Intellexa, Manufacturer of Predator Spyware, Targeted in U.S. Crackdown

Published:

spot_img

U.S. Treasury Department Sanctions Intellexa Consortium for Spyware Technology

The U.S. Treasury Department has announced new sanctions against individuals and entities associated with the Intellexa Consortium for their involvement in the development and distribution of commercial spyware technology that poses a threat to national security. This action follows a previous sanction in March, which alleged that the consortium’s “Predator” spyware was used to target U.S. government officials, journalists, and policy experts.

The latest sanctions target key figures within the Intellexa organization, including Felix Bitzios, Andrea Nicola Constantino Hermes Gambazzi, Merom Harpaz, Panagiota Karaoli, Artemis Artemiou, and Aliada Group Inc. These individuals are now subject to asset freezes and restrictions on financial transactions.

Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence, Bradley T. Smith, emphasized that the U.S. will not tolerate the proliferation of technologies that threaten national security and undermine privacy and civil liberties. The State Department also reiterated its commitment to countering the misuse of surveillance technologies and promoting responsible development that aligns with human rights and democratic values.

The Predator spyware, described as highly invasive and capable of accessing all data on a target’s device without leaving traces, has raised concerns about potential abuses and the spread of commercial spyware to state-backed threat actors. The U.S. action comes in the wake of Russian state hackers deploying exploits similar to those used by Intellexa and NSO Group.

The global effort to address the misuse of spyware technology has also seen sanctions imposed on other companies like NSO, Candiru, Positive Technologies, and Computer Security Initiative Consultancy. Apple recently filed a motion to dismiss its lawsuit against NSO Group to protect vital security information.

spot_img

Related articles

Recent articles

Leaked iPhone Hacking Tool Hits Dark Web: Government Resource in the Hands of Cyber Criminals

Cybersecurity Alert: Hacking Toolkit Coruna Falls into Criminal Hands In a troubling development, security researchers have revealed that a sophisticated hacking toolkit, initially linked to...

149 DDoS Attacks Target 110 Organizations Across 16 Countries in Wake of Middle East Conflict

Surge in Hacktivist Activity Amid U.S.-Israel Military Actions Recent developments in cybersecurity have raised alarms among experts regarding a notable uptick in hacktivist operations. This...

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Mobile Banking Evolution: Access Your CIBIL Score Instantly

New Delhi | The digital banking landscape in India is evolving at an astonishing pace, significantly altering how customers interact with their financial institutions....