Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Exaforce Raises $125M Series B to Build AI to Catch and Stop Cyberattacks as They Happen

Potholes are costing cities millions: This company uses artificial intelligence and trucks to fix them

Anthropic warns investors against secondary platforms offering access to its shares

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Medicare’s new payment model is designed for artificial intelligence, and most of the tech world has no idea

    13 May 2026

    Dessn raises $6 million for production-focused design tool

    12 May 2026

    Riding on an AI rally, Robinhood is preparing its second retail IPO

    12 May 2026

    There aren’t enough rockets for space data centers. Cowboy Space raised $275 million to build them.

    11 May 2026

    We’re feeling cynical about xAI’s big deal with Anthropic

    11 May 2026
  • Apps

    Everything Google announced at its Android Expo, from Googlebooks to vibe-encoded widgets

    13 May 2026

    TikTok now wants to be the place where you book that trip you just saw on TikTok

    12 May 2026

    Discord Launches Nitro Rewards, Giving Subscribers Access to Xbox Game Pass Base Level at No Extra Cost

    11 May 2026

    Etsy launches its ChatGPT app as it continues its AI push

    10 May 2026

    Tinder Match Group owner slows hiring to pay for increased use of AI tools

    10 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026
  • Hardware

    Google unveils Googlebook, a new line of laptops with native artificial intelligence

    13 May 2026

    The Instax Wide 400 takes the simplicity of instant photography and expands it, literally

    10 May 2026

    Google Unveils Fitbit Air Without Whoop-like Display

    8 May 2026

    Google’s $9.99 per month AI health plan launches on May 19

    8 May 2026

    Apple to pay $250 million to settle lawsuit over Siri’s lagging AI features

    7 May 2026
  • Media & Entertainment

    Digg is trying again, this time as an AI news aggregator

    12 May 2026

    Bravo creates unscripted mini-dramas for the Peacock app

    11 May 2026

    The hottest place for startups to strike a deal? The F1 mantra

    10 May 2026

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026

    Roku’s $3 streaming service Howdy hits 1 million subscribers, per recent report

    29 April 2026
  • Security

    Exaforce Raises $125M Series B to Build AI to Catch and Stop Cyberattacks as They Happen

    13 May 2026

    Google launches new Android security feature to help uncover spyware attacks

    12 May 2026

    US healthcare marketplaces shared citizenship and race data with ad tech giants

    11 May 2026

    Some kids bypass age verification checks with a fake moustache

    10 May 2026

    Police arrest crew that sent malicious messages to thousands across Toronto

    10 May 2026
  • Startups

    Korea’s biggest manufacturers support Config, TSMC robot data

    11 May 2026

    China’s Moonshot AI Raises $2B in $20B Valuation as Demand for Open Source AI Soars

    10 May 2026

    Could Lovable’s automatic 10% pay rise be the cure for toxic cultures?

    9 May 2026

    Gusto hits $1 billion in revenue, moves closer to public markets

    9 May 2026

    Learn what it takes to raise a Series A in 2027 at Disrupt 2026

    8 May 2026
  • Transportation

    Potholes are costing cities millions: This company uses artificial intelligence and trucks to fix them

    13 May 2026

    Waymo issues recall to address a flooding issue

    12 May 2026

    GM just laid off hundreds of IT workers to hire people with stronger AI skills

    12 May 2026

    TechCrunch Mobility: Lime’s IPO bet

    11 May 2026

    Uber always wanted to be more than a ride. now he has reason to hurry

    11 May 2026
  • Venture

    Anthropic warns investors against secondary platforms offering access to its shares

    13 May 2026

    Mother Ventures looks at moms as the ‘economic engine’

    9 May 2026

    2 days left: Get 50% off a second Disrupt 2026 pass

    7 May 2026

    All your M&A questions will be answered at Disrupt 2026

    6 May 2026

    ElevenLabs lists BlackRock, Jamie Foxx and Eva Longoria as new investors

    6 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»You have been targeted by government spyware. now what?
Security

You have been targeted by government spyware. now what?

techtost.comBy techtost.com29 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
You Have Been Targeted By Government Spyware. Now What?
Share
Facebook Twitter LinkedIn Pinterest Email

It was a normal day when Jay Gibson received an unexpected notification on his iPhone. “Apple has detected a targeted mercenary spyware attack against your iPhone,” the message read.

Ironically, Gibson worked for companies that developed exactly the kind of spyware that could trigger such an alert. However, he was shocked to receive a notification on his own phone. He called his father, hung up and left his phone and went to buy a new one.

“I was panicking,” he told TechCrunch. “It was a mess. It was a huge mess.”

Gibson is just one of an ever-growing number of people receiving notices from companies like Apple, Googleand WhatsAppall of which send similar warnings about spyware attacks to their users. Technology companies are increasingly proactive in alerting their users when they are targeted by government hackers, particularly those using spyware made by companies such as Intellexa, NSO Group and Paragon Solutions.

But while Apple, Google and WhatsApp are alerting, they’re not involved in what happens next. Tech companies direct their users to people who might be able to help, but at that point the companies walk away.

This is when you get one of these warnings.

Warning

You have received a notification that you have been targeted by government hackers. now what?

First of all, take it seriously. These companies have reams of telemetry data about their users and what’s happening both on their devices and in their online accounts. These tech giants have security teams that have been hunting, studying and analyzing this type of malicious activity for years. If they think you’ve been targeted, they’re probably right.

It’s important to note that in the case of Apple and WhatsApp notifications, receiving notifications doesn’t necessarily mean you’ve been hacked. It’s possible that the intrusion attempt failed, but they can tell you that someone did.

A photo showing the text of a threat alert sent by Apple to a suspected spyware victim (Image: Omar Marques/Getty Images)

In Google’s case, it’s very likely that the company is blocking the attack and telling you so you can go to your account and make sure you’ve enabled multi-factor authentication (ideally a natural security key or password), and also activate it Advanced Protection Programwhich also requires a security key and adds additional layers of security to your Google Account. In other words, Google will tell you how to better protect yourself in the future.

In the Apple ecosystem, you should activate Lock functionwhich enables a number of security features that make it harder for hackers to target your Apple devices. Apple has long claimed that it has never seen a successful hack against a user with Lockdown enabled, but no system is perfect.

Mohammed Al-Maskati, director of Access Now’s Digital Security Helpline, a 24/7 global team of security experts that investigates spyware cases against members of civil society, shared with TechCrunch the helpline’s advice to people who are concerned they may be targeted by government spyware.

This advice includes keeping your devices’ operating systems and apps up to date. Apple activation Lock functionand Google Advanced Protection for accounts and for Android devices; be careful with suspicious links and attachments. to reboot your phone regularly. and pay attention to changes in the way your device works.

Contact us

Have you received a notification from Apple, Google or WhatsApp about spyware targeting? Or do you have information about spyware manufacturers? We would love to hear from you. From a non-working device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 or via Telegram and Keybase @lorenzofb or via email.

Reaching out for help

What happens next depends on who you are.

There are open source and downloadable tools that anyone can use to detect suspected spyware attacks on their devices, which requires little technical knowledge. You can use it Mobile Verification Toolkitor MVT, a tool that allows you to look for forensic traces of an attack yourself, perhaps as a first step before seeking help.

If you don’t want to or can’t use MVT, you can go straight to someone who can help. If you are a journalist, dissident, academic or human rights activist, there are a few organizations that can help.

You can contact Access now also to the Digital Security Helpline. You can also contact Amnesty International, which has its own team of researchers and plenty of experience in these cases. Or, you can reach out to The Citizen Laba digital rights group at the University of Toronto that has been investigating spyware abuses for nearly 15 years.

If you are a journalist, Reporters Without Borders it also has a digital security lab that offers to investigate suspected cases of hacking and surveillance.

Apart from these categories of people, politicians or business executives, for example, will have to go elsewhere.

If you work for a large corporation or political party, you probably have a competent (hopefully!) security team that you can go straight to. They may not have the specific knowledge to investigate in depth, but in this case they probably know who to turn to, even if Access Now, Amnesty and Citizen Lab can’t help those outside civil society.

Otherwise, there aren’t many places you can turn to executives or politicians, but we asked around and found the following. We can’t fully vouch for any of these organizations, nor do we directly endorse them, but based on the recommendations of people we trust, they’re worth highlighting.

Perhaps the best known of these private security companies is iVerifywhich creates an app for Android and iOS and also gives users the option to request an in-depth forensic investigation.

Matt Mitchell, a well-recognized security expert that helps vulnerable populations protect themselves from surveillance has a new startup, called Safety Sync Groupthat offers this kind of service.

Jessica Hyde, a forensic pathologist with experience in the public and private sectors, has her own startup called Exorcismand offers to investigate suspected violations.

Mobile cybersecurity company Lookout, which has experience analyzing government spyware from around the world, has an online form which allows people to seek help investigating cyber-attacks that include malware, device compromise and more. The company’s threat intelligence and forensics teams may then become involved.

Then there is Costin Raiu, who is in charge TLPBLACKa small group of security researchers working in Kaspersky’s Global Research and Analysis Group, or GReAT. Raiu was the head of the unit when his team discovered sophisticated cyberattacks by elite government hacking groups from the United States, Russia, Iran and other countries. Raiu told TechCrunch that those who suspect they have been hacked can email him directly.

Research

What happens next depends on who you go to for help.

In general, the organization you contact may want to do an initial forensic check by looking at a diagnostics report file that you can create on your device that you can share with remote investigators. At this point, this does not require you to hand over your device to anyone.

This first step may be able to detect signs of targeting or even infection. It may also turn out to be nothing. In either case, investigators may want to dig deeper, which will require you to send a full backup of your device or even your actual device. At that point, the investigators will do their work, which can take time because modern government spyware attempts to hide and erase its tracks, and tell you what happened.

Unfortunately, modern spyware can leave no traces. The modus operandi these days, according to Hassan Selmi, who leads the incident response team at Access Now’s Digital Security Helpline, is a “break and grab” strategy, meaning that once the spyware infects the target device, it steals as much data as it can and then tries to remove any traces and uninstall itself. This is taken for granted that spyware manufacturers are trying to protect their product and hide its activity from researchers and researchers.

If you are a journalist, dissident, academic, human rights activist, the groups helping you may ask you if you want to go public with the fact that you were attacked, but you are not required to do so. They will be happy to help you without taking public credit for it. However, there may be good reasons for opting out: To report being targeted by a government, which may have the side effect of warning others like you about the dangers of spyware. or expose a spyware company by showing that their customers are abusing their technology.

We hope you never receive any of these notifications. But we also hope that if you do, you’ll find this guide useful. Stay safe out there.

AccessNow Amnesty International Citizen Lab government Intellexa malware NSO team Paragon Solutions privacy Spyware surveillance targeted
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Top 33 Health and Wellness Startups from the Disrupt Startup Battlefield
Next Article How to use new ChatGPT app integrations including DoorDash, Spotify, Uber and more
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Exaforce Raises $125M Series B to Build AI to Catch and Stop Cyberattacks as They Happen

13 May 2026

Google launches new Android security feature to help uncover spyware attacks

12 May 2026

US healthcare marketplaces shared citizenship and race data with ad tech giants

11 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Exaforce Raises $125M Series B to Build AI to Catch and Stop Cyberattacks as They Happen

13 May 2026

Potholes are costing cities millions: This company uses artificial intelligence and trucks to fix them

13 May 2026

Anthropic warns investors against secondary platforms offering access to its shares

13 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026

Fintech startup Parker files for bankruptcy

10 May 2026

Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

7 May 2026
Startups

Korea’s biggest manufacturers support Config, TSMC robot data

China’s Moonshot AI Raises $2B in $20B Valuation as Demand for Open Source AI Soars

Could Lovable’s automatic 10% pay rise be the cure for toxic cultures?

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.