Israeli Spyware Firm Paragon Linked to WhatsApp Zero-Click Attack

WhatsApp has identified a spyware campaign targeting approximately 90 individuals, including journalists and civil society members, linked to the Israeli firm Paragon Solutions.

The attack, occurring in December 2024, exploited malicious PDF files distributed via WhatsApp groups, triggering a zero-click exploit that compromised devices without user interaction. WhatsApp has notified affected users, issued a cease-and-desist letter to Paragon, and is considering legal action. Paragon, acquired by AE Industrial Partners, has not responded to the allegations.

 

Expert Analysis:
Paragon claims to sell its spyware exclusively to “democratic and rule-of-law-abiding” governments, yet its tools are now implicated in attacks on journalists and civil society. The irony is striking but not surprising—spyware firms have long justified their existence under the guise of lawful surveillance, only to see their products weaponized against those exposing abuses of power. WhatsApp’s intervention may temporarily disrupt this campaign, but the reality remains: as long as commercial spyware operates in a legal gray zone, it will continue to be a tool of oppression, conveniently disguised as security.

 

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

Discord ID card breach

When Customer Support Becomes the Weakest Link: Lessons from the Discord Breach

How Businesses Can Protect Themselves From MatrixPDF Attacks

MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments

Swiss e-ID and UAE Pass

Swiss e-ID vs UAE Pass: managing digital government identity