WhatsApp Disrupts Spyware Campaign Targeting Journalists and Civil Society Members
WhatsApp, the popular messaging platform owned by Meta, has successfully thwarted a hacking campaign that targeted approximately 90 users, including journalists and members of civil society[1][2]. The company has linked this campaign to Paragon, an Israeli spyware firm that was recently acquired by the American private equity giant AE Industrial Partners[12][13].
The Attack and WhatsApp's Response
The hacking attempt, which WhatsApp believes occurred in December 2024, involved a sophisticated method:
- Hackers invited targets to WhatsApp groups
- Malicious PDF files were sent through these groups to compromise devices[9]
WhatsApp has taken several steps in response to this threat:
- Pushed a fix to prevent the attack mechanism
- Sent a cease and desist letter to Paragon
- Reached out directly to affected users[1][3]
WhatsApp spokesperson Zade Alsawah emphasized the need for accountability, stating, "This is the latest example of why spyware companies must be held accountable for their unlawful actions. WhatsApp will continue to protect people's ability to communicate privately"[7].
Paragon and Its Spyware
Paragon, founded in 2019 by former Israeli intelligence officers, has managed to maintain a low profile compared to other controversial spyware makers like NSO Group and Intellexa[12][13]. The company's flagship product, Graphite, is reportedly capable of penetrating encrypted platforms such as WhatsApp, Signal, and Telegram[8].
Despite its attempts to position itself as an "ethical" cybersecurity firm, this incident marks the first time Paragon has been publicly linked to a hacking campaign targeting journalists and civil society members[5][7].
Implications and Reactions
The revelation of this spyware campaign has raised concerns among digital rights advocates:
- John Scott-Railton, a senior researcher at The Citizen Lab, confirmed they are investigating the campaign[7].
- Natalia Krapiva, senior tech-legal counsel at Access Now, noted that this incident challenges Paragon's previous reputation as a "better" spyware company[3][7].
Broader Context
This incident occurs against a backdrop of increasing scrutiny of the commercial spyware industry:
- Other companies like NSO Group and Intellexa have faced sanctions and blacklisting by the U.S. government[7].
- Paragon recently secured a $2 million contract with U.S. Immigration and Customs Enforcement, raising questions about the vetting process for such technologies[12][13].
As the investigation continues, the cybersecurity community awaits more details about the targets and the full extent of this spyware campaign. WhatsApp's proactive approach in disrupting the attack and notifying users underscores the ongoing challenges in protecting digital privacy and the need for continued vigilance against sophisticated cyber threats.
How did Paragon manage to keep a low profile until now
Paragon, an Israeli spyware company, managed to keep a low profile until recently through several strategic approaches:
Secretive Operations
Paragon has maintained an extremely secretive stance since its founding in 2019[1][10]:
- The company does not have a public website[1][11]
- It has avoided public attention and scrutiny that other spyware makers like NSO Group have faced[6]
Limited Customer Base
Paragon has reportedly been selective in its clientele:
- The company claims to only sell to countries that abide by international norms and respect fundamental rights[10]
- Its only publicly known customer is the U.S. Drug Enforcement Agency[11]
Positioning as an "Ethical" Alternative
Paragon has attempted to differentiate itself from controversial competitors:
- It markets itself as an "ethical" cyber defense company[3]
- The company reportedly implemented controls to prevent misuse of its tools[2]
Focus on Specific Capabilities
Rather than offering full device control, Paragon has specialized in:
- Accessing instant messaging applications on devices[10]
- Exploiting protocols of end-to-end encrypted apps like WhatsApp and Signal[10][16]
Strategic Partnerships and Backing
Paragon has secured influential support:
- It is financially backed by prominent American private equity firm Battery Ventures[11]
- Former Israeli Prime Minister Ehud Barak serves on its board[11]
Limited Public Disclosures
Until recently, there were few public disclosures about Paragon's activities:
- The company has not been implicated in major scandals like some of its competitors[2]
- Its acquisition by AE Industrial Partners in December 2024 brought more attention to the company[6]
By maintaining secrecy, limiting its customer base, positioning itself as ethical, focusing on specific capabilities, securing strategic partnerships, and avoiding public disclosures, Paragon managed to operate under the radar until recent events brought it into the spotlight.
What was the role of the malicious PDF files in the hacking campaign
The malicious PDF files played a crucial role in the Paragon spyware campaign targeting WhatsApp users:
Delivery Mechanism
The malicious PDFs served as the primary vector for delivering the spyware:
- WhatsApp reported that the attack utilized malicious PDF files sent to targets who were added to group chats13.
- These PDFs were designed to automatically download onto the recipient's device5.
Infection Process
Once downloaded, the malicious PDFs initiated the infection process:
- The PDFs contained embedded malicious links or code68.
- When users interacted with the PDF, it triggered a multi-stage process leading to the installation of spyware6.
Spyware Capabilities
After successful infection, the spyware (known as Graphite) provided extensive access to the compromised device:
- The operator could access the phone completely, including reading messages sent via encrypted applications like WhatsApp and Signal3.
- This allowed for potential data theft, surveillance, and other malicious activities11.
Evasion Techniques
The use of PDFs as an attack vector helped the campaign evade detection:
- PDFs are commonly used for legitimate purposes, making them less suspicious10.
- The attack exploited the trust users place in PDF documents, especially when received through seemingly trusted group chats5.
By leveraging malicious PDFs, Paragon was able to target approximately 90 users, including journalists and members of civil society, in a sophisticated and hard-to-detect spyware campaign135.
Citations:
[1] https://therecord.media/paragon-bought-private-equity-american
[2] https://newsinterpretation.com/the-500-million-secret-inside-the-paragon-deal/
[3] https://www.theverge.com/news/604100/whatsapp-meta-spyware-paragon-solutions
[4] https://www.devdiscourse.com/article/technology/3247636-whatsapp-vs-paragon-spyware-showdown-unfolds
[5] https://www.hpbl.co.in/news/whatsapp-targets-israeli-spyware-firm-paragon-solutions-for-hacking-effort-on-journalists-and-activists/
[6] https://techcrunch.com/2024/12/16/israeli-spyware-maker-paragon-bought-by-u-s-private-equity-giant/
[7] https://timesofindia.indiatimes.com/technology/tech-news/whatsapp-says-its-users-targeted-by-israeli-spyware-read-companys-response/articleshow/117796050.cms
[8] https://tribune.com.pk/story/2525771/whatsapp-says-israeli-spyware-firm-targeted-journalists-and-activists
[9] https://mexicobusiness.news/cybersecurity/news/us-government-expands-spyware-use-amid-growing-privacy-concerns
[10] https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/
[11] https://www.thirdway.org/memo/what-is-spyware-and-why-should-policymakers-care
[12] https://cdt.org/insights/dhs-must-come-clean-on-contract-with-spyware-purveyor-paragon-solutions/
[13] https://www.atlanticcouncil.org/in-depth-research-reports/report/mythical-beasts-and-where-to-find-them-mapping-the-global-spyware-market-and-its-threats-to-national-security-and-human-rights/
[14] https://www.mobileworldlive.com/big-tech/whatsapp-hit-by-spyware-attack/
[15] https://www.newyorker.com/news/news-desk/the-technology-the-trump-administration-could-use-to-hack-your-phone
[16] https://www.reddit.com/r/privacytoolsIO/comments/ouj2wr/meet_paragon_an_americanfunded_supersecretive/
[17] https://www.yahoo.com/news/whatsapp-says-paragon-spyware-used-164350400.html
[18] https://www.schneier.com/blog/archives/2023/06/paragon-solutions-spyware-graphite.html
[19] https://carnegieendowment.org/research/2023/03/why-does-the-global-spyware-industry-continue-to-thrive-trends-explanations-and-responses?lang=en¢er=global
[20] https://corrata.com/pegasus-predator-hermit-spyware-nso-and-its-clones/
[21] https://www.hrw.org/news/2024/10/17/us-immigration-agency-contract-spyware-company-poses-risk-rights
[22] https://www.aa.com.tr/en/americas/dozens-of-journalists-civil-society-members-targeted-by-israeli-spyware-in-whatsapp-hack/3468201
[23] https://www.aljazeera.com/news/2025/1/31/whatsapp-says-its-users-targeted-by-israeli-spyware-company-paragon
[24] https://www.bloomberg.com/news/articles/2025-01-31/whatsapp-says-paragon-spyware-used-to-try-hacking-journalists
[25] https://techcrunch.com/2025/01/31/whatsapp-says-it-disrupted-a-hacking-campaign-targeting-journalists-with-spyware/
[26] https://www.calcalistech.com/ctechnews/article/s1ucev64kg
[27] https://news.bloomberglaw.com/us-law-week/whatsapp-says-paragon-spyware-used-to-try-hacking-journalists
[28] https://www.middleeastmonitor.com/20250131-dozens-of-journalists-civil-society-members-targeted-by-israeli-spyware-in-whatsapp-hack/
[29] https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/