home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 341 of 2,445   
   Mike Powell to All   
   Paragon spyware campaign   
   03 Feb 25 10:04:00   
   
   TZUTC: -0500   
   MSGID: 46.consprcy@1:2320/105 2c0611e1   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Paragon spyware campaign targeting journalists disrupted by WhatsApp   
      
   Date:   
   Mon, 03 Feb 2025 12:31:00 +0000   
      
   Description:   
   Paragon spyware uncovered in PDF files sent to journalists and members of   
   civil society, with WhatsApp issuing a cease-and-desist against the company.   
      
   FULL STORY   
   ======================================================================   
    - WhatsApp has accused spyware company Paragon of targeting journalists   
    - The encrypted messaging app disrupted the campaign in December 2024   
    - A cease-and-desist letter has been issued to Paragon by WhatsApp   
      
   WhatsApp has revealed it has disrupted a spyware hacking campaign targeting   
   journalists and prominent members of civil society.    
      
   The spyware in question belongs to Paragon, a commercial spyware company   
   founded by former Israeli intelligence officers, which Meta-owned WhatsApp    
   has directly implicated in the campaign.    
      
   WhatsApp says about 90 of its users were targeted with malicious PDF files,   
   with the victims being notified of the attempt, and a cease-and-desist letter   
   being issued to Paragon. Paragon caught targeting journalists    
      
   According to WhatsApp, the campaign was discovered in December 2024, and did   
   not require the users to open the PDF attachment, acting as a zero-click   
   deployment method.    
      
   This is the latest example of why spyware companies must be held accountable   
   for their unlawful actions. WhatsApp will continue to protect peoples ability   
   to communicate privately, WhatsApp spokesperson Zade Alsawah said (via   
   TechCrunch ).    
      
   WhatsApp has not said where the victims of the campaign were based, and was   
   unable to determine when the campaign started.    
      
   In 2024, the US Immigration and Customs Enforcement (ICE) signed a $2 million   
   one year contract with Paragon that included a fully configured proprietary   
   solution including license, hardware, warranty, maintenance and training,   
   federal documents say.    
      
   While this is the first time Paragon has been implicated in a spyware   
   campaign, numerous other commercial spyware software developers have been   
   involved in illegal operations.    
      
   Israeli spyware company NSO Group is currently in the crosshairs of a Polish   
   government investigation into the deployment of the Pegasus spyware on   
   thousands of opposition government devices .    
      
   In early 2024, WhatsApp won a federal court battle to be able to view the   
   source code of NSO Groups Pegasus spyware after the company was accused of   
   deploying the spyware on 1,400 mobile devices over a two-week period in 2019.    
      
   Based on Metas notification, this spyware campaign was another precise attack   
   targeting individuals with highly valued access or contacts," noted Adam   
   Boynton, Senior Security Strategy Manager EMEIA at Jamf. "When spyware does   
   hit, it is often a sophisticated threat that uses advanced techniques to   
   maintain persistence.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/paragon-spyware-campaign-targeting-jour   
   nalists-disrupted-by-whatsapp   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca