A Greek financial journalist is one of several who believe they have been targeted for surveillance by the nation's government with the help of Intellexa:
In late March 2021, Thanasis Koukakis was notified by a team of digital researchers that his phone had been infected with malware. A reporter who typically covers finance, Koukakis had been in the midst of investigating corruption issues when his device was infected. Research later showed that his phone had been under surveillance for approximately two months.
It turned out that he had been targeted with "Predator," a commercial spyware capable of infiltrating mobile phones and stealing pretty much everything inside of them—videos, pictures, text messages, search history, passwords, call logs, and more. Like a lot of other commercial spyware tools, Predator is typically sold to high-paying government clients—in this case, by a company called Cytrox. A secretive surveillance firm based in North Macedonia, Cytrox is owned by an Israeli parent company called Intellexa.
[...] The Greek government has, however, admitted to spying on Koukakis. In a parliamentary committee hearing in August, the head of the Greek equivalent of the CIA confessed that his agency had surveilled the journalist. However, the government has denied that it uses Predator or maintains any association with Intellexa.
Some interesting comments on Bruce Schneier's blog. Originally spotted on The Eponymous Pickle.
Related Stories
Messaging app said it had 'high confidence' some users were targeted and 'possibly compromised' by Paragon Solutions spyware:
Nearly 100 journalists and other members of civil society using WhatsApp, the popular messaging app owned by Meta, were targeted by spyware owned by Paragon Solutions, an Israeli maker of hacking software, the company alleged on Friday.
The journalists and other civil society members were being alerted of a possible breach of their devices, with WhatsApp telling the Guardian it had "high confidence" that the 90 users in question had been targeted and "possibly compromised".
It is not clear who was behind the attack. Like other spyware makers, Paragon's hacking software is used by government clients and WhatsApp said it had not been able to identify the clients who ordered the alleged attacks.
Experts said the targeting was a "zero-click" attack, which means targets would not have had to click on any malicious links to be infected.
[...] WhatsApp said it had sent Paragon a "cease and desist" letter and that it was exploring its legal options. WhatsApp said the alleged attacks had been disrupted in December and that it was not clear how long the targets may have been under threat.
Originally spotted on Schneier on Security.
Related:
- Journalist Sues Predator Spyware Maker for Allegedly Helping Government Surveil Him
- Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses
- The Great iPwn -- Journalists Hacked with Suspected NSO Group iMessage 'Zero-Click' Exploit