Eli5: How are Zero-click exploits even possible?

347 views

Like if nobody “asks” a piece of software to execute how does it get downloaded to my phone or PC and then execute it self ? I can understand attacks e.g where you download a jpeg and then click to open it and the jpeg had some extra malicious code in it etc, but without anybody “authorizing” anything how does the kernel allow the code to be run by the cpu etc ?

**EDIT** I am talking about forced entry zero click software like the one pegasus created for iphones

In: 190

20 Answers

Anonymous 0 Comments

Zero click attack describes attacks on services that are usually listening without the user intervening.

Your PC might be continuously checking in the background for updates, for example – if you can somehow hijack that, the user doesn’t need to act in any way, their computer is just taken over.

Your phone has a host of things running, from obvious stuff like text messages to less obvious stuff like NFC comms that can be compromised without leaving a trace (a text message that the user needed to open or click on something within wouldn’t fall in this category).

You are viewing 1 out of 20 answers, click here to view all answers.