerns about Chinese-owned companies potentially infiltrating vital national infrastructure covertly and have sought detailed disclosures about their operations on American soil.

Vulnerabilities in Everyday Devices

The proliferation of smartphones and connected devices — from fitness trackers to smart home appliances — has far outpaced the implementation of robust security measures. As a result, each device presents a potential entry point for cyber adversaries looking to exploit or disrupt networks.

High-Stakes Targeting of Government Officials’ Phones

Phones used by senior government personnel hold sensitive data — from confidential communications to security credentials and policy deliberations — making them invaluable to hackers. Recently, an impersonation scheme targeted top-level political contacts through messages originating from a compromised personal phone, exposing the vulnerabilities inherent in personal device security.

Efforts to Fortify Connected Device Security

In response, federal initiatives have introduced a “cyber trust mark” for devices meeting stringent security standards. Nonetheless, experts caution consumers and officials alike not to ease vigilance, as even non-traditional targets such as digitally-connected toys have been exploited as backdoors into networks.

The Human Factor and Operational Security

Cybersecurity specialists emphasize that device security is only as strong as user behavior. There have been reported mishaps where classified discussions occurred on unsecured messaging platforms, highlighting operational lapses that adversaries are keen to exploit.

Experts urge heightened discipline and controlled communication protocols to prevent inadvertent information leaks, noting the range of secure communication platforms available to officials must be used judiciously.

The Road Ahead: Vigilance Against Persistent Threats

As global cyber conflicts intensify, the US faces ongoing challenges defending sensitive digital assets from persistent foreign threats. National security leaders advocate a multi-layered approach, combining technological safeguards with stricter procedural controls, to thwart future infiltrations.

Sam Altman’s World to Launch Iris-Scanning Orb Identity in UK from June 12
Sam Altman’s World to Launch Iris-Scanning Orb Identity in UK from June 12

World, the startup led by Sam Altman, is launching its iris-scanning Orb device in the UK beginning June 12. This biometric system creates a unique World ID to verify human users and prevent AI and bot fraud. Already popular in the US with over 13 million users, World’s tech is gaining traction with governments and enterprises focused on identity security amid rising AI threats.

Tech Giants Unite to Standardize Hacker Group Nicknames in Cybersecurity
Tech Giants Unite to Standardize Hacker Group Nicknames in Cybersecurity

Microsoft, CrowdStrike, Palo Alto Networks, and Alphabet have partnered to create a public glossary standardizing nicknames for state-sponsored hacker groups and cybercriminals. This initiative addresses confusion caused by overlapping and inconsistent names across the cybersecurity industry, aiming to enhance collective response efforts. Early successes suggest improved communication, but experts caution that transparency and collaboration remain vital.

Cartier Confirms Data Breach Exposes Customer Information in Cyberattack
Cartier Confirms Data Breach Exposes Customer Information in Cyberattack

Luxury jeweller Cartier recently confirmed a cyberattack that temporarily breached its systems, compromising limited customer details such as names, email addresses, and countries. No sensitive information like passwords or financial data were affected. The incident reflects a wider trend of cyberattacks targeting premium retail brands, prompting Cartier to strengthen its cybersecurity measures and coordinate with experts and authorities to safeguard customer information.

Elon Musk-Trump Feud Risks Critical NASA and Pentagon Space Programs
Elon Musk-Trump Feud Risks Critical NASA and Pentagon Space Programs

A recent feud between Elon Musk and former President Donald Trump has placed crucial NASA and Pentagon programs at risk. Musk’s initial threat to decommission SpaceX’s Dragon spacecraft—NASA's only vehicle transporting astronauts to the ISS—posed serious operational challenges. SpaceX also supports vital national defense launches. Although Musk retracted his threat, the incident highlights the vulnerability of US space operations dependent on private contractors amid political conflicts.

Trump Signs Orders to Enhance US Drone Security and Supersonic Flight
Trump Signs Orders to Enhance US Drone Security and Supersonic Flight

President Trump has signed executive orders to improve US drone defense systems, authorize beyond-visual-line-of-sight drone operations, and lift the 1973 FAA ban on supersonic flights over land. These measures aim to boost commercial drone deliveries, reduce reliance on foreign drone tech, and accelerate development of electric air taxis and supersonic aircraft, reinforcing national security and advancing aerospace innovation.

Major Internet Outage Disrupts North Korea’s Online Services
Major Internet Outage Disrupts North Korea’s Online Services

A significant internet outage disrupted North Korea's online connectivity on Saturday, affecting government websites, official news portals, and email services. Experts attribute the disruption to internal network failures since connections through China and Russia were simultaneously affected. North Korea maintains strict control over its internet, allowing only select officials global access, while the general public is limited to a domestic intranet. The country has previously experienced outages linked to cyberattacks, and it operates elite hacker groups accused of international cybercrimes, which it denies.

Paraguay President's X Account Targeted in Bitcoin Scam Hack
Paraguay President's X Account Targeted in Bitcoin Scam Hack

Paraguay’s government confirmed suspicious activity on President Santiago Pena's X account, suspected to be a hack promoting a fake Bitcoin legal tender announcement and reserve fund. Authorities are investigating alongside X’s cybersecurity team, urging citizens to disregard any posts until the issue is resolved.

Iran Orders Citizens to Delete WhatsApp Over Israel Data Claims; App Responds
Iran Orders Citizens to Delete WhatsApp Over Israel Data Claims; App Responds

Iranian state media has called for the removal of WhatsApp, accusing the app of sharing user data with Israel—claims the company denies. WhatsApp stresses its strong end-to-end encryption and no user data tracking or sharing policy. Experts highlight ongoing concerns regarding metadata and data sovereignty amid Iran’s history of social media restrictions.

Iran Claims Major Cyber Theft of Sensitive Israeli Nuclear Documents
Iran Claims Major Cyber Theft of Sensitive Israeli Nuclear Documents

Iran has announced it successfully obtained a significant collection of sensitive Israeli nuclear files through a cyberattack on an Israeli nuclear research facility. This move adds fuel to the ongoing tensions over nuclear programs in the Middle East. Iran carefully delayed disclosure to securely transfer and review the vast haul, signaling intensified intelligence confrontations in the region.

World Brain Tumour Day: Debunking Myths About Mobile Phones and Radiation Risks
World Brain Tumour Day: Debunking Myths About Mobile Phones and Radiation Risks

Brain tumours, whether benign or malignant, require swift diagnosis and treatment to improve outcomes. Experts stress the importance of early symptom recognition, debunk common myths about mobile phone radiation, and share insights on lifestyle factors and effective therapies, emphasizing that most brain tumours are treatable with timely care.

Taiwan Military and Coast Guard Drill Intensifies Amid Growing 'Grey Zone' Threat from China
Taiwan Military and Coast Guard Drill Intensifies Amid Growing 'Grey Zone' Threat from China

Amid escalating tensions with China’s covert maritime threats, Taiwan intensified joint military and coast guard exercises that simulated a terrorist ferry seizure. The drills featured coordinated rescue operations and highlighted the deployment of newly commissioned Anping-class corvettes. President Lai stressed Taiwan’s commitment to defending its sovereignty and democracy against ongoing pressures.