Open Access iconOpen Access

REVIEW

crossmark

Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity

Md Shohel Rana1,2,3,4,*, Tonmoy Ghosh3, Mohammad Nur Nobi5, Anichur Rahman1,6,*, Andrew H. Sung4

1 School of Computing, Georgia Southern University, Statesboro, GA 30460, USA
2 Department of Computer and Information Science, University of Massachusetts Dartmouth, Dartmouth, MA 02747, USA
3 Department of Software Engineering, Daffodil International University, Dhaka, 1207, Bangladesh
4 School of Computing Sciences and Computer Engineering, University of Southern Mississippi, Hattiesburg, MS 39406, USA
5 Department of Computer Science, University of Texas at San Antonio, San Antonio, TX 78249, USA
6 Department of Computer Science and Engineering, National Institute of Textile Engineering and Research, Dhaka, 1350, Bangladesh

* Corresponding Authors: Md Shohel Rana. Email: email; Anichur Rahman. Email: email

Computers, Materials & Continua 2026, 86(1), 1-38. https://doi.org/10.32604/cmc.2025.069212

Abstract

Zero-click attacks represent an advanced cybersecurity threat, capable of compromising devices without user interaction. High-profile examples such as Pegasus, Simjacker, Bluebugging, and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access, exfiltrate data, and enable long-term surveillance. Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging. This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework, a widely adopted standard for modeling adversarial behavior. Through this mapping, we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain. To support threat detection efforts, we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework. This approach reduces the effort of manually annotating data while improving the quality of the labeled data, which is essential to train robust cybersecurity models. In addition, our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies. The findings emphasize the importance of forward-looking strategies such as continuous surveillance, dynamic threat profiling, and security education. By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation, this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.

Keywords

Bluebugging; bluesnarfing; cybersecurity; MITRE ATT&CK; pegasus; simjacker; zero-click attacks

Cite This Article

APA Style
Rana, M.S., Ghosh, T., Nobi, M.N., Rahman, A., Sung, A.H. (2026). Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity. Computers, Materials & Continua, 86(1), 1–38. https://doi.org/10.32604/cmc.2025.069212
Vancouver Style
Rana MS, Ghosh T, Nobi MN, Rahman A, Sung AH. Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity. Comput Mater Contin. 2026;86(1):1–38. https://doi.org/10.32604/cmc.2025.069212
IEEE Style
M. S. Rana, T. Ghosh, M. N. Nobi, A. Rahman, and A. H. Sung, “Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity,” Comput. Mater. Contin., vol. 86, no. 1, pp. 1–38, 2026. https://doi.org/10.32604/cmc.2025.069212



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1219

    View

  • 513

    Download

  • 0

    Like

Share Link