Md Shohel Rana1,2,3,4,*, Tonmoy Ghosh3, Mohammad Nur Nobi5, Anichur Rahman1,6,*, Andrew H. Sung4
CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-38, 2026, DOI:10.32604/cmc.2025.069212
- 10 November 2025
Abstract Zero-click attacks represent an advanced cybersecurity threat, capable of compromising devices without user interaction. High-profile examples such as Pegasus, Simjacker, Bluebugging, and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access, exfiltrate data, and enable long-term surveillance. Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging. This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework, a widely adopted standard for modeling adversarial behavior. Through this mapping, we categorize real-world attack vectors and better understand how… More >