A newly documented cyber-espionage campaign has showcased how mobile devices are being turned into active weapons. Attackers hijacked cloud-based device-management tools tied to Android smartphones, using stolen credentials to remotely factory-reset devices and erase forensic evidence of compromise. The incident underscores how mobile endpoints, beyond simple access devices, are now vectors for sabotage and destruction. With mobile devices seamlessly integrated into business workflows and enterprise ecosystems, organizations must treat them as critical assets requiring the same level of threat monitoring, incident response, and governance as traditional endpoints.
Read the full disclosure here.
© 2025 Zimperium. All Rights Reserved. Privacy Settings Modern Slavery Act Statement