ARTICLE
29 March 2022

"Zero-Click" Hacks Highlight Risks Of Using Personal Devices For Business Use

A
Ally Law

Contributor

Ally Law logo
In a rapidly changing, interconnected world, our members offer stability, competitive rates, global reach and on-the-ground local knowledge. We work together to help clients grow, connect, and move beyond jurisdictions, economies, languages and industries.
A new threat known as a "zero-click" hack, which does not require a malicious link or attachment, is emerging from well-documented, state-sponsored spyware schemes.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

A new threat known as a "zero-click" hack, which does not require a malicious link or attachment, is emerging from well-documented, state-sponsored spyware schemes. While users have grown accustomed to guarding against phishing attacks, the latest zero-click compromises enable threat actors to gain unauthorized control of smartphones and computers without the user's knowledge. Instead, hackers exploit security flaws in applications and operating systems such as Apple Inc.'s iOS and Google's Android to breach a device without any action by the victim. Once in control, hackers can install spyware capable of stealing data, listening to calls, watching through cameras and tracking the user's location.

For example, a zero-click hack was used to compromise smartphones over the popular communication application WhatsApp. When video calls are normally placed through the application, the recipient's WhatsApp reads metadata in order to display certain call information to the recipient. A previously unknown flaw in the application enabled a threat actor to load malicious code into a video call's metadata such that when the recipient's WhatsApp read an incoming video call's metadata, the malicious code was launched on the recipient's phone. The malicious code could be deployed even if the recipient did not answer the call. Once loaded, the spyware operated in the background of the device, providing the threat actor access the device's information, from text messages to webpages the user opened. Moreover, this spyware was virtually undetectable to the average user. WhatsApp eventually provided a security patch to remediate this vulnerability.

The reality is that businesses are faced with increasing state-sponsored cybersecurity threats, such as zero-click hacks. Companies can take practical steps to manage these threats. For example, companies may reevaluate whether personnel should be permitted to use personal devices for work purposes whenever they have access to sensitive or regulated company data, particularly during international travel. Among other things, companies should also take steps to ensure that any device that processes sensitive or regulated data is routinely updated pursuant to a security patch management policy.

Click here to read the original alert by John L. Landolfi, Christopher L. Ingram and Jordan C. Patterson of Ally Law member firm Vorys.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

ARTICLE
29 March 2022

"Zero-Click" Hacks Highlight Risks Of Using Personal Devices For Business Use

United States Technology

Contributor

Ally Law logo
In a rapidly changing, interconnected world, our members offer stability, competitive rates, global reach and on-the-ground local knowledge. We work together to help clients grow, connect, and move beyond jurisdictions, economies, languages and industries.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More