New Delhi: A little-known spyware company, Intellexa, is now competing with developer Pegasus NSO Group, offering its services to hack Android and iOS devices for $8 million (about Rs 64 crore).
“Documents leaked online show purchase (and documentation) of $8,000,000 zero-day iOS remote code execution exploit,” he tweeted.
The offer includes 10 infections for iOS and Android devices, as well as a “magazine of 100 successful infections”.
According to Security Week, the documents, “labeled as proprietary and confidential”, revealed that the exploits should work on iOS 15.4.1 and the latest Android 12 update.
Apple released iOS 15.4.1 in March, which suggests the offering is recent.
“Specifically, the offering is intended for one-click browser-based remote exploits that allow users to inject a payload into Android or iOS mobile devices,” the report states.
Intellexa is based in Europe, with six R&D sites and laboratories across the continent.
“We help law enforcement and intelligence agencies around the world bridge the digital divide with multiple and diverse solutions, all integrated with our unique and best-in-class Nebula platform,” the company said. on its website.
Last year, a Citizen Lab report mentioned Intellexa, about Cytrox’s predatory iPhone spyware used to target a Greek lawmaker.
Citizen Lab said Cytrox is part of the Intellexa Alliance, described as “a marketing label for a range of mercenary surveillance vendors that emerged in 2019”.
Apple filed a lawsuit last year against NSO Group to ban the company from using its services and devices.
As state-sponsored cyberattacks with government spyware like Pegasus grow, Apple is bringing Lockdown Mode this fall with iOS 16, iPadOS 16, and macOS Ventura.
This mode provides specialized additional protection for high-level users who may be exposed to highly targeted attacks from private companies developing state-sponsored mercenary spyware.
In India, the Pegasus panel said this week that the presence of the controversial Israeli spyware Pegasus had not been conclusively established in 29 cellphones it examined, and the government did not cooperate with the investigation.
The court-appointed top panel said five out of 29 cellphones may have been infected with malware, but that doesn’t mean it was Pegasus spyware.