In early February 2025, a zero-click spyware attack on WhatsApp targeted nearly 100 journalists and civil society members. The attack, which was attributed to Israeli spyware firm Paragon Solutions, exploited vulnerabilities in the messaging platform, allowing unauthorized access to user devices without any interaction from the victims.
Given that WhatsApp boasts over 2 billion users worldwide, this incident highlights the profound risks associated with zero-click exploits, especially when so many individuals rely on a limited number of digital applications. Zero-click attacks are particularly concerning because they bypass traditional security measures and exploit vulnerabilities in widely used software. Consequently, they can infiltrate devices silently, making detection extremely difficult.
In this article, we’ll explore what zero-click exploits are, how they work, and how you can protect yourself against them.
A zero-click exploit is a sophisticated cyberattack that compromises a device without requiring the user to act. Furthermore, unlike traditional phishing attacks, which depend on users clicking malicious links or downloading infected attachments, zero-click exploits leverage vulnerabilities in software or hardware to gain unauthorized access silently.
In other words, this means that a device can be compromised without the user ever realizing it, making such attacks particularly insidious.
Zero-click attacks typically have a couple of specific objectives. These often include:
With these goals, attackers intend to gather information, exert control, or cause harm without detection. But the scary part of this is that the user does not need to interact with them. So how exactly does that happen?
Zero-click attacks exploit vulnerabilities in software applications, operating systems, or hardware components. The attackers can identify flaws in the way these systems process data, allowing them to send specially crafted malicious code that the device automatically processes. As a result, this process bypasses traditional security measures and user awareness, leading to unauthorized access.
Consider a scenario involving a messaging application such as WhatsApp:
Zero-click malware can silently infiltrate a device by exploiting automatic data processing features. But that’s just one of the potential entry points, attackers can get creative and find new ways to exploit existing vulnerabilities of the application or hardware.
Zero-click exploits pose significant threats due to several factors such as:
These characteristics make zero-click exploits a preferred method for sophisticated attackers aiming for covert operations.
Zero-click attacks have been employed in various high-profile incidents:
A civil rights activist’s iPhone was compromised in 2021 by sophisticated spyware that had been sold to the country. Citizen Lab, a web security research group based at the University of Toronto, analyzed the activist’s iPhone 12 Pro and determined that it had been infected through a zero-click exploit.
The attack deployed Pegasus spyware, developed by the Israeli firm NSO Group, exploiting an undisclosed flaw in Apple’s iMessage system. Because the attack required no user interaction, the victim remained unaware that their device had been infiltrated.
This breach gained widespread attention as it successfully bypassed Apple’s BlastDoor security framework, a feature introduced to safeguard against malicious file executions within iMessage. The exploit, later dubbed FORCEDENTRY, was able to compromise two recent versions of iOS at the time, 14.4 and 14.6, both released in 2021. In response, Apple strengthened its security protocols with iOS 15, enhancing protections against such advanced cyber threats.
In early 2025, WhatsApp revealed that approximately 90 users, including journalists and civil society members, were targeted by spyware from Paragon Solutions. The attack utilized a zero-click exploit, allowing the spyware to infiltrate devices without any user interaction.
The malicious code was delivered through WhatsApp, exploiting vulnerabilities in the app’s handling of certain file types. Consequently, once installed, the spyware could access messages, calls, and other sensitive data. WhatsApp has since taken measures to notify affected users and enhance its security protocols.
Paragon, which only sells to state bodies, is known for its Graphite spyware, a powerful surveillance tool capable of full access to target devices. The company is often compared to NSO Group, the manufacturer of Pegasus spyware.
Detecting zero-click malware is challenging due to its stealthy nature. However, users can remain vigilant by:
In conclusion, regularly reviewing device behavior and settings can help you identify potential infections.
Preventative measures are crucial in defending against zero-click exploits. You can protect yourself against potential zero-click attacks by:
Taking these steps will significantly reduce the likelihood of falling victim to a zero-click attack and ensure that your personal and professional data remains secure.
Zero-click exploits represent a growing cybersecurity threat, targeting devices without user interaction and bypassing traditional security measures. The WhatsApp Paragon hack of 2025 and similar incidents highlight the dangers posed by these sophisticated attacks.
With cybercriminals and hackers continually developing new techniques, staying informed and proactive becomes essential. Finally, regular updates, strong security measures, and cautious digital behavior can help mitigate the dangers of zero-click malware.
Detecting a zero-click exploit is difficult because there are often no visible signs of compromise. However, users can monitor for unusual behavior such as battery drain, high data usage, unexpected restarts, or unauthorized account activity. Using security tools and keeping software updated can help lower risks.
To reduce the risk of zero-click attacks, regularly update your device’s software, disable automatic media downloads, use strong security software, and reboot your phone frequently. Additionally, activating two-factor authentication (2FA) and restricting app permissions can further enhance protection.