toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

275
active users

#Intellexa

0 posts0 participants0 posts today
Marietje Schaake<p>RT by <span class="h-card"><a href="https://respublicae.eu/@MarietjeSchaake" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MarietjeSchaake</span></a></span>: NEW: US @StateDept imposes fresh visa restrictions on mercenary spyware proliferators.</p><p>This is going to hurt.</p><p>The punches are coming quick lately.</p><p>Follows OFAC sanctions on Monday against notorious <a href="https://respublicae.eu/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> spyware proliferator <a href="https://respublicae.eu/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>.<br><a href="https://www.state.gov/promoting-accountability-for-the-misuse-of-commercial-spyware-2/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">state.gov/promoting-accountabi</span><span class="invisible">lity-for-the-misuse-of-commercial-spyware-2/</span></a></p><p>[2024-09-20 16:44 UTC]</p>
Paul Shread<p>Connecting the dots - and pure speculation on my part - but I wonder if the U.S. suspects that Intellexa's Predator spyware may have wound up in the hands of certain U.S. adversaries. </p><p><a href="https://masto.ai/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://masto.ai/tags/Sanctions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sanctions</span></a> <a href="https://masto.ai/tags/ThreatActors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActors</span></a> <a href="https://masto.ai/tags/NationalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationalSecurity</span></a> <a href="https://masto.ai/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> <a href="https://masto.ai/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> <a href="https://masto.ai/tags/NatSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NatSec</span></a> <a href="https://masto.ai/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://masto.ai/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://masto.ai/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://masto.ai/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://masto.ai/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://masto.ai/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://masto.ai/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> <a href="https://masto.ai/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> </p><p><a href="https://thecyberexpress.com/us-sanctions-predator-spyware-maker-intellexa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/us-sanctio</span><span class="invisible">ns-predator-spyware-maker-intellexa/</span></a></p>
Manuel 'HonkHase' Atug<p>Russian APT29 hackers use iOS, Chrome <a href="https://chaos.social/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> created by <a href="https://chaos.social/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> vendors</p><p>"APT29 used exploits that were almost identical to those used by commercial <a href="https://chaos.social/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a>-ware vendors like <a href="https://chaos.social/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSOGroup</span></a> and <a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>, who created and leveraged the flaws as <a href="https://chaos.social/tags/zeroDays" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroDays</span></a> when no fix was available."<br><a href="https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a>'s government <a href="https://hachyderm.io/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> found using exploits made by <a href="https://hachyderm.io/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> companies <a href="https://hachyderm.io/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> and <a href="https://hachyderm.io/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a><br>In a blog post on Thursday, <a href="https://hachyderm.io/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> said it is not sure how the Russian government acquired the <a href="https://hachyderm.io/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a>, but said this is an example of how exploits developed by spyware makers can end up in the hands of “dangerous threat actors.” <br><a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/08/29/russ</span><span class="invisible">ian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/</span></a></p>
PrivacyDigest<p>Powerful <a href="https://mas.to/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://mas.to/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> Enable a New String of 'Watering Hole' Attacks </p><p>Suspected <a href="https://mas.to/tags/Russian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russian</span></a> <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> have compromised a series of websites to utilize sophisticated spyware exploits that are eerily similar to those created by <a href="https://mas.to/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSOGroup</span></a> and <a href="https://mas.to/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/wateringhole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wateringhole</span></a> </p><p><a href="https://www.wired.com/story/russia-cozy-bear-watering-hole-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/russia-cozy-be</span><span class="invisible">ar-watering-hole-attacks/</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a>-linked <a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a> reused <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> and <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> exploits previously developed by <a href="https://infosec.exchange/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://infosec.exchange/tags/Group" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Group</span></a> and <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a><br><a href="https://securityaffairs.com/167797/apt/apt29-nso-group-and-intellexa-mobile-exploits.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167797/apt</span><span class="invisible">/apt29-nso-group-and-intellexa-mobile-exploits.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
CCC<p>Malicious cyberattacks: An example of where exploits developed by spyware makers NSO and <a href="https://social.bau-ha.us/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> end up <a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/08/29/russ</span><span class="invisible">ian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/</span></a> <a href="https://social.bau-ha.us/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Staatstrojaner</span></a></p>
Pyrzout :vm:<p>Russian State Hackers Using Exploits ‘Strikingly Similar’ to Spyware Vendors NSO and Intellexa <a href="https://thecyberexpress.com/russian-state-hackers-use-spyware-exploits/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/russian-st</span><span class="invisible">ate-hackers-use-spyware-exploits/</span></a> <a href="https://social.skynetcloud.site/tags/RussianStateHackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RussianStateHackers</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/CybersecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/VulnerabilityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityNews</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberWarfare</span></a> <a href="https://social.skynetcloud.site/tags/ThreatActors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActors</span></a> <a href="https://social.skynetcloud.site/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.skynetcloud.site/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.skynetcloud.site/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> <a href="https://social.skynetcloud.site/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSOGroup</span></a> <a href="https://social.skynetcloud.site/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.skynetcloud.site/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://social.skynetcloud.site/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a> <a href="https://social.skynetcloud.site/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://social.skynetcloud.site/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a></p>
#cryptohagen<p><a href="https://social.data.coop/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> <a href="https://social.data.coop/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> become far less visible in its operations in recent months, a development researchers say likely indicates that sanctions and exposure have dented the firm’s operations</p><p>...researchers caution that it is difficult to determine whether the spyware outfit <a href="https://social.data.coop/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> alliance (linked to surveillance of journalists, civil society, opposition politicians) has become less active or just figured out a way to retool and avoid scrutiny<br><a href="https://cyberscoop.com/sanctioned-and-exposed-predator-spyware-maker-group-has-gone-awfully-quiet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/sanctioned-and-</span><span class="invisible">exposed-predator-spyware-maker-group-has-gone-awfully-quiet/</span></a> <a href="https://social.data.coop/tags/AmnestyTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AmnestyTech</span></a> <a href="https://social.data.coop/tags/CitizenLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CitizenLab</span></a></p>
Datarainbow Privacy Assistant✅<p><a href="https://mastodon.online/tags/adtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adtech</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> ‘Documents reveal that Intellexa, which is run by Israelis but operates outside of Israel's exports regime, presented an ad-based spyware – considered the cutting edge of Israeli offensive cyber’ <a href="https://www.haaretz.com/israel-news/security-aviation/2024-04-11/ty-article/.premium/israel-tried-to-keep-sensitive-spy-tech-under-wraps-it-leaked-abroad/0000018e-c948-d480-a99e-cf5f24900000" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">haaretz.com/israel-news/securi</span><span class="invisible">ty-aviation/2024-04-11/ty-article/.premium/israel-tried-to-keep-sensitive-spy-tech-under-wraps-it-leaked-abroad/0000018e-c948-d480-a99e-cf5f24900000</span></a></p>
Manuel 'HonkHase' Atug<p>Und immer noch Staatstrojaner made by Israel 😒</p><p><a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>: <a href="https://chaos.social/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> des <a href="https://chaos.social/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a>-Herstellers kommt über Online-Werbung</p><p>"Der <a href="https://chaos.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>-Dealer Intellexa stellt <a href="https://chaos.social/tags/Sp%C3%A4hsoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spähsoftware</span></a> vor, die Handys rein über Werbebanner infiziert.​ Ohne Klick."</p><p>"Der israelische Ex-Offizier Tal Dilian hat Intellexa 2018 zusammen mit anderen Kollegen aus dem israelischen Sicherheits-, <a href="https://chaos.social/tags/Milit%C3%A4r" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Militär</span></a> und <a href="https://chaos.social/tags/Geheimdienst" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Geheimdienst</span></a>'apparat gegründet. Der juristische Hauptsitz..." <a href="https://www.heise.de/news/Intellexa-Spyware-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Intellexa-Spywar</span><span class="invisible">e-des-Predator-Herstellers-kommt-ueber-Online-Werbung-9682500.html</span></a></p>
Synapsenkitzler 🌻<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heiseonline</span></a></span> <br>"uBlock Origin ist als Werbeblocker ein freies, plattformübergreifendes Webbrowser-Plug-in zum Filtern von Webinhalten, beispielsweise Werbung, Webtracking oder Malvertising" <a href="https://de.m.wikipedia.org/wiki/UBlock_Origin" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">de.m.wikipedia.org/wiki/UBlock</span><span class="invisible">_Origin</span></a><br><a href="https://digitalcourage.social/tags/intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intellexa</span></a> <a href="https://digitalcourage.social/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> <a href="https://digitalcourage.social/tags/predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>predator</span></a> <a href="https://digitalcourage.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://digitalcourage.social/tags/adblocker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adblocker</span></a> <a href="https://digitalcourage.social/tags/werbebanner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>werbebanner</span></a></p>
PrivacyDigest<p>US sanctions founder of <a href="https://mas.to/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> maker <a href="https://mas.to/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> for targeting Americans | TechCrunch</p><p>This is the first time the U.S. government has targeted specific people, in addition to companies, with sanctions related to the misuse of commercial spyware. <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> </p><p><a href="https://techcrunch.com/2024/03/05/us-sanctions-founder-of-spyware-maker-intellexa-for-targeting-americans/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/03/05/us-s</span><span class="invisible">anctions-founder-of-spyware-maker-intellexa-for-targeting-americans/</span></a></p>
netzpolitik.org<p>Spionagetechnologie <a href="https://chaos.social/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> von <a href="https://chaos.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> aus Europa: Erstmals US-Sanktionen gegen europäische Staatstrojaner-Anbieter <a href="https://netzpolitik.org/2024/intellexa-predator-us-sanktionen-gegen-europaeische-staatstrojaner-anbieter/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpolitik.org/2024/intellexa</span><span class="invisible">-predator-us-sanktionen-gegen-europaeische-staatstrojaner-anbieter/</span></a></p>
Mediapart<p>«Predator files»: nouvelles sanctions américaines contre le fabricant du logiciel espion </p><p>À la suite des révélations de notre enquête «<a href="https://mediapart.social/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> files», le gouvernement états-unien a édicté de nouvelles sanctions contre le groupe <a href="https://mediapart.social/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>, fabricant du logiciel espion Predator, et son patron israélien Tal Dilian, au cœur de multiples scandales. </p><p>› <a href="https://www.mediapart.fr/journal/international/060324/predator-files-nouvelles-sanctions-americaines-contre-le-fabricant-du-logiciel-espion" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mediapart.fr/journal/internati</span><span class="invisible">onal/060324/predator-files-nouvelles-sanctions-americaines-contre-le-fabricant-du-logiciel-espion</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>US <a href="https://hachyderm.io/tags/sanctions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sanctions</span></a> founder of <a href="https://hachyderm.io/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> maker <a href="https://hachyderm.io/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a>, <a href="https://hachyderm.io/tags/TalDilian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TalDilian</span></a>, for targeting <a href="https://hachyderm.io/tags/Americans" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Americans</span></a><br>This is the first time the U.S. government has targeted specific people, in addition to companies, with sanctions related to the misuse of commercial spyware. And it signifies an escalation of the White House and U.S. government’s efforts to curb the spyware industry. <br><a href="https://techcrunch.com/2024/03/05/us-sanctions-founder-of-spyware-maker-intellexa-for-targeting-americans/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/03/05/us-s</span><span class="invisible">anctions-founder-of-spyware-maker-intellexa-for-targeting-americans/</span></a> <a href="https://hachyderm.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://hachyderm.io/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a></p>
securityaffairs<p>US Gov sanctioned <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> <a href="https://infosec.exchange/tags/Consortium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Consortium</span></a> individuals and entities behind <a href="https://infosec.exchange/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> <a href="https://infosec.exchange/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> attacks<br><a href="https://securityaffairs.com/160018/intelligence/us-sanctioned-predator-spyware-entities.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/160018/int</span><span class="invisible">elligence/us-sanctioned-predator-spyware-entities.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Jon Greig<p>The Treasury Department announced sanctions against Intellexa founder Tal Jonathan Dilian and Sara Aleksandra Fayssal Hamou as well as five entities tied to the Predator spyware operation</p><p><a href="https://ioc.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> <a href="https://ioc.exchange/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a></p><p><a href="https://therecord.media/predator-spyware-makers-sanctioned-for-targeting-government-officials" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/predator-spywa</span><span class="invisible">re-makers-sanctioned-for-targeting-government-officials</span></a></p>
CCC<p>US administration against commercial spyware makers: Sanctions on <a href="https://social.bau-ha.us/tags/Intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intellexa</span></a> Consortium (and founder) for targeting Americans <a href="https://techcrunch.com/2024/03/05/us-sanctions-founder-of-spyware-maker-intellexa-for-targeting-americans/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/03/05/us-s</span><span class="invisible">anctions-founder-of-spyware-maker-intellexa-for-targeting-americans/</span></a> <a href="https://social.bau-ha.us/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Staatstrojaner</span></a></p>
ITSEC News<p>Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware - By Mike Gentile, Asheer Malhotra and Vitor Ventura.Editor’s note: This blog post i... <a href="https://blog.talosintelligence.com/intellexa-and-cytrox-intel-agency-grade-spyware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/int</span><span class="invisible">ellexa-and-cytrox-intel-agency-grade-spyware/</span></a> <a href="https://schleuss.online/tags/threatspotlight" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatspotlight</span></a> <a href="https://schleuss.online/tags/mercenaryapt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mercenaryapt</span></a> <a href="https://schleuss.online/tags/intellexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intellexa</span></a> <a href="https://schleuss.online/tags/topstory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>topstory</span></a> <a href="https://schleuss.online/tags/features" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>features</span></a> <a href="https://schleuss.online/tags/cytrox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cytrox</span></a> <a href="https://schleuss.online/tags/psoa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>psoa</span></a> <a href="https://schleuss.online/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a></p>