Replying to Avatar jsr

🚨NEW INVESTIGATION: We just forensically unmasked #Paragon 's Apple spyware.

Zero-click targets: Journalists. In 🇪🇺Europe.

Like 🇮🇹Italian reporter Ciro Pellegrino

Reopen's #Italy's spyware scandal.

Follows our earlier Citizenlab investigation of Paragon Android spyware.

BACKGROUND

Back in April, #Apple sent out a threat notification to a select group of users. Some got in touch with us to get analyzed.

WHAT WE FOUND

They'd been targeted with a sophisticated zero-click attack (think: no click, no attachment to open, no mistake needed...).

While my brilliant colleague Bill Marczak was working on the phone of a prominent European journalist, he made a smoking gun discovery:

Requests to server matching our P1 fingerprint for #Paragon's graphite.

Paragon's 'undetectable' Apple spyware had just been found... Just as we'd found their Android spyware some months ago.

The prominent European journalist had another spicy indicator on their iPhone logs:

An iMessage account belonging to a particular #Paragon customer...used to deploy this zero-click attack.

We call this account ATTACKER1. We'd find them again in short order...

Earlier this year we uncovered #Paragon's Android spyware after #WhatsApp notified a group of users they'd been targeted with Paragon.

One of the notification recipients? Journalist Francesco Cancellato

His outlet http://fanpage.it had done bombshell reporting that displeased the Italian government.

Then, in April, his colleague Ciro Pellegrino also gets a notification.

His is from Apple (Cannot overstate how helpful these notifications are)

We analyze Ciro's iPhone & forensically confirm he's a Paragon target.

And we find the ATTACKER1 iMessage account again!

ITALIAN DRAMA

This week #Paragon and #Italy have been locking horns over the case of Francesco Cancellato. Paragon doesn't want to be stuck w/unexplained abuses against journalists.

I think Paragon likely want to be able put to it on a customer & wash hands...

But when your customer is a government... they clap back. So Italy has been threatening to declassify things like Paragon's testimony to their intelligence oversight committee. Spicy.

BIG QUESTION

We're left with a big question: who's hacking European journalists with Paragon?

Who targeted Francesco & Ciro?

Right now they have no answers.

Bad look for Paragon. Bad look for Italy.

Curious what Paragon knows about that server...

BIG PICTURE

Paragon's marketing was the 'clean' & stealthy opposite of NSO Group.

Yet Paragon's Apple and Android tech got caught.

And they can't shake a spyware abuse scandal.

Conclusion: the problem isn't just a few bad apples, abuse is axiomatic.

And discovery is a matter of time.

APPLE USERS:

One bit of good news, Apple tells us that the zero-click attack deployed in these cases was mitigated as of iOS 18.3.1.

That's #CVE-2025-43200 for the curious.

Make sure to keep your iPhones up to date. And get in touch if you get one of these advanced threat notifications.

OUR FULL REPORT: https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/

Does or will the Citizen Lab have an official Nostr account?

Reply to this note

Please Login to reply.

Discussion

No replies yet.