Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Apple fixes bug used by police to extract deleted chat messages from iPhones

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

OpenAI partners with Infosys to bring AI tools to more businesses

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI partners with Infosys to bring AI tools to more businesses

    22 April 2026

    Unauthorized group gained access to Anthropic’s proprietary Mythos cyber tool, report claims

    22 April 2026

    NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

    21 April 2026

    It’s not just one thing – it’s another thing

    21 April 2026

    OpenAI takes aim at Anthropic with a boosted Codex that gives it more power on your desktop

    20 April 2026
  • Apps

    X makes it more expensive to publish links through its API

    22 April 2026

    Apple’s Cal AI crackdown signals it still controls the App Store

    22 April 2026

    GRAI believes that AI can make music more social, not replace artists

    21 April 2026

    WhatsApp is testing a premium subscription, but it’s mostly cosmetic

    21 April 2026

    Spotify is launching the ability to buy physical books in the US and the UK

    20 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash App targets a new type of customer: children aged 6 to 12 years

    22 April 2026

    Revolut eyes up to $200 billion valuation in potential IPO

    22 April 2026

    Once close enough for a takeover, Stripe and Airwallex are now going after each other

    18 April 2026

    Airwallex is set to take on Stripe and the rest of the payments industry — in the physical world

    16 April 2026

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026
  • Hardware

    Apple’s John Ternus will run one of the most powerful companies in the world. work is a minefield

    22 April 2026

    Tim Cook steps down as Apple CEO: Here’s a look at his 15-year legacy, from new products and services to China expansion

    22 April 2026

    Who is John Ternus, the new CEO of Apple?

    21 April 2026

    Tim Cook steps down as Apple CEO, while John Ternus takes over

    21 April 2026

    Amazon Unveils Slimmer Fire TV Stick HD, Opens Ember Artline TVs for Pre-Order

    16 April 2026
  • Media & Entertainment

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026

    Netflix plans to add a vertical video stream, use AI for recommendations

    17 April 2026

    Netflix co-founder and chairman Reed Hastings is stepping down from the board

    17 April 2026

    All we like is soulfulness

    16 April 2026
  • Security

    Apple fixes bug used by police to extract deleted chat messages from iPhones

    22 April 2026

    As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

    22 April 2026

    Ransomware dealer pleads guilty to helping ransomware gang

    21 April 2026

    App host Vercel says it was hacked and customer data stolen

    21 April 2026

    Mastodon says its flagship server has been hit by a DDoS attack

    20 April 2026
  • Startups

    Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

    22 April 2026

    AI research lab NeoCognition offers $40 million to build agents that learn like humans

    22 April 2026

    You’ve heard of hybrid cars. Now meet a hybrid cement plant.

    19 April 2026

    Loop raises $95 million to build supply chain artificial intelligence that predicts disruptions

    18 April 2026

    Sources: Runner in talks to raise $2B+ at $50B valuation as business grows

    18 April 2026
  • Transportation

    Redwood Materials lays off 10% in restructuring to pursue energy storage business

    22 April 2026

    Amazon taps Sweden’s Einride for its electric big rigs

    21 April 2026

    The Rivian factory was hit by a tornado before the R2 was released

    20 April 2026

    TechCrunch Mobility: Uber enters the era of assetmaxxing

    20 April 2026

    Uber will now collect your returns from your doorstep

    17 April 2026
  • Venture

    Anthropic rejects VC funding that values ​​it at $800B+, for now

    16 April 2026

    Financial risk management platform Pillar raises $20 million in rounds led by a16z

    15 April 2026

    Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

    14 April 2026

    Nvidia-backed SiFive hits $3.65 billion valuation for open AI chips

    11 April 2026

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»You have been targeted by government spyware. now what?
Security

You have been targeted by government spyware. now what?

techtost.comBy techtost.com29 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
You Have Been Targeted By Government Spyware. Now What?
Share
Facebook Twitter LinkedIn Pinterest Email

It was a normal day when Jay Gibson received an unexpected notification on his iPhone. “Apple has detected a targeted mercenary spyware attack against your iPhone,” the message read.

Ironically, Gibson worked for companies that developed exactly the kind of spyware that could trigger such an alert. However, he was shocked to receive a notification on his own phone. He called his father, hung up and left his phone and went to buy a new one.

“I was panicking,” he told TechCrunch. “It was a mess. It was a huge mess.”

Gibson is just one of an ever-growing number of people receiving notices from companies like Apple, Googleand WhatsAppall of which send similar warnings about spyware attacks to their users. Technology companies are increasingly proactive in alerting their users when they are targeted by government hackers, particularly those using spyware made by companies such as Intellexa, NSO Group and Paragon Solutions.

But while Apple, Google and WhatsApp are alerting, they’re not involved in what happens next. Tech companies direct their users to people who might be able to help, but at that point the companies walk away.

This is when you get one of these warnings.

Warning

You have received a notification that you have been targeted by government hackers. now what?

First of all, take it seriously. These companies have reams of telemetry data about their users and what’s happening both on their devices and in their online accounts. These tech giants have security teams that have been hunting, studying and analyzing this type of malicious activity for years. If they think you’ve been targeted, they’re probably right.

It’s important to note that in the case of Apple and WhatsApp notifications, receiving notifications doesn’t necessarily mean you’ve been hacked. It’s possible that the intrusion attempt failed, but they can tell you that someone did.

A photo showing the text of a threat alert sent by Apple to a suspected spyware victim (Image: Omar Marques/Getty Images)

In Google’s case, it’s very likely that the company is blocking the attack and telling you so you can go to your account and make sure you’ve enabled multi-factor authentication (ideally a natural security key or password), and also activate it Advanced Protection Programwhich also requires a security key and adds additional layers of security to your Google Account. In other words, Google will tell you how to better protect yourself in the future.

In the Apple ecosystem, you should activate Lock functionwhich enables a number of security features that make it harder for hackers to target your Apple devices. Apple has long claimed that it has never seen a successful hack against a user with Lockdown enabled, but no system is perfect.

Mohammed Al-Maskati, director of Access Now’s Digital Security Helpline, a 24/7 global team of security experts that investigates spyware cases against members of civil society, shared with TechCrunch the helpline’s advice to people who are concerned they may be targeted by government spyware.

This advice includes keeping your devices’ operating systems and apps up to date. Apple activation Lock functionand Google Advanced Protection for accounts and for Android devices; be careful with suspicious links and attachments. to reboot your phone regularly. and pay attention to changes in the way your device works.

Contact us

Have you received a notification from Apple, Google or WhatsApp about spyware targeting? Or do you have information about spyware manufacturers? We would love to hear from you. From a non-working device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 or via Telegram and Keybase @lorenzofb or via email.

Reaching out for help

What happens next depends on who you are.

There are open source and downloadable tools that anyone can use to detect suspected spyware attacks on their devices, which requires little technical knowledge. You can use it Mobile Verification Toolkitor MVT, a tool that allows you to look for forensic traces of an attack yourself, perhaps as a first step before seeking help.

If you don’t want to or can’t use MVT, you can go straight to someone who can help. If you are a journalist, dissident, academic or human rights activist, there are a few organizations that can help.

You can contact Access now also to the Digital Security Helpline. You can also contact Amnesty International, which has its own team of researchers and plenty of experience in these cases. Or, you can reach out to The Citizen Laba digital rights group at the University of Toronto that has been investigating spyware abuses for nearly 15 years.

If you are a journalist, Reporters Without Borders it also has a digital security lab that offers to investigate suspected cases of hacking and surveillance.

Apart from these categories of people, politicians or business executives, for example, will have to go elsewhere.

If you work for a large corporation or political party, you probably have a competent (hopefully!) security team that you can go straight to. They may not have the specific knowledge to investigate in depth, but in this case they probably know who to turn to, even if Access Now, Amnesty and Citizen Lab can’t help those outside civil society.

Otherwise, there aren’t many places you can turn to executives or politicians, but we asked around and found the following. We can’t fully vouch for any of these organizations, nor do we directly endorse them, but based on the recommendations of people we trust, they’re worth highlighting.

Perhaps the best known of these private security companies is iVerifywhich creates an app for Android and iOS and also gives users the option to request an in-depth forensic investigation.

Matt Mitchell, a well-recognized security expert that helps vulnerable populations protect themselves from surveillance has a new startup, called Safety Sync Groupthat offers this kind of service.

Jessica Hyde, a forensic pathologist with experience in the public and private sectors, has her own startup called Exorcismand offers to investigate suspected violations.

Mobile cybersecurity company Lookout, which has experience analyzing government spyware from around the world, has an online form which allows people to seek help investigating cyber-attacks that include malware, device compromise and more. The company’s threat intelligence and forensics teams may then become involved.

Then there is Costin Raiu, who is in charge TLPBLACKa small group of security researchers working in Kaspersky’s Global Research and Analysis Group, or GReAT. Raiu was the head of the unit when his team discovered sophisticated cyberattacks by elite government hacking groups from the United States, Russia, Iran and other countries. Raiu told TechCrunch that those who suspect they have been hacked can email him directly.

Research

What happens next depends on who you go to for help.

In general, the organization you contact may want to do an initial forensic check by looking at a diagnostics report file that you can create on your device that you can share with remote investigators. At this point, this does not require you to hand over your device to anyone.

This first step may be able to detect signs of targeting or even infection. It may also turn out to be nothing. In either case, investigators may want to dig deeper, which will require you to send a full backup of your device or even your actual device. At that point, the investigators will do their work, which can take time because modern government spyware attempts to hide and erase its tracks, and tell you what happened.

Unfortunately, modern spyware can leave no traces. The modus operandi these days, according to Hassan Selmi, who leads the incident response team at Access Now’s Digital Security Helpline, is a “break and grab” strategy, meaning that once the spyware infects the target device, it steals as much data as it can and then tries to remove any traces and uninstall itself. This is taken for granted that spyware manufacturers are trying to protect their product and hide its activity from researchers and researchers.

If you are a journalist, dissident, academic, human rights activist, the groups helping you may ask you if you want to go public with the fact that you were attacked, but you are not required to do so. They will be happy to help you without taking public credit for it. However, there may be good reasons for opting out: To report being targeted by a government, which may have the side effect of warning others like you about the dangers of spyware. or expose a spyware company by showing that their customers are abusing their technology.

We hope you never receive any of these notifications. But we also hope that if you do, you’ll find this guide useful. Stay safe out there.

AccessNow Amnesty International Citizen Lab government Intellexa malware NSO team Paragon Solutions privacy Spyware surveillance targeted
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Top 33 Health and Wellness Startups from the Disrupt Startup Battlefield
Next Article How to use new ChatGPT app integrations including DoorDash, Spotify, Uber and more
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Apple fixes bug used by police to extract deleted chat messages from iPhones

22 April 2026

As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

22 April 2026

Ransomware dealer pleads guilty to helping ransomware gang

21 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Apple fixes bug used by police to extract deleted chat messages from iPhones

22 April 2026

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

22 April 2026

OpenAI partners with Infosys to bring AI tools to more businesses

22 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash App targets a new type of customer: children aged 6 to 12 years

22 April 2026

Revolut eyes up to $200 billion valuation in potential IPO

22 April 2026

Once close enough for a takeover, Stripe and Airwallex are now going after each other

18 April 2026
Startups

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

AI research lab NeoCognition offers $40 million to build agents that learn like humans

You’ve heard of hybrid cars. Now meet a hybrid cement plant.

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.