Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Google adds music-making capabilities to its Gemini app

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies

Nominations for the Startup Battlefield 200 are now open

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Great news for xAI: Grok is now very good at answering questions about Baldur’s Gate

    21 February 2026

    UAE’s G42 partners with Cerebra to deploy 8 exaflops of computers in India

    20 February 2026

    Why these startup CEOs don’t think AI will replace human roles

    20 February 2026

    Reliance unveils $110bn AI investment plan as India boosts tech ambitions

    19 February 2026

    Amazon Terminates Blue Jay Robotics Project After Less Than 6 Months

    19 February 2026
  • Apps

    Remember HQ? “Quiz Daddy” Scott Rogowsky is back with TextSavvy, a daily mobile game show

    21 February 2026

    As the browser war heats up, Chrome is adding new productivity features

    20 February 2026

    Google says its AI systems helped prevent Play Store malware in 2025

    20 February 2026

    Mastodon, a decentralized alternative to X, plans to target creators with new features

    19 February 2026

    Etsy sells used clothing marketplace Depop to eBay for $1.2 billion

    19 February 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    InScope raises $14.5M to solve financial reporting pain

    20 February 2026

    OpenAI deepens India push with Pine Labs fintech partnership

    19 February 2026

    Cash app adds payment links so you can get paid in DMs

    11 February 2026

    MrBeast’s company buys Gen Z fintech app Step

    9 February 2026

    Stripe Alumni Raise €30M Series A for Duna, Backed by Stripe and Adyen Executives

    5 February 2026
  • Hardware

    Joseph C Belden: Last Chance for Innovators to Earn Scaling Privileges

    20 February 2026

    At a critical time, Snap is losing a top spec executive

    20 February 2026

    Freeform Raises $67M Series B to Scale Laser AI Production

    19 February 2026

    India’s Sarvam wants to bring its AI models to phones, cars and smart glasses

    19 February 2026

    Google debuts $499 Pixel 10a

    18 February 2026
  • Media & Entertainment

    Google adds music-making capabilities to its Gemini app

    21 February 2026

    Disrupt 2026 Super Early Bird pricing expires in 1 week

    20 February 2026

    YouTube’s latest experiment brings its AI chat tool to TVs

    20 February 2026

    OpenAI, Reliance partner to add AI search to JioHotstar

    19 February 2026

    SeatGeek and Spotify are teaming up to offer concert ticket discounts within the music platform

    19 February 2026
  • Security

    Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies

    21 February 2026

    Cellebrite cut off Serbia citing misuse of its phone unlocking tools. Why not others?

    20 February 2026

    FBI says ATM ‘jackpot’ attacks on the rise, hackers net millions in stolen cash

    20 February 2026

    Sex toy maker Tenga says hacker stole customer information

    19 February 2026

    Hacker conference Def Con bans three people linked to Epstein

    19 February 2026
  • Startups

    Nominations for the Startup Battlefield 200 are now open

    21 February 2026

    The OpenAI mafia: 18 startups founded by graduates

    20 February 2026

    Nvidia deepens early-stage push into India’s AI startup ecosystem

    20 February 2026

    Kana emerges from stealth with $15M to build flexible AI agents for marketers

    19 February 2026

    A startup called Germ becomes the first private messenger to launch directly from Bluesky’s app

    19 February 2026
  • Transportation

    Lucid Motors is cutting 12% of its workforce as it pursues profitability

    21 February 2026

    New York puts the brakes on robotaxi expansion plan

    20 February 2026

    AI data center boom fuels Redwood’s energy storage business

    20 February 2026

    Tesla avoids 30-day suspension in California after removing ‘Autopilot’

    18 February 2026

    Ford turns to F1 and rewards the construction of a $30,000 electric truck

    18 February 2026
  • Venture

    Peak XV Raises $1.3B, Doubles In AI As Global India VC Competition Heats Up

    21 February 2026

    General Catalyst commits $5 billion to India over five years

    20 February 2026

    Reload wants to give your AI agents a shared memory

    20 February 2026

    This VC’s best advice for building a founding team

    19 February 2026

    SpendRule Raises $2M, Comes From Stealth To Help Hospitals Track Spending

    18 February 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»You have been targeted by government spyware. now what?
Security

You have been targeted by government spyware. now what?

techtost.comBy techtost.com29 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
You Have Been Targeted By Government Spyware. Now What?
Share
Facebook Twitter LinkedIn Pinterest Email

It was a normal day when Jay Gibson received an unexpected notification on his iPhone. “Apple has detected a targeted mercenary spyware attack against your iPhone,” the message read.

Ironically, Gibson worked for companies that developed exactly the kind of spyware that could trigger such an alert. However, he was shocked to receive a notification on his own phone. He called his father, hung up and left his phone and went to buy a new one.

“I was panicking,” he told TechCrunch. “It was a mess. It was a huge mess.”

Gibson is just one of an ever-growing number of people receiving notices from companies like Apple, Googleand WhatsAppall of which send similar warnings about spyware attacks to their users. Technology companies are increasingly proactive in alerting their users when they are targeted by government hackers, particularly those using spyware made by companies such as Intellexa, NSO Group and Paragon Solutions.

But while Apple, Google and WhatsApp are alerting, they’re not involved in what happens next. Tech companies direct their users to people who might be able to help, but at that point the companies walk away.

This is when you get one of these warnings.

Warning

You have received a notification that you have been targeted by government hackers. now what?

First of all, take it seriously. These companies have reams of telemetry data about their users and what’s happening both on their devices and in their online accounts. These tech giants have security teams that have been hunting, studying and analyzing this type of malicious activity for years. If they think you’ve been targeted, they’re probably right.

It’s important to note that in the case of Apple and WhatsApp notifications, receiving notifications doesn’t necessarily mean you’ve been hacked. It’s possible that the intrusion attempt failed, but they can tell you that someone did.

A photo showing the text of a threat alert sent by Apple to a suspected spyware victim (Image: Omar Marques/Getty Images)

In Google’s case, it’s very likely that the company is blocking the attack and telling you so you can go to your account and make sure you’ve enabled multi-factor authentication (ideally a natural security key or password), and also activate it Advanced Protection Programwhich also requires a security key and adds additional layers of security to your Google Account. In other words, Google will tell you how to better protect yourself in the future.

In the Apple ecosystem, you should activate Lock functionwhich enables a number of security features that make it harder for hackers to target your Apple devices. Apple has long claimed that it has never seen a successful hack against a user with Lockdown enabled, but no system is perfect.

Mohammed Al-Maskati, director of Access Now’s Digital Security Helpline, a 24/7 global team of security experts that investigates spyware cases against members of civil society, shared with TechCrunch the helpline’s advice to people who are concerned they may be targeted by government spyware.

This advice includes keeping your devices’ operating systems and apps up to date. Apple activation Lock functionand Google Advanced Protection for accounts and for Android devices; be careful with suspicious links and attachments. to reboot your phone regularly. and pay attention to changes in the way your device works.

Contact us

Have you received a notification from Apple, Google or WhatsApp about spyware targeting? Or do you have information about spyware manufacturers? We would love to hear from you. From a non-working device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 or via Telegram and Keybase @lorenzofb or via email.

Reaching out for help

What happens next depends on who you are.

There are open source and downloadable tools that anyone can use to detect suspected spyware attacks on their devices, which requires little technical knowledge. You can use it Mobile Verification Toolkitor MVT, a tool that allows you to look for forensic traces of an attack yourself, perhaps as a first step before seeking help.

If you don’t want to or can’t use MVT, you can go straight to someone who can help. If you are a journalist, dissident, academic or human rights activist, there are a few organizations that can help.

You can contact Access now also to the Digital Security Helpline. You can also contact Amnesty International, which has its own team of researchers and plenty of experience in these cases. Or, you can reach out to The Citizen Laba digital rights group at the University of Toronto that has been investigating spyware abuses for nearly 15 years.

If you are a journalist, Reporters Without Borders it also has a digital security lab that offers to investigate suspected cases of hacking and surveillance.

Apart from these categories of people, politicians or business executives, for example, will have to go elsewhere.

If you work for a large corporation or political party, you probably have a competent (hopefully!) security team that you can go straight to. They may not have the specific knowledge to investigate in depth, but in this case they probably know who to turn to, even if Access Now, Amnesty and Citizen Lab can’t help those outside civil society.

Otherwise, there aren’t many places you can turn to executives or politicians, but we asked around and found the following. We can’t fully vouch for any of these organizations, nor do we directly endorse them, but based on the recommendations of people we trust, they’re worth highlighting.

Perhaps the best known of these private security companies is iVerifywhich creates an app for Android and iOS and also gives users the option to request an in-depth forensic investigation.

Matt Mitchell, a well-recognized security expert that helps vulnerable populations protect themselves from surveillance has a new startup, called Safety Sync Groupthat offers this kind of service.

Jessica Hyde, a forensic pathologist with experience in the public and private sectors, has her own startup called Exorcismand offers to investigate suspected violations.

Mobile cybersecurity company Lookout, which has experience analyzing government spyware from around the world, has an online form which allows people to seek help investigating cyber-attacks that include malware, device compromise and more. The company’s threat intelligence and forensics teams may then become involved.

Then there is Costin Raiu, who is in charge TLPBLACKa small group of security researchers working in Kaspersky’s Global Research and Analysis Group, or GReAT. Raiu was the head of the unit when his team discovered sophisticated cyberattacks by elite government hacking groups from the United States, Russia, Iran and other countries. Raiu told TechCrunch that those who suspect they have been hacked can email him directly.

Research

What happens next depends on who you go to for help.

In general, the organization you contact may want to do an initial forensic check by looking at a diagnostics report file that you can create on your device that you can share with remote investigators. At this point, this does not require you to hand over your device to anyone.

This first step may be able to detect signs of targeting or even infection. It may also turn out to be nothing. In either case, investigators may want to dig deeper, which will require you to send a full backup of your device or even your actual device. At that point, the investigators will do their work, which can take time because modern government spyware attempts to hide and erase its tracks, and tell you what happened.

Unfortunately, modern spyware can leave no traces. The modus operandi these days, according to Hassan Selmi, who leads the incident response team at Access Now’s Digital Security Helpline, is a “break and grab” strategy, meaning that once the spyware infects the target device, it steals as much data as it can and then tries to remove any traces and uninstall itself. This is taken for granted that spyware manufacturers are trying to protect their product and hide its activity from researchers and researchers.

If you are a journalist, dissident, academic, human rights activist, the groups helping you may ask you if you want to go public with the fact that you were attacked, but you are not required to do so. They will be happy to help you without taking public credit for it. However, there may be good reasons for opting out: To report being targeted by a government, which may have the side effect of warning others like you about the dangers of spyware. or expose a spyware company by showing that their customers are abusing their technology.

We hope you never receive any of these notifications. But we also hope that if you do, you’ll find this guide useful. Stay safe out there.

AccessNow Amnesty International Citizen Lab government Intellexa malware NSO team Paragon Solutions privacy Spyware surveillance targeted
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Top 33 Health and Wellness Startups from the Disrupt Startup Battlefield
Next Article How to use new ChatGPT app integrations including DoorDash, Spotify, Uber and more
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies

21 February 2026

Cellebrite cut off Serbia citing misuse of its phone unlocking tools. Why not others?

20 February 2026

FBI says ATM ‘jackpot’ attacks on the rise, hackers net millions in stolen cash

20 February 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Google adds music-making capabilities to its Gemini app

21 February 2026

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies

21 February 2026

Nominations for the Startup Battlefield 200 are now open

21 February 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

InScope raises $14.5M to solve financial reporting pain

20 February 2026

OpenAI deepens India push with Pine Labs fintech partnership

19 February 2026

Cash app adds payment links so you can get paid in DMs

11 February 2026
Startups

Nominations for the Startup Battlefield 200 are now open

The OpenAI mafia: 18 startups founded by graduates

Nvidia deepens early-stage push into India’s AI startup ecosystem

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.