Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 5
100 résultats taggé Spyware  ✕
Predator Spyware Resurgence: Insikt Group Exposes New Global Infrastructure https://www.recordedfuture.com/research/predator-still-active-new-links-identified
13/06/2025 15:20:14
QRCode
archive.org
thumbnail

Following major public exposures by Insikt Group and others throughout the last two years, alongside US government sanctions targeting the Intellexa Consortium — the organizational structure behind the Predator mobile spyware — Insikt Group observed a significant decline in Predator-related activity. This apparent decline raised questions about whether the combination of US sanctions, public exposure, and broader international efforts to curb spyware proliferation, such as the UK and France-led Pall Mall process, had dealt a lasting blow to Intellexa’s operations. Yet, Predator activity has not stopped, and in recent months, Insikt Group has observed a resurgence of activity, reflecting the operators’ continued persistence. While much of the identified infrastructure is tied to known Predator operators in countries previously identified by Insikt Group, a new customer has also been identified in Mozambique — a country not previously publicly linked to the spyware. This aligns with the broader observation that Predator is highly active in Africa, with over half of its identified customers located on the continent. Additionally, Insikt Group has found a connection between high-tier Predator infrastructure and a Czech entity previously associated with the Intellexa Consortium.

  • Insikt Group has identified new infrastructure associated with Predator, indicating continued operations despite public exposure, international sanctions, and policy interventions.
  • The newly identified infrastructure includes both victim-facing Tier 1 servers as well as high-tier components that likely link back to Predator operators in various countries.
  • Although much of Predator’s infrastructure remains consistent with previous reporting, its operators have introduced changes designed to further evade detection — a pattern Insikt Group noted in earlier reporting.
  • Insikt Group has detected Predator-related activity in several countries throughout the last twelve months and is the first to report a suspected Predator operator presence in Mozambique.
  • Insikt Group also connected components of Predator’s infrastructure to a Czech entity previously linked with the Intellexa Consortium by a Czech investigative outlet.
recordedfuture EN 2025 Predator Spyware Resurgence Infrastructure report
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/
12/06/2025 20:43:28
QRCode
archive.org
thumbnail

On April 29, 2025, a select group of iOS users were notified by Apple that they were targeted with advanced spyware. Among the group were two journalists who consented to the technical analysis of their cases. In this report, we discuss key findings from our forensic analyses of their devices.

  • Our analysis finds forensic evidence confirming with high confidence that both a prominent European journalist (who requests anonymity), and Italian journalist Ciro Pellegrino, were targeted with Paragon’s Graphite mercenary spyware.
  • We identify an indicator linking both cases to the same Paragon operator.
  • Apple confirms to us that the zero-click attack deployed in these cases was mitigated as of iOS 18.3.1 and has assigned the vulnerability CVE-2025-43200.
citizenlab EN 2025 Graphite Paragon iOS Mercenary Spyware research
Apple fixes new iPhone zero-day bug used in Paragon spyware hacks https://techcrunch.com/2025/06/12/apple-fixes-new-iphone-zero-day-bug-used-in-paragon-spyware-hacks/
12/06/2025 19:51:27
QRCode
archive.org
thumbnail

Researchers revealed on Thursday that two European journalists had their iPhones hacked with spyware made by Paragon. Apple says it has fixed the bug that was used to hack their phones.

The Citizen Lab wrote in its report, shared with TechCrunch ahead of its publication, that Apple had told its researchers that the flaw exploited in the attacks had been “mitigated in iOS 18.3.1,” a software update for iPhones released on February 10.

Until this week, the advisory of that security update mentioned only one unrelated flaw, which allowed attackers to disable an iPhone security mechanism that makes it harder to unlock phones.

On Thursday, however, Apple updated its February 10 advisory to include details about a new flaw, which was also fixed at the time but not publicized.

“A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals,” reads the now-updated advisory.

In the final version of its report published Thursday, The Citizen Lab confirmed this is the flaw used against Italian journalist Ciro Pellegrino and an unnamed “prominent” European journalist

It’s unclear why Apple did not disclose the existence of this patched flaw until four months after the release of the iOS update, and an Apple spokesperson did not respond to a request for comment seeking clarity.

The Paragon spyware scandal began in January, when WhatsApp notified around 90 of its users, including journalists and human rights activists, that they had been targeted with spyware made by Paragon, dubbed Graphite.

Then, at the end of April, several iPhone users received a notification from Apple alerting them that they had been the targets of mercenary spyware. The alert did not mention the spyware company behind the hacking campaign.

On Thursday, The Citizen Lab published its findings confirming that two journalists who had received that Apple notification were hacked with Paragon’s spyware.

It’s unclear if all the Apple users who received the notification were also targeted with Graphite. The Apple alert said that “today’s notification is being sent to affected users in 100 countries.”

techcrunch EN 2025 Apple iPhone zero-day bug Paragon spyware
iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S. https://iverify.io/blog/iverify-uncovers-evidence-of-zero-click-mobile-exploitation-in-the-us
09/06/2025 23:18:49
QRCode
archive.org
thumbnail

Throughout late 2024 and early 2025, iVerify detected anomalous activity on iPhones belonging to individuals affiliated with political campaigns, media organizations, A.I. companies and governments operating in the United States and European Union.

Specifically, we detected exceedingly rare crashes typically associated with sophisticated zero-click attacks via iMessage – an exploitation technique previously unobserved in any systematic way in the United States. Subsequent forensic examination of several of these devices ultimately revealed a previously unknown vulnerability in the “imagent” process which, owing to its relative position in the operating system and functionality, would provide attackers a primitive for further exploitation. This vulnerability was patched by Apple in iOS 18.3. We’ve dubbed this vulnerability NICKNAME.

In the course of our investigation, we discovered evidence suggesting – but not definitively proving – this vulnerability was exploited in targeted attacks as recently as March of this year. Specifically, we learned that Apple sent Threat Notifications to at least one device belonging to a senior government official in the EU on which we saw the highly anomalous crashes. Likewise, one device demonstrated behavior frequently associated with successful exploitation, specifically the creation and deletion of iMessage attachments in bulk within a matter of seconds on several occasions after an anomalous crash. We only observed these crashes on devices belonging to extremely high value targets. And these crashes constituted only .0001% of the crash log telemetry taken from a sample of 50,000 iPhones.

iverify EN 2025 iPhones spyware iOS zero-click iMessage vulnerability
NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign | TechCrunch https://techcrunch.com/2025/05/06/nso-group-must-pay-more-than-167-million-in-damages-to-whatsapp-for-spyware-campaign/
08/05/2025 08:42:26
QRCode
archive.org
thumbnail

Spyware maker NSO Group will have to pay more than $167 million in damages to WhatsApp for a 2019 hacking campaign against more than 1,400 users.

On Tuesday, after a five-year legal battle, a jury ruled that NSO Group must pay $167,254,000 in punitive damages and around $444,719 in compensatory damages.

This is a huge legal win for WhatsApp, which had asked for more than $400,000 in compensatory damages, based on the time its employees had to dedicate to remediate the attacks, investigate them, and push fixes to patch the vulnerability abused by NSO Group, as well as unspecified punitive damages.

WhatsApp’s spokesperson Zade Alsawah said in a statement that “our court case has made history as the first victory against illegal spyware that threatens the safety and privacy of everyone.”

Alsawah said the ruling “is an important step forward for privacy and security as the first victory against the development and use of illegal spyware that threatens the safety and privacy of everyone. Today, the jury’s decision to force NSO, a notorious foreign spyware merchant, to pay damages is a critical deterrent to this malicious industry against their illegal acts aimed at American companies and the privacy and security of the people we serve.”

NSO Group’s spokesperson Gil Lainer left the door open for an appeal.

“We will carefully examine the verdict’s details and pursue appropriate legal remedies, including further proceedings and an appeal,” Lainer said in a statement.

techcrunch EN 2025 NSO Group WhatsApp damages punitive spyware legal
PasivRobber: Chinese Spyware or Security Tool? https://www.kandji.io/blog/pasivrobber
17/04/2025 08:54:09
QRCode
archive.org
thumbnail

In March 2025, our team found a suspicious mach-O file named wsus. Read the full analysis on its likely origins, target users, and observed functionality.

kandji EN 2025 macos PasivRobber Spyware wsus analysis apple
NCSC issues warning over Chinese Moonshine and BadBazaar spyware https://www.computerweekly.com/news/366622023/NCSC-issues-warning-over-Chinese-Moonshine-and-BadBazaar-spyware?ref=metacurity.com
09/04/2025 20:17:27
QRCode
archive.org
thumbnail

Two spyware variants – Moonshine and BadBazaar – are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities.

computerweekly EN UK 2025 NCSC spyware warning Moonshine BadBazaar Skype WhatsApp
Virtue or Vice? A First Look at Proliferating Spyware Operations https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/
20/03/2025 06:49:33
QRCode
archive.org
thumbnail

In our first investigation into Israel-based spyware company, Paragon Solutions, we begin to untangle multiple threads connected to the proliferation of Paragon's mercenary spyware operations across the globe. This report includes an infrastructure analysis of Paragon’s spyware product, called Graphite; a forensic analysis of infected devices belonging to members of civil society; and a closer look at the use of Paragon spyware in both Canada and Italy.

citizenlab EN 2025 investigation Paragon spyware Canada Italy Graphite mercenary
North Korean government hackers snuck spyware on Android app store | TechCrunch https://techcrunch.com/2025/03/12/north-korean-government-hackers-snuck-spyware-on-android-app-store/
12/03/2025 13:16:58
QRCode
archive.org
thumbnail

Cybersecurity firm Lookout found several samples of a North Korean spyware it calls KoSpy.

techcrunch EN 2025 Lookout North-Korea KoSpy spyware Android
Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel https://www.lookout.com/threat-intelligence/article/lookout-discovers-new-spyware-by-north-korean-apt37
12/03/2025 13:15:58
QRCode
archive.org
thumbnail

Lookout researchers have discovered a novel Android surveillance tool dubber KoSpy. It is attributed to APT 37 aka ScarCruft

lookout EN 2025 APT37 Mobile Spyware Android KoSpy ScarCruft
Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/
02/03/2025 10:07:54
QRCode
archive.org
thumbnail

Amnesty International’s Security Lab uncovers sophisticated Cellebrite zero-day exploit, impacting billions of Android devices.

securitylab.amnesty.org Amnesty EN 2025 Cellebrite Serbia spyware Android
Researchers uncover unknown Android flaws used to hack into a student's phone https://techcrunch.com/2025/02/28/researchers-uncover-unknown-android-flaws-used-to-hack-into-a-students-phone/
01/03/2025 08:18:44
QRCode
archive.org
thumbnail

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On

techcrunch EN 2025 Android forensic spyware Amnesty unknown Cellebrite
Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch https://techcrunch.com/2025/02/26/cellebrite-suspends-serbia-as-customer-after-claims-police-used-firms-tech-to-plant-spyware/
27/02/2025 09:01:28
QRCode
archive.org
thumbnail

Security researchers found evidence that Cellebrite was used by Serbian police to hack into the cellphones of a local journalist and an activist.

techcrunch EN 2025 Cellebrite Serbia spyware police
Spyware maker caught distributing malicious Android apps for years | TechCrunch https://techcrunch.com/2025/02/13/spyware-maker-caught-distributing-malicious-android-apps-for-years/
14/02/2025 11:49:53
QRCode
archive.org
thumbnail

Italian company SIO, which sells to government customers, is behind an Android spyware campaign called Spyrtacus that spoofed popular apps like WhatsApp, per security researchers.

techcrunch 2025 SIO spyware Spyrtacus Italy
An Italian journalist speaks about being targeted with Paragon spyware https://therecord.media/italian-journalist-speaks-about-being-targeted-spyware
14/02/2025 11:37:05
QRCode
archive.org
thumbnail

As an undercover journalist covering Italian politics, Francesco Cancellato is used to reporting on scandals. But he never thought he would be part of the story.

therecord.media EN 2025 Italy Paragon spyware
Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch https://techcrunch.com/2025/02/06/spyware-maker-paragon-terminates-contract-with-italian-government-media-reports/
06/02/2025 19:57:50
QRCode
archive.org
thumbnail

Following allegations of potential abuse, Paragon Solutions has cut off Italy from its spyware systems.

techcrunch EN 2025 Italy spyware paragon
Ces hackers israéliens qui s’installent à Barcelone https://www.courrierinternational.com/article/cybersecurite-ces-hackers-israeliens-qui-s-installent-a-barcelone_226052
31/12/2024 13:12:03
QRCode
archive.org
thumbnail

Barcelone se mue en “capitale européenne de la cyberguerre”. Depuis un an et demi, “au moins trois équipes renommées d’experts en piratage informatique”, venus d’Israël, se sont installées dans la capitale de la Catalogne, détaille El Periódico de Catalunya. Le journal espagnol s’appuie sur les informations du quotidien de Tel-Aviv Ha’Aretz, qui a publié le 26 décembre un article sur les hackers “délocalisés” d’Israël vers des pays de l’Union européenne, dont l’Espagne.

courrierinternational FR 2024 Barcelone Espagne spyware Israel cyberguerre
Apple sends spyware victims to this nonprofit security lab https://techcrunch.com/2024/12/20/why-apple-sends-spyware-victims-to-this-nonprofit-security-lab/
27/12/2024 11:50:28
QRCode
archive.org
thumbnail

Cybersecurity experts, who work with human rights defenders and journalists, agree that Apple is doing the right thing by sending notifications to victims of mercenary spyware — and at the same time refusing to forensically analyze the devices.

techcrunch EN 2024 Apple accessnow spyware victims
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users
22/12/2024 20:40:16
QRCode
archive.org
thumbnail

The precedent-setting ruling from a Northern California federal judge could lead to massive damages against NSO Group, whose notorious spyware has been reportedly used by various governments worldwide.

therecord.media EN 2024 NSO Group liable WhatsApp spyware
The Wiretap: Kamala Harris’ Campaign Staff Suspected iPhones Had Been Hacked. Apple Declined To Give Them The Help They Wanted. https://www.forbes.com/sites/thomasbrewster/2024/12/17/the-wiretap-kamala-harris-campaign-suspected-its---iphones-had-been-hacked-apple-declined-to-help/
18/12/2024 16:22:28
QRCode
archive.org
thumbnail

Apple rejects requests for a copy of a Harris campaign staffer's iPhone.

forbes EN 2024 Apple Kamala-Harris iPhone hack iVerify spyware Declined
page 1 / 5
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio