Israeli Spyware ‘Graphite’ Exploits WhatsApp: 0-Click Attack Uncovered

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Forensic Analysis Confirms Spyware Presence in Italy
Italy became a central focus of the investigation after forensic analysis of Android devices revealed the presence of Graphite spyware. Victims included journalist Francesco Cancellato and Mediterranea Saving Humans co-founders Luca Casarini and Dr. Giuseppe Caccia.
Citizen Lab researchers discovered a unique forensic artifact named BIGPRETZEL, which served as a key indicator of Graphite infections. Initially, the Italian government denied involvement but later admitted to having contracts with Paragon Solutions, raising further questions about how and why this spyware was deployed.
Apple and Meta Respond to Security Breach
In addition to WhatsApp users, an iPhone belonging to David Yambio, an associate of previously identified spyware victims, was also targeted. Apple threat notifications and forensic analysis revealed an attempted infection using an undisclosed spyware variant, later patched in iOS 18.
Following Citizen Lab’s report, Meta, Apple, and Google coordinated efforts to mitigate the threat. WhatsApp issued a server-side fix to block the exploit without requiring users to update their apps. Apple also released a security patch to safeguard iPhone users from potential attacks. WhatsApp directly notified affected users, warning:
“If we believe that your device has come under threat, we may notify you about it directly via a WhatsApp chat.”
Trending: Major Cyber Attacks that shaped 2024
Ongoing Spyware Threats: NSO Group’s Shadow Looms
This is not the first time an Israeli cybersecurity firm has exploited WhatsApp vulnerabilities. In a previous lawsuit, Meta successfully held NSO Group legally accountable for using its Pegasus spyware to target over 1,400 devices belonging to journalists, activists, and government officials.
Despite this legal setback, NSO Group continued developing new malware based on WhatsApp vulnerabilities. Reports from CyberScoop in November 2024 revealed that NSO Group used an exploit named “Eden,” and after it was disabled, they pivoted to a new attack vector called “Erised,” which remained active until May 2020.
Citizen Lab’s findings reinforce a troubling pattern: Israeli spyware firms persistently exploit WhatsApp vulnerabilities to surveil high-profile individuals, posing a constant threat to digital privacy.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: hackread.com