mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#Intellexa

0 Beiträge0 Beteiligte0 Beiträge heute
#cryptohagen<p>På trods af at 🇺🇸 sanktionerede <a href="https://social.data.coop/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> 2 gange sidste år, er overvågnings- og <a href="https://social.data.coop/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> -producenten fortsat med at operere og har endda oprettet ny server-infrastruktur til sine kunder - forbundet med et tjekkisk firma FoxITech.</p><p>.. rapport, offentliggjort torsdag, siger at det har identificeret ny kunde- og offer-vendt infrastruktur sammen med nye systemer til at undgå at blive opdaget</p><p>Der er også en ny aktiv <a href="https://social.data.coop/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> -gruppe i et unavngivet østeuropæisk land<br><a href="https://www.recordedfuture.com/research/predator-still-active-new-links-identified" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">recordedfuture.com/research/pr</span><span class="invisible">edator-still-active-new-links-identified</span></a></p>
Fɹancisco J Яodríguez Amorín<p>Nos escuchan<br>por <span class="h-card" translate="no"><a href="https://masto.nobigtech.es/@rodriguezamorin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rodriguezamorin</span></a></span> en <span class="h-card" translate="no"><a href="https://masto.nobigtech.es/@LQSomos" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LQSomos</span></a></span><br><a href="https://loquesomos.org/nos-escuchan-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">loquesomos.org/nos-escuchan-2/</span><span class="invisible"></span></a><br><a href="https://masto.nobigtech.es/tags/Amnist%C3%ADaInternacional" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmnistíaInternacional</span></a> <a href="https://masto.nobigtech.es/tags/Bel%C3%A9nGopegui" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BelénGopegui</span></a> <a href="https://masto.nobigtech.es/tags/Ciencia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ciencia</span></a> <a href="https://masto.nobigtech.es/tags/CitizenLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitizenLab</span></a> <a href="https://masto.nobigtech.es/tags/divulgaci%C3%B3ncient%C3%ADfica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>divulgacióncientífica</span></a> <a href="https://masto.nobigtech.es/tags/FranciscoJavierRodr%C3%ADguezAmor%C3%ADn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FranciscoJavierRodríguezAmorín</span></a> <a href="https://masto.nobigtech.es/tags/INCIBE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>INCIBE</span></a> <a href="https://masto.nobigtech.es/tags/intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intellexa</span></a> <a href="https://masto.nobigtech.es/tags/Patternz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patternz</span></a> <a href="https://masto.nobigtech.es/tags/Pegasus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pegasus</span></a> <a href="https://masto.nobigtech.es/tags/PildoraRoja_Azul" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PildoraRoja_Azul</span></a> <a href="https://masto.nobigtech.es/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> ProyectoAppPI <a href="https://masto.nobigtech.es/tags/sapiencias" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sapiencias</span></a> <a href="https://masto.nobigtech.es/tags/securitylab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitylab</span></a></p>
WOZ – die Wochenzeitung<p>Exklusiv zur <a href="https://troet.cafe/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>-Überwachungssoftware:</p><p>- USA setzen einen Anwalt aus Lugano auf die Sanktionsliste <br>- Bundesanwaltschaft hat ein Strafverfahren eingeleitet<br>- Neue Spuren zu einer Genfer Bank</p><p>Von <span class="h-card" translate="no"><a href="https://mastodon.social/@jan_jirat" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jan_jirat</span></a></span> und Lorenz Naegeli</p><p><a href="https://troet.cafe/tags/Predatorfiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predatorfiles</span></a> <a href="https://troet.cafe/tags/USTreasury" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USTreasury</span></a> </p><p><a href="https://www.woz.ch/2439/predator-files/die-schweiz-als-drehscheibe/!NN0B9QYP1H7V?mtm_campaign=mstdn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">woz.ch/2439/predator-files/die</span><span class="invisible">-schweiz-als-drehscheibe/!NN0B9QYP1H7V?mtm_campaign=mstdn</span></a></p>
Paul Shread<p>Connecting the dots - and pure speculation on my part - but I wonder if the U.S. suspects that Intellexa's Predator spyware may have wound up in the hands of certain U.S. adversaries. </p><p><a href="https://masto.ai/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://masto.ai/tags/Sanctions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sanctions</span></a> <a href="https://masto.ai/tags/ThreatActors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatActors</span></a> <a href="https://masto.ai/tags/NationalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationalSecurity</span></a> <a href="https://masto.ai/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> <a href="https://masto.ai/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> <a href="https://masto.ai/tags/NatSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NatSec</span></a> <a href="https://masto.ai/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://masto.ai/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://masto.ai/tags/Pegasus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pegasus</span></a> <a href="https://masto.ai/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> <a href="https://masto.ai/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://masto.ai/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://masto.ai/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a> <a href="https://masto.ai/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> </p><p><a href="https://thecyberexpress.com/us-sanctions-predator-spyware-maker-intellexa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/us-sanctio</span><span class="invisible">ns-predator-spyware-maker-intellexa/</span></a></p>
Tarnkappe.info<p>📬 Trojaner der NSO Group oder intellexa in russischer Hand<br><a href="https://social.tchncs.de/tags/Cyberangriffe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriffe</span></a> <a href="https://social.tchncs.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.tchncs.de/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> <a href="https://social.tchncs.de/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSOGroup</span></a> <a href="https://social.tchncs.de/tags/Sluschbawneschneiraswedki" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sluschbawneschneiraswedki</span></a> <a href="https://social.tchncs.de/tags/Techcrunch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Techcrunch</span></a> <a href="https://social.tchncs.de/tags/ThreatAnalysisGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatAnalysisGroup</span></a> <a href="https://social.tchncs.de/tags/ToomasIlves" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToomasIlves</span></a> <a href="https://sc.tarnkappe.info/f09dd2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/f09dd2</span><span class="invisible"></span></a></p>
Manuel 'HonkHase' Atug<p>Russian APT29 hackers use iOS, Chrome <a href="https://chaos.social/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a> created by <a href="https://chaos.social/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> vendors</p><p>"APT29 used exploits that were almost identical to those used by commercial <a href="https://chaos.social/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a>-ware vendors like <a href="https://chaos.social/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSOGroup</span></a> and <a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>, who created and leveraged the flaws as <a href="https://chaos.social/tags/zeroDays" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroDays</span></a> when no fix was available."<br><a href="https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>'s government <a href="https://hachyderm.io/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> found using exploits made by <a href="https://hachyderm.io/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> companies <a href="https://hachyderm.io/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> and <a href="https://hachyderm.io/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a><br>In a blog post on Thursday, <a href="https://hachyderm.io/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> said it is not sure how the Russian government acquired the <a href="https://hachyderm.io/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a>, but said this is an example of how exploits developed by spyware makers can end up in the hands of “dangerous threat actors.” <br><a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/08/29/russ</span><span class="invisible">ian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/</span></a></p>
SEDIMENT4<p>Google hat Beweise dafür vorgelegt, dass russische Regierungshacker Exploits nutzen, die "identisch oder auffallend ähnlich" zu denen sind, die zuvor von den Staatstrojaner-Herstellern <a href="https://mastodon.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> und <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> Group entwickelt wurden.</p><p><a href="https://winfuture.de/news,144899.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">winfuture.de/news,144899.html</span><span class="invisible"></span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>-linked <a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> reused <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> and <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> exploits previously developed by <a href="https://infosec.exchange/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> <a href="https://infosec.exchange/tags/Group" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Group</span></a> and <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a><br><a href="https://securityaffairs.com/167797/apt/apt29-nso-group-and-intellexa-mobile-exploits.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167797/apt</span><span class="invisible">/apt29-nso-group-and-intellexa-mobile-exploits.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
CCC<p>Malicious cyberattacks: An example of where exploits developed by spyware makers NSO and <a href="https://social.bau-ha.us/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> end up <a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/08/29/russ</span><span class="invisible">ian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/</span></a> <a href="https://social.bau-ha.us/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Staatstrojaner</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>: <a href="https://social.tchncs.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> des <a href="https://social.tchncs.de/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a>-Herstellers kommt über Online-Werbung | heise online <a href="https://www.heise.de/news/Intellexa-Spyware-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Intellexa-Spywar</span><span class="invisible">e-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.tchncs.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Überwachung</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/Tracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tracking</span></a> <a href="https://social.tchncs.de/tags/Aladdin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aladdin</span></a></p>
Manuel 'HonkHase' Atug<p>Und immer noch Staatstrojaner made by Israel 😒</p><p><a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>: <a href="https://chaos.social/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> des <a href="https://chaos.social/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a>-Herstellers kommt über Online-Werbung</p><p>"Der <a href="https://chaos.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>-Dealer Intellexa stellt <a href="https://chaos.social/tags/Sp%C3%A4hsoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spähsoftware</span></a> vor, die Handys rein über Werbebanner infiziert.​ Ohne Klick."</p><p>"Der israelische Ex-Offizier Tal Dilian hat Intellexa 2018 zusammen mit anderen Kollegen aus dem israelischen Sicherheits-, <a href="https://chaos.social/tags/Milit%C3%A4r" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Militär</span></a> und <a href="https://chaos.social/tags/Geheimdienst" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geheimdienst</span></a>'apparat gegründet. Der juristische Hauptsitz..." <a href="https://www.heise.de/news/Intellexa-Spyware-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Intellexa-Spywar</span><span class="invisible">e-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html</span></a></p>
Synapsenkitzler 🌻 🌈<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heiseonline</span></a></span> <br>"uBlock Origin ist als Werbeblocker ein freies, plattformübergreifendes Webbrowser-Plug-in zum Filtern von Webinhalten, beispielsweise Werbung, Webtracking oder Malvertising" <a href="https://de.m.wikipedia.org/wiki/UBlock_Origin" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">de.m.wikipedia.org/wiki/UBlock</span><span class="invisible">_Origin</span></a><br><a href="https://digitalcourage.social/tags/intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intellexa</span></a> <a href="https://digitalcourage.social/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://digitalcourage.social/tags/predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>predator</span></a> <a href="https://digitalcourage.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://digitalcourage.social/tags/adblocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblocker</span></a> <a href="https://digitalcourage.social/tags/werbebanner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>werbebanner</span></a></p>
netzpolitik.org<p>Spionagetechnologie <a href="https://chaos.social/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> von <a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> aus Europa: Erstmals US-Sanktionen gegen europäische Staatstrojaner-Anbieter <a href="https://netzpolitik.org/2024/intellexa-predator-us-sanktionen-gegen-europaeische-staatstrojaner-anbieter/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpolitik.org/2024/intellexa</span><span class="invisible">-predator-us-sanktionen-gegen-europaeische-staatstrojaner-anbieter/</span></a></p>
Mediapart<p>«Predator files»: nouvelles sanctions américaines contre le fabricant du logiciel espion </p><p>À la suite des révélations de notre enquête «<a href="https://mediapart.social/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> files», le gouvernement états-unien a édicté de nouvelles sanctions contre le groupe <a href="https://mediapart.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>, fabricant du logiciel espion Predator, et son patron israélien Tal Dilian, au cœur de multiples scandales. </p><p>› <a href="https://www.mediapart.fr/journal/international/060324/predator-files-nouvelles-sanctions-americaines-contre-le-fabricant-du-logiciel-espion" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mediapart.fr/journal/internati</span><span class="invisible">onal/060324/predator-files-nouvelles-sanctions-americaines-contre-le-fabricant-du-logiciel-espion</span></a></p>
securityaffairs<p>US Gov sanctioned <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> <a href="https://infosec.exchange/tags/Consortium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Consortium</span></a> individuals and entities behind <a href="https://infosec.exchange/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> <a href="https://infosec.exchange/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> attacks<br><a href="https://securityaffairs.com/160018/intelligence/us-sanctioned-predator-spyware-entities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/160018/int</span><span class="invisible">elligence/us-sanctioned-predator-spyware-entities.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
CCC<p>US administration against commercial spyware makers: Sanctions on <a href="https://social.bau-ha.us/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> Consortium (and founder) for targeting Americans <a href="https://techcrunch.com/2024/03/05/us-sanctions-founder-of-spyware-maker-intellexa-for-targeting-americans/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/03/05/us-s</span><span class="invisible">anctions-founder-of-spyware-maker-intellexa-for-targeting-americans/</span></a> <a href="https://social.bau-ha.us/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Staatstrojaner</span></a></p>
ITSEC News<p>Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware - By Mike Gentile, Asheer Malhotra and Vitor Ventura.Editor’s note: This blog post i... <a href="https://blog.talosintelligence.com/intellexa-and-cytrox-intel-agency-grade-spyware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/int</span><span class="invisible">ellexa-and-cytrox-intel-agency-grade-spyware/</span></a> <a href="https://schleuss.online/tags/threatspotlight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatspotlight</span></a> <a href="https://schleuss.online/tags/mercenaryapt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mercenaryapt</span></a> <a href="https://schleuss.online/tags/intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intellexa</span></a> <a href="https://schleuss.online/tags/topstory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>topstory</span></a> <a href="https://schleuss.online/tags/features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>features</span></a> <a href="https://schleuss.online/tags/cytrox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cytrox</span></a> <a href="https://schleuss.online/tags/psoa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psoa</span></a> <a href="https://schleuss.online/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a></p>
Manuel 'HonkHase' Atug<p><a href="https://chaos.social/tags/Spionagewaffe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spionagewaffe</span></a> <a href="https://chaos.social/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a>: Sie schleichen sich klammheimlich in Ihr Handy – und schon sind Sie infiziert</p><p>"<a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> Alliance heißt der dunkle Firmenverbund, der <a href="https://chaos.social/tags/Despoten" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Despoten</span></a> und <a href="https://chaos.social/tags/Unrechtsstaaten" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unrechtsstaaten</span></a> mit <a href="https://chaos.social/tags/Cyberwaffen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberwaffen</span></a> beliefert. Eine internationale Recherche enthüllt: Auch <a href="https://chaos.social/tags/Deutsche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deutsche</span></a> verdienen am großen Lauschangriff."</p><p><a href="https://chaos.social/tags/ZITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZITIS</span></a> sei dank sind wir auch Kunden von so verfassungsfeindlicher Software. <a href="https://www.spiegel.de/netzwelt/netzpolitik/predator-files-wie-intellexa-jahrelang-despoten-mit-spionageprogrammen-versorgte-a-0268f613-6b56-48e7-822f-0eccb85ae5c9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spiegel.de/netzwelt/netzpoliti</span><span class="invisible">k/predator-files-wie-intellexa-jahrelang-despoten-mit-spionageprogrammen-versorgte-a-0268f613-6b56-48e7-822f-0eccb85ae5c9</span></a></p>
Miguel Afonso Caetano<p><a href="https://tldr.nettime.org/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://tldr.nettime.org/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://tldr.nettime.org/tags/Predator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Predator</span></a> <a href="https://tldr.nettime.org/tags/PredatorFiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PredatorFiles</span></a> <a href="https://tldr.nettime.org/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a>: "Shocking spyware attacks have been attempted against civil society, journalists, politicians and academics in the European Union (EU), USA and Asia, according to a major new investigation by Amnesty International. Among the targets of Predator spyware are United Nations (UN) officials, a Senator and Congressman in the USA and even the Presidents of the European Parliament and Taiwan. The investigation is part of the ‘Predator Files’ project, in partnership with the European Investigative Collaborations (EIC) and backed by additional in-depth reporting by Mediapart and Der Spiegel. </p><p> Between February and June 2023, social media platforms X (formerly Twitter) and Facebook were used to publicly target at least 50 accounts belonging to 27 individuals and 23 institutions. The cyber-surveillance weapon used for targeting was an invasive spyware tool called Predator, which was developed and sold by the Intellexa alliance. This alliance, which has advertised itself as “EU based and regulated”, is a complex and often changing group of companies that develops and sells surveillance products, including Predator spyware.  </p><p> Predator is a type of highly invasive spyware. This means that once it has infiltrated a device it has unfettered access to its microphone and camera and all its data such as contacts, messages, photos and videos, while the user is entirely unaware. Such spyware cannot, at present, be independently audited or limited in its functionality to only those functions that are necessary and proportionate to a specific use. "   </p><p><a href="https://www.amnesty.org/en/latest/news/2023/10/global-predator-files-spyware-scandal-reveals-brazen-targeting-of-civil-society-politicians-and-officials/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amnesty.org/en/latest/news/202</span><span class="invisible">3/10/global-predator-files-spyware-scandal-reveals-brazen-targeting-of-civil-society-politicians-and-officials/</span></a></p>