NEWSLETTER
Thursday, July 31, 2025
  • Login
No Result
View All Result
JOURNOS NEWS
30 °c
Columbus
24 ° Thu
22 ° Fri
  • Home
  • World News
  • Business
  • Politics
  • Sports
  • Entertainment
  • Technology
  • Lifestyle
  • Science
  • Health
  • Home
  • World News
  • Business
  • Politics
  • Sports
  • Entertainment
  • Technology
  • Lifestyle
  • Science
  • Health
30 °c
Columbus
24 ° Thu
22 ° Fri
No Result
View All Result
JOURNOS NEWS
No Result
View All Result
Home Technology Cybersecurity & Digital Safety

Chinese Hackers Target U.S. Phones in Growing Mobile Security Crisis

Mobile Devices Under Siege: China-Linked Cyberattacks Raise Alarm

by The Daily Desk
June 9, 2025
in Cybersecurity & Digital Safety, Data Privacy & Security, Gadgets & Devices, Mobile Devices, Mobile Security, Smartphones, Tech Industry News, Technology
0
U.S. Phones Hacked Without a Click — Is China Behind It? - AP Photo/Kiichiro Sato, File

China-Linked Cyber Spies Exploit Mobile Weaknesses in U.S. Networks - AP Photo/Kiichiro Sato, File

China-Linked Hacks, User Errors Fuel Mobile Security Meltdown in the U.S.

A growing number of mysterious smartphone crashes set off alarms among cybersecurity experts late last year — and they weren’t just random glitches. The affected devices all belonged to people in sensitive professions: government, politics, tech, and journalism.

Behind the scenes, it turned out to be a silent but sophisticated cyberattack. There were no clicks, no suspicious links — just smartphones quietly compromised, likely by foreign hackers exploiting invisible vulnerabilities.

More RelatedPosts

How Americans Are Using AI in Everyday Life, According to New Survey

FBI warns smartphone users to stop sharing 2FA codes in scam texts

How AI Deepfakes Threaten Global Security and Business Integrity

Intel Nova Lake CPU Leak Reveals Massive Cache to Challenge AMD X3D

Load More

China’s Digital Footprint in U.S. Devices

Cybersecurity investigators at iVerify, the firm that spotted the crashes, believe the attacks originated from groups aligned with the Chinese government. Their evidence? Every target had some previous link to Chinese hacking campaigns — and each worked in areas of strategic interest to Beijing.

“These aren’t your everyday phishing scams,” said Rocky Cole, iVerify’s COO and a former cybersecurity expert at the NSA and Google. “We’re living through a mobile security crisis, and no one’s really watching the phones.”

A Wake-Up Call for Mobile Device Security

Phones are more than communication tools — they’re digital hubs that control drones, conduct financial transactions, manage infrastructure, and hold confidential conversations. And while phones themselves are often well-protected, the real risk lies in their ecosystem: third-party apps, accessories, and internet-connected devices.

“It’s not just your phone — it’s your smartwatch, your smart TV, your kids’ toys,” said Snehal Antani, CEO of Horizon3.ai. “Researchers have literally hacked the microphone in a Barbie doll.”

A Pattern of Exploitation

U.S. officials have been increasingly vocal about the threat. In December, they exposed a broad Chinese campaign targeting Americans’ text messages and phone calls.

Even high-profile political figures like Donald Trump and his running mate JD Vance had their phones targeted during the 2024 election campaign. The Chinese government denies these allegations, accusing the U.S. of its own global espionage and using “national security” to keep Chinese firms out of Western markets.

Still, experts warn that Chinese telecom companies — some of which still operate routing and cloud storage systems in the U.S. — pose ongoing risks.

“The American public deserves to know whether Beijing is quietly embedding itself in our critical infrastructure,” said Rep. John Moolenaar, chairman of the House Select Committee on the Chinese Communist Party.

When User Mistakes Open the Door

The problem isn’t just hackers. Sometimes, the biggest security flaws are human.

Former Trump national security adviser Mike Waltz accidentally added a journalist to a Signal chat group discussing military strategy. Secretary of Defense Pete Hegseth used a personal computer connected to an unsecured network so he could message officials on Signal — a messaging app not cleared for classified information.

And in a particularly troubling case, someone impersonating Susie Wiles — Trump’s 2024 campaign chief — sent messages to governors and business leaders, apparently using contacts pulled from her compromised personal phone.

“It doesn’t matter how secure your device is,” said Michael Williams, a national security expert at Syracuse University. “If you’re not following basic precautions, you’re inviting trouble.”

The Bigger Picture: A Global Tech Arms Race

As smartphones become integral to modern life, they also become attractive targets in the geopolitical cyber arms race. Mobile networks have been a top concern for U.S. and allied governments, with many banning or phasing out Chinese telecom firms from their infrastructure.

A new U.S. initiative — a “cyber trust mark” for smart devices — aims to reassure consumers. But experts say that label alone isn’t enough.

“Our adversaries are innovating faster than we’re securing,” said Cole. “We’ve got to start treating mobile devices as frontline battlegrounds, not just gadgets.”

Source: AP News – Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis’

The Daily Desk

The Daily Desk

J News is a freelance editor and contributor at The Daily Desk, focusing on politics, media, and the shifting dynamics of public discourse. With a decade of experience in digital journalism, Jordan brings clarity and precision to every story.

Related Posts

New Survey Shows Most Americans Use AI—But Not How Tech Giants Hoped - AP Photo/Charlie Neibergall
Artificial Intelligence (AI)

How Americans Are Using AI in Everyday Life, According to New Survey

July 29, 2025
FBI Issues Alert on Scam Texts Targeting iPhone and Android Users’ 2FA Codes - AFP via Getty Images
Cybersecurity & Digital Safety

FBI warns smartphone users to stop sharing 2FA codes in scam texts

July 29, 2025
Fake Voices, Real Consequences: Deepfakes Used to Impersonate Leaders and Scam Companies - AP Photo/Elise Amendola, File
Artificial Intelligence (AI)

How AI Deepfakes Threaten Global Security and Business Integrity

July 28, 2025
Intel Challenges AMD X3D with Huge 144MB BLLC Cache in Nova Lake Chips - Intel
PC Components

Intel Nova Lake CPU Leak Reveals Massive Cache to Challenge AMD X3D

July 28, 2025
Allianz Life Confirms Cyberattack Impacting Majority of U.S. Customers - image: Allianz Life Insurance Company via AP
Cybersecurity & Digital Safety

Allianz Life data breach exposes personal details of U.S. customers

July 27, 2025
Thousands of Selfies Leaked in Tea Dating App Cyberattack - AP Photo, File
Cybersecurity & Digital Safety

Tea dating app data breach exposes thousands of private images

July 27, 2025
AI in Fashion: Vogue’s Guess Ad Stirs Debate Over Body Image and Diversity - Seraphinne Vallora/BBC
AI Ethics & Accountability

Vogue sparks debate with AI model ad in Guess campaign

July 27, 2025
AI Fraud Alert: Sam Altman Says Voiceprint Security Has Been Defeated - AP Photo/Mark Schiefelbein
Artificial Intelligence (AI)

Sam Altman Warns AI Voice Cloning Could Trigger Major Bank Fraud Crisis

July 23, 2025
New Study Links Early Smartphone Use to Emotional Struggles in Children, Especially Girls - Elva Etienne/Moment RF/Getty Images
Health

Why Experts Say Kids Under 13 Shouldn’t Use Smartphones: New Global Study Warns of Mental Health Risks

July 22, 2025
Load More
Next Post
Protesters Burn American Flags in L.A.; Trump Orders National Guard - Oliya Scootercaster/FreedomNewsTV

Flag Burning, Clashes, and Troop Deployment: L.A. Erupts Over ICE Raids

Meet iOS 26: Apple’s Biggest Update Yet Is All About You - Apple

Apple’s iOS 26 Redefines the iPhone Experience with AI and Style

No Porn, No Bets, More Babies: What the Southern Baptists Want Now - AP Photo/Jae C. Hong, File

Inside the Southern Baptist Agenda: Morality Laws, Family Values, and Political Power

CDC’s Vaccine Panel Dismissed by RFK Jr.: Trust in Science at Risk? - AP Photo/Jose Luis Magana, File

Vaccine Advisory Board Wiped Clean by RFK Jr.: What It Means for Public Health

Unrest in LA: Marines Deployed, Leaders Clash Over Immigration Crackdown - AP Photo/Jae C. Hong

Marines Deployed to LA as Immigration Protests Escalate

Popular News

  • Cincinnati assault update: Three now charged in viral downtown street beating - Cincinnati Police Department

    Third suspect arrested in viral Cincinnati street assault incident

    0 shares
    Share 0 Tweet 0
  • Secret FBI room held documents on Trump–Russia probe, now under Senate review

    0 shares
    Share 0 Tweet 0
  • Inside Lithuania’s Secret Cold War Missile Base, Now a Public Museum

    0 shares
    Share 0 Tweet 0
  • Léon Marchand breaks 200m medley world record at World Aquatics Championships

    0 shares
    Share 0 Tweet 0
  • The rise and fall of the Comet: How the world’s first passenger jet shaped modern aviation

    0 shares
    Share 0 Tweet 0

Recommended

How the U.S. Chooses Its President: A Guide to the 2024 Election

How the U.S. Chooses Its President: A Guide to the 2024 Election

9 months ago
Hezbollah, Iraqi Militias Lie Low Despite U.S. Strikes on Iran - AP Photo/Hadi Mizban

Why Hezbollah and Iran’s Allies Are Staying Quiet in Israel-Iran War

1 month ago

Connect with us

  • About Us
  • Contact Us
  • Cookie Settings
  • Privacy Policy
  • Terms and Conditions
  • Support Press Freedom
  • Accessibility Statement
  • Advertising
  • Online Shopping
Breaking News That Keeps You Ahead.

Copyright © 2024 JournosNews.com All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • World News
  • Business
  • Politics
  • Sports
  • Entertainment
  • Technology
  • Lifestyle
  • Science
  • Health

Copyright © 2024 JournosNews.com All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.