“We analyzed a 2025 sample of the Spyrtacus #spyware, version 8.71. …We confirm attribution to 🇮🇹SIO S.p.A. and provide a small set of IoCs to detect infections of this malware family.”
osservatorionessuno.org/blog/2026/04...
Posts by Donncha Ó Cearbhaill
We publish a major @citizenlab.ca report on Webloc, an ad-based mass surveillance system that monitors the movements and personal characteristics of hundreds of millions people globally based on data obtained from mobile apps and digital advertising. Customers include ICE, El Salvador, and Hungary.
NEW: For months, I’ve been working on the story of Peter Williams, the former U.S. defense contractor who stole several hacking tools and then sold them to a Russian broker.
Here’s what we know about the case, what we still don’t know, and a peek behind the scenes at how I reported this story.
If the Palestine Action hunger strikers die - which they could do at any moment, as they are now very close to the end - it will be the government that killed them. Today’s column explains why. Please share, and write urgently to your MP.
www.theguardian.com/commentisfre...
NEW: Meet the folks at AccessNow's Digital Security Helpline, who have been investigating government spyware for more than a decade, helping journalists and dissidents all over the world.
I spoke to Hassen Selmi, who heads the incident response team, to learn how his team fights spyware abuses.
NEW: Staffers at notorious spyware maker Intellexa had live remote access to their customers' surveillance systems.
This allowed them to see the personal data of targets hacked with Intellexa's spyware Predator, according to research based on a leaked training video.
Needless to say, this is bad.
1/ Today we release a new report exposing previously undisclosed entities connected to the wider #Intellexa ecosystem as well as newly identified activity clusters in Iraq and indications of activity in Pakistan: www.recordedfuture.com/research/int...
Our full report can be found here: securitylab.amnesty.org/latest/2025/...
Haaretz - www.haaretz.com/israel-news/...
InsideStory - insidestory.gr/article/inte...
Inside-IT - www.inside-it.ch/intellexa-le...
bsky.app/profile/jurr...
Check out the create reporting today from our wonderful colleagues and partners!
bsky.app/profile/etri...
Significantly Google has also announced threat notifications today, first time ever alerts sent for Predator, to "several hundred accounts across various countries, including Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan". 🔥🔥🔥
cloud.google.com/blog/topics/...
Toadya our research partners at Google TAG and Recorded Future (@julianferdinand.bsky.social)
) have published their own deep investigations into Intellexa
bsky.app/profile/juli...
The leaked materials also forensically confirm Predator’s use in previously documented attacks in Greece and Egypt - validating years of investigations by Amnesty, Citizen Lab & others.
The level of remote access is more extensive and lax than previously thought. Intellexa staff simply logged in with TeamViewer (!) to a remote Predator customer system.
The video shows staff could see live targeting and infection attempts from EAGLE_2, a customer in Kazakhstan.
A leaked training video show a client list (by codename): Dragon, Eagle, Falcon, Flamingo, Fox & more. Our investigation confirms Eagle is Kazakhstan; Phoenix, the 2023 Predator Files investigation found, was Libya.
www.haaretz.com/israel-news/...
Shockingly, the leaks shows that Intellexa kept REMOTE ACCESS to Predator systems deployed on government clients’ premises — meaning the company had the potential to see data about surveillance victims in real time..
We've found first evidence of active Predator spyware in Pakistan 🇵🇰 - where a human rights lawyer in Balochistan was targeted amid intensified repression against civil society in the country.
securitylab.amnesty.org/latest/2025/...
🚨 A huge leak exposes the new targets and internal operations of Intellexa, the secretive and murky company behind the notorious Predator spyware.
Introducing #IntellexaLeaks, a joint investigation with partners @insidestory.gr, @haaretzcom.bsky.social & WAV Research Collective 🧵👇
This is amazing research by Nadia Heninger and her co-authors Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin and Aaron Schulman. TL;DR a huge number of satellite links over our heads are totally unencrypted. satcom.sysnet.ucsd.edu
SCOOP: Spyware maker NSO Group confirmed to us that the company has been acquired by a U.S. investment group.
NSO's spokesperson said the group "has invested tens of millions of dollars in the company and has acquired controlling ownership," but declined to say who is behind the investment.
If you're based in Berlin, there's an event this Tuesday on spyware, hosted by @amnestyuk.bsky.social and @papertrailmedia.de. It includes workshops by @donncha.is, @jurrevanbergen.nl, and others, drop-in sessions, and a panel. Tickets are still available: www.hebbel-am-ufer.de/programm/pde...
Danke Berlin!
#AllEyesOnGaza
Weißer Text auf schwarzem Grund: Digital Surveillance: How States are Spying on the Resistance, mit Logos von HAU und Amnesty International
Join us?
💥Workshops w/ @papertrailmedia.de @amnesty.de @interseclab.bsky.social
💥Dig. Security Clinic w/ @accessnow.org, @pressefreiheit.bsky.social&Tact. Tech
💥Panel w/ @donncha.is @sophieintveld.bsky.social @davidyambio.bsky.social @anjaosterhaus.bsky.social
&Art by @forensicarchi.bsky.social
For more than a year I’ve spoken with Scattered Spider “caller” Noah Urban from a Florida jail. I wanted to know how they chose victims, their methods and how Noah became entangled in a virtually and physically violent world.
We’re publishing his story today: www.bloomberg.com/news/feature...
Staatliche digitale Überwachung der Zivilgesellschaft: Am 30.9. bringen Amnesty und das HAU in Berlin Journalist*innen, Aktivist*innen, Technolog*innen, politische Entscheidungsträger*innen und die von Spionageprogrammen Betroffenen zusammen. Infos & Anmeldung 👇
www.hebbel-am-ufer.de/programm/pde...
It's genocide.
There is no more time for excuses: as the evidence of Israel’s genocide continues to mount the international community cannot claim they didn’t know.
We are announcing Bugbane, an open-source Android app that makes consensual mobile forensics more accessible. It's compatible with MVT and AndroidQF.
Now in an open-beta, we are calling for community feedbacks before a general public release by EOY!
osservatorionessuno.org/blog/2025/09...
🚨Out today: In Pakistan können jederzeit über 4 Mill. Menschen gleichzeitig willkürlich überwacht werden.
Die Technik („LIMS“) stammt vom deutschen Unternehmen Utimaco und ist eigentlich im Export kontrolliert. Unsere neue, einjährige Recherche von @amnesty.de @amnesty.org & Partner*innen zeigt:
Highly recommend reading the excellent technical analysis from @interseclab.bsky.social. They mined the huge Geedge Networks leak to understand how techniques powering their surveillance and censorship products.
bsky.app/profile/inte...
interseclab.org/research/the...
bsky.app/profile/just...