- Calls for tighter smartphone security as devices become high‑value targets for cybercriminals, state‑sponsored groups, and private sector offensive actors
- Report outlines how attackers exploit vulnerabilities in cellular networks, Wi‑Fi, Bluetooth, and NFC to intercept communications, track users, and remotely deploy malware.
France’s National Cybersecurity Agency (ANSSI), in collaboration with the United Kingdom, has issued a joint warning that smartphones have become prime targets for cybercriminals, state-backed groups, and private sector offensive actors, calling for stronger protections across consumer and enterprise use.
The agencies’ report outlines how attackers exploit vulnerabilities in cellular networks, Wi‑Fi, Bluetooth, and NFC to intercept communications, track users, and remotely deploy malware. It flags a growing wave of zero‑click exploits—attacks requiring no user interaction—that often leaves little forensic evidence and complicates detection and response.
Key findings
- Network exploitation: Threat actors intercept communications, geolocate users, or inject malware via weaknesses in cellular, Wi‑Fi, Bluetooth, and NFC.
- Zero‑click rise: Exploits requiring no user interaction are increasingly used to compromise targets covertly, complicating detection and incident response.
- OS/app vectors: Vulnerabilities in operating systems and third‑party apps enable sensitive data collection, which can later fuel targeted phishing and long‑term access.
ANSSI said it has handled multiple incidents in recent years involving compromised mobile devices, citing both unsafe user behaviour and targeted spyware as causes. The report warns that operating systems and mobile apps remain common intrusion vectors for data theft that can later fuel phishing campaigns or provide persistent, covert access to organisational networks.
Recommended countermeasures include disabling wireless features (Wi‑Fi, Bluetooth, NFC) when not needed, avoiding public networks that can be spoofed or monitored, and maintaining rigorous patching of operating systems and applications. Users are advised to rely on strong, unique passwords, restrict app permissions, and favor authenticator apps over SMS for verification.
The guidance also urges hardening devices with platform-specific defenses—such as Lockdown Mode on iOS and Advanced Protection Mode on Android—to reduce the attack surface. ANSSI further recommends non‑biometric passcodes for device protection; the agency did not detail its rationale, though security practitioners often cite risks of biometric spoofing or coercion.
The France–UK advisory underscores escalating risk to both society and the corporate sector, pressing individuals and organisations to elevate mobile security baselines, tighten access controls, and improve incident readiness as smartphone‑centric threats intensify.
What’s next
- Organisations should audit mobile fleets, enforce hardening at scale, and reassess high‑risk user groups (executives, admins, field teams). Individuals should adopt least‑privilege app permissions, keep radios off by default, and move to app‑based authentication with regular OS updates.
- Policymakers may push for stronger default protections and clearer disclosure around mobile vulnerabilities, as smartphone‑centric threat activity continues to climb.
Discover more from TechChannel News
Subscribe to get the latest posts sent to your email.




