Advertisement · 728 × 90

Posts by Donncha Ó Cearbhaill

Italian spyware maker SIO still developing and distributing Spyrtacus Italian spyware maker SIO still developing and distributing Spyrtacus

“We analyzed a 2025 sample of the Spyrtacus #spyware, version 8.71. …We confirm attribution to 🇮🇹SIO S.p.A. and provide a small set of IoCs to detect infections of this malware family.”

osservatorionessuno.org/blog/2026/04...

1 day ago 4 3 0 0

We publish a major @citizenlab.ca report on Webloc, an ad-based mass surveillance system that monitors the movements and personal characteristics of hundreds of millions people globally based on data obtained from mobile apps and digital advertising. Customers include ICE, El Salvador, and Hungary.

1 day ago 84 96 1 3
Preview
Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch The former boss of a U.S. hacking tools maker was jailed for selling highly sensitive software exploits to a Russian broker. This is how we first learned of his arrest, reported the story, and some of...

NEW: For months, I’ve been working on the story of Peter Williams, the former U.S. defense contractor who stole several hacking tools and then sold them to a Russian broker.

Here’s what we know about the case, what we still don’t know, and a peek behind the scenes at how I reported this story.

1 month ago 37 29 1 1
Preview
Let’s be clear: if the Palestine Action hunger strikers die, the government will bear moral responsibility | George Monbiot The three remaining hunger strikers have been convicted of nothing. Yet with astonishing cruelty, ministers refuse to listen to their reasonable demands, says Guardian columnist George Monbiot

If the Palestine Action hunger strikers die - which they could do at any moment, as they are now very close to the end - it will be the government that killed them. Today’s column explains why. Please share, and write urgently to your MP.
www.theguardian.com/commentisfre...

3 months ago 2875 1602 102 106
Preview
Meet the team that hunts government spyware For years, Access Now’s Digital Security Helpline has been aiding journalists and dissidents who have been targeted with government spyware. This is how they operate.

NEW: Meet the folks at AccessNow's Digital Security Helpline, who have been investigating government spyware for more than a decade, helping journalists and dissidents all over the world.

I spoke to Hassen Selmi, who heads the incident response team, to learn how his team fights spyware abuses.

3 months ago 120 47 1 6
Preview
Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say | TechCrunch Based on a leaked video, security researchers alleged that Intellexa staffers have remote live access to their customers' surveillance systems, allowing them to see hacking targets’ personal data.

NEW: Staffers at notorious spyware maker Intellexa had live remote access to their customers' surveillance systems.

This allowed them to see the personal data of targets hacked with Intellexa's spyware Predator, according to research based on a leaked training video.

Needless to say, this is bad.

4 months ago 30 22 1 2
Preview
Intellexa’s Global Corporate Web

1/ Today we release a new report exposing previously undisclosed entities connected to the wider #Intellexa ecosystem as well as newly identified activity clusters in Iraq and indications of activity in Pakistan: www.recordedfuture.com/research/int...

4 months ago 26 18 2 4
Preview
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab Drawing on leaked internal company documents, sales and marketing material, as well as training videos, the “Intellexa Leaks” investigation gives a never-before-seen glimpse of the internal operations...

Our full report can be found here: securitylab.amnesty.org/latest/2025/...

Haaretz - www.haaretz.com/israel-news/...

InsideStory - insidestory.gr/article/inte...

Inside-IT - www.inside-it.ch/intellexa-le...

4 months ago 8 5 1 0

bsky.app/profile/jurr...

4 months ago 1 0 0 0

Check out the create reporting today from our wonderful colleagues and partners!

bsky.app/profile/etri...

4 months ago 2 1 1 0
Advertisement
Preview
Intellexa’s Prolific Zero-Day Exploits Continue | Google Cloud Blog Commercial surveillance vendor Intellexa continues to thrive and exploit mobile zero-day vulnerabilities.

Significantly Google has also announced threat notifications today, first time ever alerts sent for Predator, to "several hundred accounts across various countries, including Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan". 🔥🔥🔥

cloud.google.com/blog/topics/...

4 months ago 2 2 1 0

Toadya our research partners at Google TAG and Recorded Future (@julianferdinand.bsky.social)
) have published their own deep investigations into Intellexa

bsky.app/profile/juli...

4 months ago 2 1 1 0

The leaked materials also forensically confirm Predator’s use in previously documented attacks in Greece and Egypt - validating years of investigations by Amnesty, Citizen Lab & others.

4 months ago 1 0 1 0
Post image

The level of remote access is more extensive and lax than previously thought. Intellexa staff simply logged in with TeamViewer (!) to a remote Predator customer system.

The video shows staff could see live targeting and infection attempts from EAGLE_2, a customer in Kazakhstan.

4 months ago 1 0 1 0
Post image

A leaked training video show a client list (by codename): Dragon, Eagle, Falcon, Flamingo, Fox & more. Our investigation confirms Eagle is Kazakhstan; Phoenix, the 2023 Predator Files investigation found, was Libya.

www.haaretz.com/israel-news/...

4 months ago 1 0 1 0
Post image

Shockingly, the leaks shows that Intellexa kept REMOTE ACCESS to Predator systems deployed on government clients’ premises — meaning the company had the potential to see data about surveillance victims in real time..

4 months ago 3 1 1 0
Preview
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab Drawing on leaked internal company documents, sales and marketing material, as well as training videos, the “Intellexa Leaks” investigation gives a never-before-seen glimpse of the internal operations...

We've found first evidence of active Predator spyware in Pakistan 🇵🇰 - where a human rights lawyer in Balochistan was targeted amid intensified repression against civil society in the country.

securitylab.amnesty.org/latest/2025/...

4 months ago 2 0 1 0
Post image

🚨 A huge leak exposes the new targets and internal operations of Intellexa, the secretive and murky company behind the notorious Predator spyware.

Introducing #IntellexaLeaks, a joint investigation with partners @insidestory.gr, @haaretzcom.bsky.social & WAV Research Collective 🧵👇

4 months ago 8 8 1 0
Advertisement
🛰️ SATCOM Security Research project homepage for SATCOM Security: papers, source code, and recent satellite communications vulnerabilities.

This is amazing research by Nadia Heninger and her co-authors Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin and Aaron Schulman. TL;DR a huge number of satellite links over our heads are totally unencrypted. satcom.sysnet.ucsd.edu

5 months ago 146 69 5 8
Preview
Spyware maker NSO Group confirms acquisition by US investors | TechCrunch NSO Group confirmed to TechCrunch that an unnamed group of American investors has taken “controlling ownership” of the surveillance tech maker.

SCOOP: Spyware maker NSO Group confirmed to us that the company has been acquired by a U.S. investment group.

NSO's spokesperson said the group "has invested tens of millions of dollars in the company and has acquired controlling ownership," but declined to say who is behind the investment.

6 months ago 173 136 4 30
Preview
Amnesty International Digital Surveillance: How States Are Spying on the Resistance

If you're based in Berlin, there's an event this Tuesday on spyware, hosted by @amnestyuk.bsky.social and @papertrailmedia.de. It includes workshops by @donncha.is, @jurrevanbergen.nl, and others, drop-in sessions, and a panel. Tickets are still available: www.hebbel-am-ufer.de/programm/pde...

6 months ago 5 5 0 0
Post image

Danke Berlin!
#AllEyesOnGaza

6 months ago 759 205 23 20
Weißer Text auf schwarzem Grund: Digital Surveillance: How States are Spying on the Resistance, mit Logos von HAU und Amnesty International

Weißer Text auf schwarzem Grund: Digital Surveillance: How States are Spying on the Resistance, mit Logos von HAU und Amnesty International

Join us?

💥Workshops w/ @papertrailmedia.de @amnesty.de @interseclab.bsky.social

💥Dig. Security Clinic w/ @accessnow.org, @pressefreiheit.bsky.social&Tact. Tech

💥Panel w/ @donncha.is @sophieintveld.bsky.social @davidyambio.bsky.social @anjaosterhaus.bsky.social

&Art by @forensicarchi.bsky.social

6 months ago 32 21 1 1
Preview
‘I Was a Weird Kid’: Jailhouse Confessions of a Teen Hacker Noah Urban’s role in the notorious Scattered Spider gang was talking people into unwittingly giving criminals access to sensitive computer systems.

For more than a year I’ve spoken with Scattered Spider “caller” Noah Urban from a Florida jail. I wanted to know how they chose victims, their methods and how Noah became entangled in a virtually and physically violent world.

We’re publishing his story today: www.bloomberg.com/news/feature...

6 months ago 36 17 3 3
Preview
Amnesty International Digital Surveillance: How States Are Spying on the Resistance

Staatliche digitale Überwachung der Zivilgesellschaft: Am 30.9. bringen Amnesty und das HAU in Berlin Journalist*innen, Aktivist*innen, Technolog*innen, politische Entscheidungsträger*innen und die von Spionageprogrammen Betroffenen zusammen. Infos & Anmeldung 👇
www.hebbel-am-ufer.de/programm/pde...

6 months ago 24 11 1 1
Advertisement
It's genocide.

It's genocide.

There is no more time for excuses: as the evidence of Israel’s genocide continues to mount the international community cannot claim they didn’t know.

6 months ago 301 167 15 14
Preview
Bugbane: Simplifying consensual Android forensics Bugbane: Simplifying consensual Android forensics

We are announcing Bugbane, an open-source Android app that makes consensual mobile forensics more accessible. It's compatible with MVT and AndroidQF.

Now in an open-beta, we are calling for community feedbacks before a general public release by EOY!

osservatorionessuno.org/blog/2025/09...

7 months ago 4 4 0 0

🚨Out today: In Pakistan können jederzeit über 4 Mill. Menschen gleichzeitig willkürlich überwacht werden.
Die Technik („LIMS“) stammt vom deutschen Unternehmen Utimaco und ist eigentlich im Export kontrolliert. Unsere neue, einjährige Recherche von @amnesty.de @amnesty.org & Partner*innen zeigt:

7 months ago 44 22 2 0

Highly recommend reading the excellent technical analysis from @interseclab.bsky.social. They mined the huge Geedge Networks leak to understand how techniques powering their surveillance and censorship products.

bsky.app/profile/inte...

interseclab.org/research/the...

7 months ago 3 3 0 0

bsky.app/profile/just...

7 months ago 1 1 1 0