I suppose so. The article does say "The attackers spent $1,400 on the black market for the details of 14 known, but not patched, bugs in WebKit." Yet it also explicitly mentions specific, old versions of Android which have the holes. This seems like something of a contradiction.
Maybe I'm not sure about how tech-savvy most people are, but when I get a text message from an unknown number claiming to be my provider asking me to click a web link to update my phone, I know something's up.
It doesn't have to be an unknown number. Certainly in the UK, it's pretty easy to send an SMS with any name (text or number) you want in place of the phone number. And I suspect that most people aren't that tech-smart to realise that a text claiming to be from T-Mobile isn't actually from them.
It's not that clear, but apparently this requires the pre-installation of a malicious app.
Quote:
"The CrowdStrike team reverse engineered a Remote Access Tool (RAT) called Nickispy (a RAT from China that successfully disguised itself as a Google+ app)."
It would be nice to get hold of some more of the technical details involved.