Tag

Spyware

All articles tagged with #spyware

Apple says Lockdown Mode has never been hacked and shows how to turn it on
technology12 days ago

Apple says Lockdown Mode has never been hacked and shows how to turn it on

Apple maintains that Lockdown Mode, its extreme security feature for iPhone, iPad, and Mac, has not been breached by mercenary spyware, a claim echoed by security experts who say they’ve seen attacks blocked but no confirmed compromises. Lockdown Mode dramatically limits attach ments, calls from unknown numbers, wired device connections, and Safari restrictions; it’s off by default and can be enabled or disabled in Settings > Privacy & Security, with a restart and PIN required each time, though users should be prepared for trade-offs in usability.

iPhone spyware goes mainstream as criminals weaponize iOS flaws
technology21 days ago

iPhone spyware goes mainstream as criminals weaponize iOS flaws

Researchers warn iPhone spyware once used by governments is now in criminals’ hands, with two campaigns—Coruna and DarkSword—exploiting iOS vulnerabilities via watering hole attacks to exfiltrate data like messages and location; Apple has patched many flaws and issued updates, and Safari now blocks malicious domains, but users should stay updated and enable Lockdown Mode as tools become more accessible to a wider range of attackers.

DarkSword spyware hits iPhones simply by visiting compromised websites
technology23 days ago

DarkSword spyware hits iPhones simply by visiting compromised websites

Security researchers warn of DarkSword, a new spyware toolkit that doesn’t require installation: simply visiting an infected website can exfiltrate data from iPhones on iOS 18.4–18.7; it collects calls, contacts, messages, photos, location, iCloud content and wallet credentials, then deletes traces and leaves behind its code for reuse, with attacks seen in Saudi Arabia and Ukraine and up to hundreds of millions of devices at risk given about 25% of iPhones run iOS 18.

WhatsApp Debuts Extreme Privacy Lock for High-Risk Users
technology2 months ago

WhatsApp Debuts Extreme Privacy Lock for High-Risk Users

Meta is rolling out 'Strict Account Settings'—a lockdown mode for WhatsApp that adds extreme privacy controls for high-risk users (e.g., journalists), including enforced two-step verification, blocking media/attachments from unknown senders, silencing unknown calls, hiding last seen/online status, restricting profile details, and more; the feature is activated from the main device and will roll out gradually, with a backend Rust migration to boost protection against spyware.

CISA Warns of Zero-Day Samsung Flaw Used in 'Landfall' Spyware Attacks
technology5 months ago

CISA Warns of Zero-Day Samsung Flaw Used in 'Landfall' Spyware Attacks

CISA has ordered U.S. federal agencies to patch a critical Samsung vulnerability (CVE-2025-21042) exploited since July 2024 to deploy LandFall spyware via WhatsApp, which can access extensive device data. Although Samsung patched it in April, ongoing exploitation prompted urgent security measures, with federal agencies required to fix the flaw by December 1. The spyware targets flagship Samsung devices and has potential links to international espionage activities, emphasizing the importance of timely updates.

Landfall: Commercial Android Spyware Exploiting Samsung Zero-Day Flaw
technology5 months ago

Landfall: Commercial Android Spyware Exploiting Samsung Zero-Day Flaw

A new Android spyware called Landfall exploited a zero-day vulnerability in Samsung Galaxy devices for nearly a year, enabling surveillance activities like call recording and data harvesting, primarily targeting Middle Eastern users. The campaign used sophisticated, targeted attacks likely linked to a well-resourced actor, possibly connected to the UAE government, though definitive attribution remains uncertain. Samsung patched the vulnerability in April, but related exploits continued to be observed until recently.

Landfall Spyware Exploits Zero-Day to Target Samsung Devices via WhatsApp
security5 months ago

Landfall Spyware Exploits Zero-Day to Target Samsung Devices via WhatsApp

A security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver the LANDFALL spyware via WhatsApp, targeting users in the Middle East. The flaw, CVE-2025-21042, allowed remote code execution through malicious DNG images, leading to comprehensive data theft. Samsung patched the vulnerability in April 2025, but the attack highlights the ongoing threat of sophisticated exploits in the wild.

Hacking Team's Spyware Tied to Chrome Zero-Day Attacks and Emergency Updates
technology5 months ago

Hacking Team's Spyware Tied to Chrome Zero-Day Attacks and Emergency Updates

A Chrome zero-day exploited in Operation ForumTroll was linked to Italian spyware vendor Memento Labs, which developed the LeetAgent and Dante malware used in targeted attacks on Russian and Belarusian organizations. The campaign involved sophisticated phishing and browser exploits, with Memento Labs emerging as a successor to the notorious Hacking Team.

U.S. Immigration Agency Reinstates Spyware Contract Amid Privacy Concerns
privacy-and-surveillance6 months ago

U.S. Immigration Agency Reinstates Spyware Contract Amid Privacy Concerns

404 Media is suing ICE to force the agency to disclose details of a $2 million contract with spyware company Paragon, which can remotely access messaging apps on phones. The contract, reactivated after a White House freeze, raises concerns about civil rights abuses amid ICE's controversial immigration enforcement practices. Paragon's technology has been linked to government surveillance in multiple countries and has been used to target journalists and activists, prompting fears about its potential misuse in the U.S.

France Alerts to New Apple Spyware Campaign
technology7 months ago

France Alerts to New Apple Spyware Campaign

France's cybersecurity agency confirmed that Apple issued multiple security alerts in 2025 about sophisticated spyware campaigns targeting individuals, including journalists and officials, with no specific attribution provided. Users receiving these alerts are advised to contact CERT-FR and avoid device modifications to aid investigations.