‘China Is Everywhere’—Your iPhone, Android Phone Now At Risk

Forbes - Apr 17th, 2025
Open on Forbes

A new report from mobile endpoint security firm iVerify has revealed that China can spy on iPhones and Android devices worldwide by exploiting vulnerabilities in global mobile networks. The report follows an FBI warning about Chinese hackers breaching U.S. telco networks to steal user metadata and unencrypted content. iVerify warns that China's control over major telco networks, such as China Mobile International and China Telecom Global, exposes global users to surveillance and state-sponsored cyber espionage. This control allows China access to critical mobile network functions, leaving user data vulnerable to interception and exploitation.

The implications of iVerify’s findings are significant, highlighting the outdated and insecure nature of telecom signaling protocols. These vulnerabilities enable malicious actors to intercept or manipulate data, posing a threat to all mobile users, especially those traveling internationally. The interconnectedness of global networks means even when outside China, users are still at risk. While tech giants like Google and Apple are working to enhance encryption and network defenses, a more robust approach is needed. Using encrypted messaging and VPNs is advised for better privacy, as the risk of exposure to mobile surveillance tactics remains high.

Story submitted by Fairstory

RATING

5.8
Moderately Fair
Read with skepticism

The article effectively highlights significant concerns regarding mobile network security and the potential for surveillance by foreign entities, particularly China. Its strengths lie in addressing timely and relevant issues that are of considerable public interest. However, the article could benefit from more balanced reporting, with a broader range of perspectives and more detailed evidence to support its claims. While it is generally clear and accessible, providing additional context and transparency regarding sources and methodologies would enhance its credibility and impact. Overall, the story raises important issues but requires more depth and balance to fully inform and engage its audience.

RATING DETAILS

7
Accuracy

The article makes several claims about China's potential to exploit mobile network vulnerabilities for surveillance purposes. The story accurately reflects concerns about the lack of encryption in SMS messages and the risks associated with international mobile communications. However, some claims, such as the direct control China has over global networks, require further verification. The reference to the Salt Typhoon hackers and their breach of U.S. telco networks aligns with known cybersecurity threats, but the details about the scale and impact of such breaches need more evidence. The story's mention of outdated telecom protocols and their security risks is consistent with industry concerns, yet it could benefit from more specific data or examples.

6
Balance

The article predominantly focuses on the risks associated with China's influence over global mobile networks, potentially lacking a balanced view by not equally considering other countries' roles or efforts in cybersecurity. It presents a one-sided narrative that emphasizes the threat from China without exploring countermeasures or perspectives from Chinese authorities. This could lead to a perception of bias, as it doesn't fully explore alternative viewpoints or the broader context of global network security challenges.

7
Clarity

The article is generally clear in its language and structure, effectively communicating the potential risks associated with mobile network vulnerabilities. It uses straightforward language to explain complex cybersecurity issues, making it accessible to a general audience. However, the article could improve its logical flow by providing more context or background information at the beginning, which would help readers unfamiliar with the topic better understand the significance of the claims.

5
Source quality

The article cites the FBI and cybersecurity firm iVerify, both of which are credible sources in the context of cybersecurity threats. However, the lack of direct quotes or detailed attributions from these entities weakens the source quality. The story would benefit from a broader range of sources, including independent cybersecurity experts or official statements from mobile operators, to enhance its reliability and provide a more comprehensive view.

4
Transparency

The article lacks transparency in terms of methodology and the basis for its claims. While it references a report from iVerify, it does not provide direct access to this report or detail the methodology used by iVerify to arrive at its conclusions. Additionally, there is no disclosure of potential conflicts of interest or biases that may influence the article's perspective, which could affect the reader's ability to fully trust the presented information.

Sources

  1. https://www.ibm.com/think/news/fbi-cisa-issue-warning-for-cross-apple-android-texting
  2. https://www.instagram.com/abcnews/reel/DDSF7_pvHVY/
  3. https://www.govtech.com/security/amid-hack-fbi-issues-warning-about-iphone-android-texts
  4. https://www.youtube.com/watch?v=H6f517QcpO8
  5. https://www.nbcchicago.com/consumer/explaining-the-fbis-warning-about-text-messages-and-what-you-should-do/3646044/