According to cyber security expert Ngo Minh Hieu (National Cyber Security Monitoring Center), a new scam called "Zero Click" has recently appeared. Accordingly, even if the user does not access the link containing the virus, the malware can still be taken over. phone control
"This is a type of cyber attack that does not require the victim to interact, such as clicking on a link or opening an attachment. Hackers can infiltrate the device through a security vulnerability in the device's software or operating system," said Mr. Ngo Minh Hieu.
Specifically, hackers will find security holes in applications such as messaging, email, social networking applications... Or hackers send a message or email containing malicious code (payload) to the victim's device.
When the device receives a text message or email, the vulnerability is exploited without the user having to open or click anything. From there, the malware is installed and the hacker can take control of the victim's device, from spying on information, stealing data, to taking full control of the device.
Experts say this new tactic is causing concern for users of phones and internet-connected devices in Vietnam amid a series of cases of people having their accounts hijacked and large sums of money stolen from their bank accounts when they click on strange links sent by scammers.
When performing this method, hackers often target targets with high information value or financial gain, rather than ordinary users. The reason individual users are less targeted is because "Zero Click" attacks often require high technical knowledge and resources, so they are often used in high-value attacks.
Experts also emphasized that although the risk of being attacked by "Zero Click" for ordinary users is not high, it is still very important to understand and implement basic security measures to protect personal information and devices.
Therefore, security expert Ngo Minh Hieu warns that users need to always update their operating systems and applications to the latest versions to patch security holes.
Additionally, users can use security solutions such as anti-virus software, firewalls, and intrusion detection systems. In addition, it is necessary to be cautious with messages or emails from unknown or unusual sources...
Source: https://daidoanket.vn/chuyen-gia-bao-mat-canh-bao-chieu-thuc-tan-cong-mang-moi-zero-click-10284191.html
Comment (0)