- Professional Risks Insurance
- Private Clients
- Farms & Estates
- Commercial Clients
- Wholesale Insurance Broking
- Claims
- About
- Contact
- Log in
27.08.25
Many types of cyber-attacks involve manipulating users into doing certain tasks – whether it’s sharing login credentials, downloading dangerous attachments or clicking on harmful links – to help hackers compromise their systems or data. However, some incidents can be launched without these exchanges. In particular, zero-click attacks entail hackers leveraging software flaws in users’ devices or applications to deploy malicious code (e.g. viruses, worms, spyware or ransomware), all without the need for any communication or activity from the users. Also known as zero-click exploits, these incidents require cyber-criminals to deviate from typical attack patterns and utilise more stealthy techniques to quietly infiltrate users’ technology.

Such characteristics also make these attacks difficult to detect, often prompting prolonged and destructive incidents that generate serious consequences for affected users. As cyber-incidents continue to become more sophisticated in nature, zero-click attacks are on the rise, ultimately representing a new frontier in security threats for organisations across industry lines. With this in mind, it’s critical for organisations to better understand these exploits and how to prevent them. This article provides more information on zero-click attacks, outlines how they can impact organisations and highlights related mitigation tips.
Unlike phishing scams and other social engineering tactics, zero-click attacks don’t rely on interactions between cyber- criminals and users to be successful. Rather, these incidents involve skilled hackers exploiting software vulnerabilities in users’ devices (e.g. tablets, smartphones, laptops and desktop computers) or applications. Such exploitation typically stems from cyber-criminals delivering specifically crafted data packets to unprotected systems and services without users’ knowledge. Common targets for zero-click exploits include poorly secured Internet of Things (IoT) devices and mobile applications, particularly those with email, instant messaging, video-conferencing and voice-calling features. These applications frequently receive and analyse files from a range of external sources, making them vulnerable due to their ability to automatically process such content in different ways (e.g. generating previews of messages or media before users open them). What’s more, these applications often have end-to-end encryption capabilities, meaning that the content of data packets sent through them remains unknown to all parties except the sender and receiver. Such capabilities can make it harder to identify attacks. Because they leave little to no trace, zero-click exploits can go uncovered for extended periods, allowing cyber-criminals to cause lasting damage to impacted users’ systems and data. Complicating matters, hackers usually implement advanced strategies to install and delete these exploits, removing any evidence that they even took place. This can significantly hinder incident investigation and remediation efforts.
Zero-click attacks can affect organisations in many ways, leading to the following ramifications:
There are various risk management measures organisations can implement to help lower the likelihood of zero-click attacks and limit associated losses if these incidents do happen. Here are some mitigation strategies to consider:
Zero-click attacks present numerous risks for organisations of all sizes and sectors. As these attacks become increasingly prevalent, it’s vital for businesses to have proper safeguards in place. By maintaining awareness of zero-click exploits and taking sufficient steps to address them, organisations will be better equipped to navigate this evolving cyber-security landscape and, in turn, prevent major losses.
Contact us today for more information and cyber-risk-management guidance
Information provided by Zywave with a contribution from Lisa Langley, Cert CII, Team Leader Professional Risks, Cox Mahon Ltd.
Complete the details below and we will contact shortly.
This Cyber-risks & Liabilities document is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice.