Skip to main content

Introduction

According to a recent technical report by The Citizen Lab, a prominent digital security research group, the governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are potential customers of Paragon Solutions, an Israeli spyware manufacturer.

Background

On Wednesday, The Citizen Lab, a team of academics and security researchers at the University of Toronto, released a report about Paragon, a surveillance startup founded in Israel, revealing that these six governments are suspected of deploying Paragon’s spyware.

WhatsApp Notifications and Scandal

In late January, WhatsApp informed around 90 users that they were targeted with Paragon spyware, prompting a scandal in Italy, where some of the targets reside. This incident led to a public outcry and raised concerns about the use of spyware by governments.

Paragon’s Claims of Responsibility

Paragon has attempted to differentiate itself from competitors like NSO Group by claiming to be a more responsible spyware vendor. In 2021, a senior Paragon executive stated that the company would never sell its products to authoritarian or non-democratic regimes.

Response to Scandal

In response to the scandal, Paragon’s executive chairman, John Fleming, told TechCrunch that the company only licenses its technology to a select group of global democracies, primarily the United States and its allies.

Acquisition by US Venture Capital

In late 2024, Israeli news outlets reported that US venture capital firm AE Industrial Partners had acquired Paragon for at least $500 million upfront.

Citizen Lab’s Investigation

an image describing the attack flow of a Paragon-made spyware called Graphite. The steps include an attacker adding a person to a WhatApp group, then the victim's device automatically parses PDF, exploiting the vulnerability.
An example of the attack flow for the Graphite spyware.Image Credits:Citizen Lab

Mapping Paragon’s Server Infrastructure

The Citizen Lab report reveals that the researchers were able to map Paragon’s server infrastructure used for its Graphite spyware tool, based on a tip from a collaborator.

Evidence and Fingerprints

By developing fingerprints to identify Paragon servers and digital certificates, Citizen Lab found several IP addresses hosted at local telecom companies, which they believe belong to Paragon customers.

Response from Governments and Paragon

TechCrunch reached out to the governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore, as well as the Ontario Provincial Police, but none responded to requests for comment.

Paragon’s executive chairman, John Fleming, stated that Citizen Lab provided limited information, some of which appears to be inaccurate, and therefore, the company cannot offer a comment at this time.

Collaboration and Information Sharing

Citizen Lab noted that all the individuals notified by WhatsApp who reached out for phone analysis used Android phones, allowing researchers to identify a forensic artifact left by Paragon’s spyware, codenamed “BIGPRETZEL”.

Meta’s Statement

Meta spokesperson Zade Alsawah confirmed that the company believes the indicator Citizen Lab refers to as BIGPRETZEL is associated with Paragon, emphasizing the need for commercial spyware companies to be held accountable.

Ongoing Investigation

Given that Android phones may not always preserve certain device logs, Citizen Lab suggests that more people may have been targeted by the Graphite spyware without evidence of Paragon’s spyware on their phones.

Targeting Specific Apps

Citizen Lab found that Paragon’s Graphite spyware targets and compromises specific apps on the phone without needing any interaction from the target, rather than compromising the wider operating system and device data.

Conclusion

Bill Marczak, a senior researcher at Citizen Lab, stated that while Paragon’s spyware may be trickier to spot than competitors, collaboration and information sharing can help unravel even the toughest cases.

Call to Action

Contact Us

Do you have more information about Paragon and this spyware campaign? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You can also contact TechCrunch via SecureDrop.


Source Link