Yazılar

WhatsApp Uncovers Spyware Campaign Targeting Italian Users

WhatsApp has revealed that an Italian surveillance firm tricked around 200 users into downloading a fake version of its app embedded with spyware.

The campaign was attributed to ASIGINT, a subsidiary of SIO, which develops cyber intelligence tools for government and law enforcement clients. According to WhatsApp, the attack relied on deception, persuading victims to install malicious software disguised as the legitimate app.

The company described the operation as “highly targeted,” noting that most affected users were based in Italy. The spyware enabled unauthorized surveillance once installed, raising concerns about privacy and digital security.

Meta Platforms, which owns WhatsApp, has taken action to disrupt the campaign. However, details about the specific targets or the full scope of the surveillance have not been disclosed.

This marks the second major spyware-related incident in Italy within 15 months. A previous case involved software from Paragon, which led to a fallout between the company and Italian authorities.

The latest incident highlights the growing use of sophisticated social engineering tactics in cyber espionage, as well as ongoing concerns over the role of commercial surveillance tools in monitoring individuals.

Iran-Linked Hackers Restore Website After US Domain Seizure

A website linked to an Iranian government-associated hacking group has resurfaced just one day after U.S. authorities seized several of its domains, highlighting ongoing challenges in disrupting cyber threat actors.

The U.S. Department of Justice said it had seized four domains connected to the “Handala Hack Team,” which it linked to Iran’s Ministry of Intelligence and Security. The group had previously claimed responsibility for a cyberattack on a U.S. medical device company earlier in March.

Despite the takedown, the group quickly restored its online presence, stating that the action was an attempt by U.S. authorities to silence it. Analysts say such rapid recovery is common, as state-linked cyber units frequently re-establish operations using new domains or platforms.

The incident underscores the resilience of cyber threat actors and the limitations of domain seizures as a long-term deterrent. Experts note that these groups often maintain multiple backup channels, allowing them to resume activities with minimal disruption.

The case also highlights growing tensions in cyber operations, where government-linked hacking groups continue to play a role in both digital espionage and psychological operations.

Hacker Claims Breach of Police Tip Data

A hacker has claimed to have accessed and stolen more than 8 million confidential law enforcement tips from a U.S.-based platform.

The attacker said they infiltrated P3 Global Intel, a service used by police, federal agencies and schools to collect anonymous tips, and extracted around 93 gigabytes of data. The breach was reportedly achieved through social engineering and a system vulnerability.

The claims have not been fully verified, though some reports suggest portions of the data may be authentic. Neither the company nor the FBI has provided an immediate response.

If confirmed, the breach could raise serious concerns about the security of sensitive reporting systems used by authorities, as well as the privacy of individuals who submit confidential information.