Exploit (computer security): Difference between revisions

Content deleted Content added
GreenC bot (talk | contribs)
Line 23:
 
==== Zero-click ====
A zero-click attack is an exploit that requires no [[user interaction]] to operate – that is to say, no key-presses or mouse clicks.<ref>{{Cite magazine|title=Sneaky Zero-Click Attacks Are a Hidden Menace|language=en-US|magazine=Wired|url=https://www.wired.com/story/sneaky-zero-click-attacks-hidden-menace/|access-date=2021-09-14|issn=1059-1028}}</ref> [[FORCEDENTRY]], discovered in 2021, is an example of a zero-click attack.<ref>{{Cite magazine|title=The Stealthy iPhone Hacks That Apple Still Can't Stop|language=en-US|magazine=Wired|url=https://www.wired.com/story/apple-imessage-zero-click-hacks/|access-date=2021-09-14|issn=1059-1028}}</ref><ref>{{Cite web|title=A new NSO zero-click attack evades Apple's iPhone security protections, says Citizen Lab|url=https://social.techcrunch.com/2021/08/24/nso-pegasus-bahrain-iphone-security/|access-date=2021-09-14|website=TechCrunch|date=24 August 2021|language=en-US|archive-date=2021-08-24|archive-url=https://web.archive.org/web/20210824124718/https://social.techcrunch.com/2021/08/24/nso-pegasus-bahrain-iphone-security/|url-status=deadlive}}</ref>
 
These exploits are commonly the most sought after exploits (specifically on the underground exploit market) because the target typically has no way of knowing they have been compromised at the time of exploitation.