News: 1756844719

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Who watches the watchmen? Surveillanceware firms make bank, avoid oversight

(2025/09/02)


Governments can't get enough of hacking services to use against their citizens, despite their protestations that elements of the trade need sanctioning.

Only legitimate government agencies are supposed to use surveillanceware against criminal targets but governments and companies are widely abusing this, as we've [1]covered [2]many [3]times in the past. Legal surveillanceware companies have targeted activists, journalists, and even political figures, and there's also evidence that the vulns are leaking into the malware sphere.

An [4]analysis [PDF] of the industry by security operations center specialist Sekoia shows that surveillanceware vendors are seeing business grow in leaps and bounds and prices are going up to match.

[5]

For example, the report recounts that, in 2011, the Gamma Group - a British biz that was offering FinFisher spyware that was [6]first exposed by The Register to government agencies was charging €1,100 per infection. Four years later, the Italian vendor Hacking Team was offering similar attack code for €1 million for a full hacking service, but by 2022, an investigation into the Candiru spyware biz showed that it was charging €6 million for its surveillanceware-as-a-service operations.

[7]

[8]

"In addition to being very lucrative, documents of major leaders of the sector dating from 2011 to 2022 demonstrate that the price for spyware use is in a constant rise. This is partly due to the increased cost of acquiring vulnerabilities and exploits, but also to the important number of clients looking for spyware.

[9]WhatsApp warns of 'attack against specific targeted users'

[10]Microsoft, Google, Citizen Lab blow lid off zero-day bug-exploiting spyware sold to governments

[11]What a coincidence. Spyware makers, Russia's Cozy Bear seem to share same exploits

[12]US adds Euro spyware makers to export naughty list

The cost of critical bugs is certainly going up, both for [13]legitimate bug bounty programs and in the prices paid by surveillanceware buyers. While that's good news for flaw finders, it's driving up the amount companies are having to pay to locate critical vulnerabilities in their platforms.

At last month's Black Hat security conference in Las Vegas, Eric Escobar, red team leader at Sophos Advisory Services, told The Register that companies like Apple were now paying out up to $1 million for a critical, zero-click flaw in its operating systems and Tom Gallagher, head of the Microsoft Security Response Center, told us that Microsoft paid out $17 million last year to those that poked holes in its code.

Naturally, the tech industry isn't too happy about surveillanceware snooping on its customers and has launched legal action. Meta recently scored a [14]$168 million judgment against the Israeli NSO Group for hacking WhatsApp, although the courts took nearly five years to get a verdict in the case.

[15]

More worryingly, it seems that surveillanceware vendors’ techniques are bleeding into the criminal malware market. Researchers [16]spotted Russia’s Cozy Bear nation-state hacking group last year using surveillanceware flaws found in code from the NSO Group and others to attack Mongolia’s Cabinet and Ministry of Foreign Affairs.

Government (in)action

Governments too profess to be unhappy with the industry. In 2021, the US [17]sanctioned four companies - including the NSO Group - that were involved in surveillanceware, but this hasn't put them out of business internationally. Last year, 27 countries including the US signed up to the [18]Pall Mall Process , calling for better regulation of the industry. Unfortunately, some of the worst surveillanceware offenders are based in countries that signed up and some signatories are even users of the technology.

For example, Italy signed up to the Pall Mall Process, but in March, researchers at Citizen Lab at the University of Toronto [19]discovered that the Italian government was using Paragon surveillanceware to spy on up to 90 of its own nationals, including journalists and activists, via WhatsApp.

The Gulf Cooperation Council - a group including Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates - also signed up. But watchdogs have named these countries as serial abusers of surveillanceware.

Whether or not meaningful regulations come from this government activity, they would still have to be enforced, and the surveillanceware industry has proved adept at covering its tracks and staying below the radar.

[20]

Corporate renamings are commonplace as companies use resellers and shell firms to cover up activities, the report notes. For example, when French outfit Amesys was [21]caught selling surveillanceware to the Libyan regime, it split into two companies - Nexa Technologies, based in France, and Advanced Middle East Systems (AMESys) in Dubai - and retired the original brand.

So apparently governments are going to allow the industry to prosper with just a light touch of regulation. It seems that it's just too useful to stamp out.

"The absence of effective political and regulatory safeguards has left spyware targets more exposed than ever, as infection techniques have grown more covert and resilient," the report concludes. "Vendors now deploy a broader range of attack vectors, rely on stealthier command-and-control (C2) infrastructures, and exploit zero-day vulnerabilities with increasing frequency." ®

Get our [22]Tech Resources



[1] https://www.theregister.com/2022/07/27/us_congress_spyware_debate/

[2] https://www.theregister.com/2018/09/22/security_roundup_220918/

[3] https://www.theregister.com/2024/09/19/pegasus_spyware_met_police_complaint/

[4] https://regmedia.co.uk/2025/09/02/surveillanceware-report1.pdf

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aLdo9Uu3TLTJ2bCdtmELaAAAAEY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[6] https://www.theregister.com/2011/12/01/security_firms_compete_to_sell_snoopware_to_repressive_governments/

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aLdo9Uu3TLTJ2bCdtmELaAAAAEY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aLdo9Uu3TLTJ2bCdtmELaAAAAEY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[9] https://www.theregister.com/2025/09/01/infosec_in_brief/

[10] https://www.theregister.com/2021/07/16/microsoft_candiru_malware/

[11] https://www.theregister.com/2024/08/29/commercial_spyware_russia_mongolia/

[12] https://www.theregister.com/2023/07/18/us_sanctions_commercial_spyware/

[13] https://www.theregister.com/2025/08/24/bug_bounty_advice/

[14] https://www.theregister.com/2025/05/06/nso_group_meta_verdict/

[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aLdo9Uu3TLTJ2bCdtmELaAAAAEY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[16] https://www.theregister.com/2024/08/29/commercial_spyware_russia_mongolia/

[17] https://www.theregister.com/2021/12/15/magnitsky_act_nso_group/

[18] https://www.gov.uk/government/publications/the-pall-mall-process-declaration-tackling-proliferation-and-irresponsible-use-of-commercial-cyber-intrusion-capabilities/the-pall-mall-process-tackling-the-proliferation-and-irresponsible-use-of-commercial-cyber-intrusion-capabilities

[19] https://www.theregister.com/2025/03/21/paragon_spyx_hacked/

[20] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aLdo9Uu3TLTJ2bCdtmELaAAAAEY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[21] https://www.theregister.com/2015/08/06/arab_spring_commercial_spyware_industry/

[22] https://whitepapers.theregister.com/



I'll guess that all data slurped by these spyware companies is also nicely archived.

elDog

It would be a real pity if all that juicy traffic between state leaders (and 'friends', etc.) weren't kept for future lucrative ventures.

I doubt that non-disclosures mean much to these types.

A committee is a life form with six or more legs and no brain.
-- Lazarus Long, "Time Enough For Love"