TECHNOLOGY
Spyware Scandal: Italian Company Caught in Malicious App Scheme
Thu Feb 13 2025
In a surprising turn of events, an Italian company has been linked to a series of malicious Android apps. These apps, which pretend to be popular ones like WhatsApp, are actually designed to steal private data from unsuspecting users. This discovery highlights the extensive world of government spyware and the various techniques used to target individuals. The apps in question were identified by security researchers and confirmed to be spyware by both Google and a mobile security firm.
The apps were distributed through websites that mimicked popular Italian cellphone providers. The spyware, named Spyrtacus, has been around since 2019 and can perform a range of surveillance functions, including stealing text messages, recording phone calls, and capturing images and audio. The apps were likely used by Italian law enforcement agencies, given the language and distribution methods.
This isn't the first time Italy has been in the spotlight for spyware. The country has a history of government spyware companies, including Hacking Team, which sold its products to agencies worldwide. Other Italian companies, such as Cy4Gate and eSurv, have also been involved in similar activities.
The Spyrtacus spyware is believed to be developed by SIO, an Italian company that sells spyware to the Italian government. The company has been linked to the spyware through various clues, including command-and-control servers registered to its subsidiary, ASIGINT. The spyware has been distributed through malicious websites and apps, with some samples dating back to 2019.
It's unclear who was targeted with this spyware, but the implications are serious. The discovery raises questions about the ethics of government surveillance and the need for better protection against such threats. The Italian government and SIO have not responded to requests for comment, leaving many questions unanswered.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
The spyware was distributed through apps that pretended to be popular ones like WhatsApp, and customer support tools provided by cellphone providers. The spyware was discovered by a security researcher who shared three Android apps with a tech publication, claiming they were likely government spyware used in Italy against unknown victims. The apps were analyzed by Google and a mobile security firm, which confirmed that the apps were spyware.
continue reading...
questions
Will the next version of Spyrtacus come with a built-in Italian-to-English translator for better user experience?
If Spyrtacus can steal text messages and record phone calls, does that mean it can also order pizza for the user?
What ethical considerations should be taken into account when governments use spyware like Spyrtacus for surveillance?
actions
flag content