US intelligence agencies carry out cyberattacks targeting global mobile users: report

US intelligence agencies carry out cyberattacks targeting global mobile users: report

  • 25.03.2025 09:04
  • globaltimes.cn
  • Keywords: danger, success

A Chinese report reveals that US intelligence agencies are conducting cyberattacks targeting global mobile users for surveillance and data theft. The attacks exploit SIM card vulnerabilities, zero-click exploits, and commercial spyware to infiltrate devices and steal sensitive information.

Apple ServicesAAPLsentiment_dissatisfied

Estimated market influence

Apple

Apple

Negativesentiment_dissatisfied
Analyst rating: Buy

The report specifically exposes the dark practices of US intelligence agencies stealing data from iPhone users. Apple's iOS platform is exploited to send exploit codes through iMessage, leading to long-term data theft.

Antiy

Negativesentiment_dissatisfied
Analyst rating: N/A

According to an analysis report by cybersecurity vendor Antiy, US side exploited vulnerabilities in the Safari browser through this 'Quantum System' to deliver Trojan to specific individuals' iPhones.

Kaspersky

Negativesentiment_dissatisfied
Analyst rating: N/A

The report cites a report by cybersecurity company Kaspersky, showing that the 'zero-click' attack carried out by US intelligence agencies refers to the fact that the implantation into the targeted mobile device can be completed without any interaction from the mobile phone user during the entire attack process.

China Cybersecurity Industry Alliance (CCIA)

Positivesentiment_satisfied
Analyst rating: N/A

The China Cybersecurity Industry Alliance (CCIA) released a report on Tuesday titled 'Mobile Cyberattacks Conducted by US Intelligence Agencies.' An expert told the Global Times that the report aggregates analytical research from global security researchers, academic institutions, and international cybersecurity firms, including Chinese cybersecurity companies, on US cyberattack operations.

Israeli

Negativesentiment_dissatisfied
Analyst rating: N/A

For example, through the use of the Israeli spyware 'Pegasus,' the US has carried out wiretapping on a number of heads of state and political figures, including those of France and Pakistan.

Context

Analysis and Summary: US Intelligence Agencies' Cyberattacks on Global Mobile Users

Key Findings

  • Report Release: The China Cybersecurity Industry Alliance (CCIA) published a report titled "Mobile Cyberattacks Conducted by US Intelligence Agencies" in March 2025.
  • Scope of Attacks: US intelligence agencies target global mobile smart terminals, communication systems, and supply chains to gather data and conduct surveillance.
  • Attack Vectors:
    • Exploitation of SIM card vulnerabilities.
    • Targeting mobile operating systems (e.g., iOS) and apps (e.g., iMessage).
    • Deployment of custom Trojans and commercial spyware (e.g., Pegasus).
    • Penetration of network equipment and telecom operators.

Business Insights

  • Cybersecurity Industry Growth: The report highlights the growing demand for cybersecurity solutions, particularly in mobile ecosystems.
  • Reputation Risk: Companies like Apple face reputational damage due to exploitation of their platforms by US agencies.
  • Supply Chain Vulnerabilities: Attacks on SIM card manufacturers and telecom operators underscore the need for enhanced supply chain security.

Market Implications

  • Global Mobile Usage:
    • 78% mobile phone ownership rate among individuals aged 10+ globally (ITU, November 2023).
    • 95% global population covered by mobile broadband.
  • Attack Surfaces: Mobile devices and networks present larger attack surfaces compared to traditional PCs, making them prime targets for intelligence agencies.

Competitive Dynamics

  • US Cyber Capabilities:
    • The "Quantum System" enables Trojan injections via temporary data traffic during online activities.
    • Use of "zero-click" attacks (e.g., Kaspersky report) to implant malware without user interaction.
  • Commercial Spyware: Partnerships with companies like Israel's NSO Group (Pegasus spyware) enhance surveillance capabilities.

Long-Term Effects

  • Erosion of Trust: Global users and governments may lose trust in US technology and cybersecurity frameworks.
  • Regulatory Impact: Potential for stricter global regulations on state-sponsored cyberattacks and data exploitation.
  • Technological Shifts: Increased focus on secure mobile ecosystems, encryption, and privacy-preserving technologies.

Strategic Considerations

  • Enhanced Security Measures:
    • Protection of SIM card manufacturers and telecom networks.
    • Monitoring of mobile app stores and user data collection practices.
  • Global Collaboration: The need for international cooperation to counter state-sponsored cyberattacks.

This analysis underscores the critical importance of addressing systemic cybersecurity threats in the global mobile ecosystem, with significant implications for businesses, governments, and users worldwide.