Tuesday, March 18, 2025
HomeCyber Security NewsParagon Spyware Allegedly Ends Spyware Contract with Italy

Paragon Spyware Allegedly Ends Spyware Contract with Italy

Published on

SIEM as a Service

Follow Us on Google News

Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy.

The termination comes in the wake of revelations that its military-grade hacking software, Graphite, was allegedly used to target 90 individuals, including journalists and activists, across two dozen countries. This includes three Italian figures critical of the government’s policies.

The spyware scandal erupted after WhatsApp disclosed last week that Paragon’s Graphite technology had been used to hack into mobile phones without users’ knowledge.

The victims were reportedly added to WhatsApp group chats and sent malicious PDFs, which infected their devices.

Paragon Spyware Ends Contract

WhatsApp’s investigation, supported by Citizen Lab at the University of Toronto, uncovered the breaches in December, though the duration of surveillance remains unclear, as per a report by Guardian.

Among the Italian targets was Francesco Cancellato, the editor-in-chief of investigative outlet Fanpage.

Cancellato had previously exposed young fascists within Italian Prime Minister Giorgia Meloni’s party. Two other targets, Husam El Gomati, a Libyan activist, and Luca Casarini, an NGO founder, have been outspoken opponents of Italy’s alleged complicity in human rights abuses in Libya.

Prime Minister Meloni’s office has denied any involvement by domestic intelligence services or the government in the breaches. Despite this, Meloni is expected to face scrutiny in parliament over the alleged misuse of spyware.

A source close to Paragon, speaking anonymously, revealed that the company initially suspended its Italian contract as a precautionary measure after learning of potential abuses last Friday.

On Wednesday, the company formally terminated its agreement, citing violations of its ethical framework and terms of service. Paragon has declined to comment publicly on the matter.

The targeting of individuals critical of Meloni’s right-wing administration has heightened concerns about spyware being used as a tool for political repression.

 The Italian government, informed by WhatsApp, confirmed that the number of affected Italians is believed to be seven.

The identities of other victims remain undisclosed, though they reportedly span several European countries, including Germany, Spain, and Sweden.

Paragon’s move to end its Italian contract comes amid broader scrutiny. The company, which was recently acquired by U.S.-based AE Industrial Partners, is also under investigation for a $2 million contract with the U.S. Immigration and Customs Enforcement agency.

The outcome of these inquiries, along with Italy’s role in the breaches, remains uncertain. This controversy underscores the growing global concerns over the unchecked use of spyware and its implications for privacy and democratic freedoms.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large...

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large...