Israeli spyware firm Paragon accused of hacking WhatsApp users

WhatsApp has identified an advanced hacking campaign targeting nearly 90 users across more than two dozen countries. The attack, linked to Israeli spyware firm Paragon Solutions, exploited a zero-click vulnerability, meaning victims’ devices were compromised without them needing to interact with any malicious files. The messaging platform, owned by Meta, has since taken steps to block the hacking attempts and has issued a cease-and-desist letter to Paragon.

While WhatsApp has not disclosed the identities of those targeted, reports indicate that journalists and members of civil society were among the victims. The company has referred affected users to Citizen Lab, a Canadian watchdog that investigates digital security threats. Law enforcement agencies and industry partners have also been alerted, though specifics remain undisclosed.

Paragon, which was recently acquired by US investment firm AE Industrial Partners, has not commented on the allegations. The company presents itself as a responsible player in the spyware industry, claiming to sell its technology only to governments in stable democracies. However, critics argue that the continued spread of surveillance tools increases the risk of human rights abuses, with spyware repeatedly found on the devices of activists, journalists, and officials worldwide.

Cybersecurity experts warn that the growing use of commercial spyware poses an ongoing threat to digital privacy. Despite claims of ethical safeguards, the latest revelations suggest that even companies with supposedly responsible practices may be engaging in questionable surveillance activities.

South African weather service hit by cyberattack, affecting critical operations

The South African Weather Service (SAWS) was hit by a cyberattack affecting its online services and limiting access to weather information relied upon by various sectors, including aviation and agriculture. According to an official statement, SAWS’ website has been offline since Sunday evening. As a temporary measure, the agency has been sharing weather updates through alternative channels, such as social media platforms.

SAWS attributed the disruption to a ‘security breach’ and confirmed that its Information and Communication Technology (ICT) systems were impacted. The organisation stated that efforts are underway to investigate the incident and restore affected services, with ICT specialists working on interim and long-term solutions.

Critical operations, including those supporting aviation and maritime operations, have been affected. SAWS advised the public to refer to its social media channels for updates and announced that the incident would be reported to law enforcement authorities. The agency noted that this was the second attempted cyberattack in two days, with an initial attempt on January 25, 2025, reportedly unsuccessful.

SAWS also provides meteorological data to neighboring countries, making the disruption regionally significant. As of Wednesday afternoon, the SAWS website remained offline.

While no group has claimed responsibility for the incident, South Africa has faced multiple cyberattacks targeting government institutions in recent years. In 2023, ransomware incidents affected the country’s pension fund, national health lab, and the Department of Justice and Constitutional Development of South Africa.

FBI and Europol target cybercrime networks in global crackdown

A global law enforcement operation has shut down a series of cybercrime websites used for selling stolen data, pirated software, and hacking tools. The FBI and Europol coordinated the takedown as part of ‘Operation Talent’, targeting platforms associated with Cracked, Nulled, StarkRDP, Sellix, and MySellix.

Seizure notices appeared on the affected websites, and officials confirmed that information on customers and victims had also been obtained. Europol stated that further details would be released within 24 hours, while the FBI has not yet commented on the operation.

Reports suggest that the targeted sites played various roles in the cybercrime ecosystem, facilitating the trade of stolen login credentials, compromised credit card details, and video game cheats. A message in a Cracked Telegram channel acknowledged the seizure, with administrators expressing uncertainty over the next steps.

Authorities continue to investigate, with the crackdown highlighting ongoing efforts to disrupt cybercriminal networks. More updates are expected as officials analyse the seized data and determine potential follow-up actions.

Binance faces new investigation in France over alleged crimes

French prosecutors have launched a new investigation into Binance, marking the second time authorities have scrutinised the crypto exchange. The probe includes allegations of drug trafficking, money laundering, and tax evasion, with possible additional charges yet to be disclosed. This follows an earlier inquiry in 2023 over suspected financial crimes linked to the platform.

Regulators worldwide have tightened their grip on cryptocurrency firms after the collapse of FTX and other high-profile failures. Binance has faced mounting legal challenges, including a record $4.3 billion settlement with US authorities. Despite leadership changes, including the resignation of founder Changpeng Zhao, the company remains under regulatory pressure.

As Binance navigates legal battles across multiple jurisdictions, its future in key markets remains uncertain. The latest investigation in France adds to the exchange’s ongoing struggles, reinforcing the global crackdown on crypto platforms accused of financial misconduct.

TRUMP meme coin hype fuels wave of crypto scams

The launch of the TRUMP meme coin has drawn massive attention, reaching a $72 billion market cap in just two days. The excitement has also unleashed a wave of fraudulent activity, with over 6,800 fake tokens and 91 malicious decentralised applications (dApps) flooding the market, according to blockchain forensic firm Blockaid.

Scammers capitalised on the hype surrounding TRUMP, creating counterfeit tokens and applications designed to mimic the original coin. The surge in fake assets, particularly on networks like Solana and Ethereum, has made it increasingly difficult for investors to distinguish legitimate tokens from malicious ones. The scheme extended to tokens referencing Trump family members, further complicating the situation.

Blockaid has worked to shield users from these threats, blocking hundreds of interactions with fake assets since the TRUMP token’s release. While cryptocurrency’s decentralised nature empowers users, it also provides opportunities for bad actors, underscoring the ongoing need for vigilance and robust scam prevention efforts.

Polish game developer hit by cyberattack demanding ransom

Big Cheese Studio, a game development studio based in Poland, confirmed it suffered a cyberattack early Friday, according to the Polish Press Agency (PAP). The attack occurred around 4:00 GMT, and the company’s website remained offline several hours later. Management stated that security measures were in place, with an official statement expected later in the day.

Reports indicate hackers accessed the studio’s game code systems and employee personal data. The attackers are allegedly demanding 100,000 zlotys (£19,000) in cryptocurrency to prevent the release of stolen information. Users on social media platform X brought attention to the ransom threat, sparking concerns over data privacy and security.

Big Cheese Studio, listed on the Warsaw Stock Exchange, is working to address the breach. The incident underscores growing risks faced by companies in the gaming industry from cyber threats.

Denmark warns of cyber threats to its water infrastructure

Denmark’s national Centre for Cybersecurity (Center for Cybersikkerhed, CCS) has identified a ‘very high’ risk of cyberattacks targeting the country’s water infrastructure following its first official assessment of threats to the sector.

According to CCS acting head Mark Fiedel, the water sector plays a vital role within Denmark’s critical infrastructure, highlighting the potential impacts of disruptions to drinking water supplies.

As an example of the risks faced by the sector, Fiedel noted an incident in December 2024 when hackers accessed a small water plant in Denmark, resulting in a temporary disruption of water services for approximately 50 households.

CCS classifies cyber threats into various categories, including cybercrime, which poses the significant risk to critical infrastructure. Ransomware attacks are among the identified threats, and in 2021, a water plant in Kalundborg reported a ransomware attack that briefly locked technicians out of IT systems.

Japan introduces active cyber defence bill to strengthen national security

Among the 59 bills to be introduced to the Japanese government’s review this year within next 150 days, the Active Cyber Defense Legislation stands out due to its importance for Japan’s national security.

This bill, presented to the Liberal Democratic Party (LDP) on January 16 and swiftly approved, is part of an effort to bolster Japan’s cybersecurity capabilities. We also earlier reported that Japan’s Liberal Democratic Party proposed an ‘active cyber defence’ system, allowing the government to collect telecom metadata to detect and prevent cyberattacks as part of broader national security reforms to strengthen the country’s cybersecurity capabilities.

The proposed legislation includes three main components: improving collaboration between the public and private sectors, allowing the government to access telecommunications data in cases of suspected cyberattacks, and enabling the neutralisation of attackers’ servers. Critical infrastructure sectors such as energy, transportation, and telecommunications would be required to report cyber incidents, with the government offering guidance on damage control and prevention.

The bill also grants the government the ability to monitor specific communications between Japan and foreign nations, but limits this to non-content data to address privacy concerns. In the event of a major cyberattack, the Self-Defense Forces (SDF) may be deployed to defend critical systems.

Although the bill has received widespread support, it faces legal challenges, particularly with regard to Japan’s constitutional protection of communication secrecy and its pacifist defense policies. Despite these concerns, public opinion remains favorable, with a recent poll showing 65% support for the legislation.

The government is moving forward with the proposal, aiming to enhance the protection of Japan’s critical infrastructure from increasing cyber risks. While the Japanese Communist Party opposes the bill, it has gained backing from major opposition parties, highlighting its broad political support.

New hacking group mimics Russia-linked group to target Russian entities, Chinese cybersecurity experts say

A hacking group, named as GamaCopy, has been imitating the tactics of the Russia-linked threat actor Gamaredon to target Russian-speaking victims, according to research by Chinese cybersecurity firm Knownsec.

GamaCopy’s latest campaign employed phishing documents disguised as reports on Russian armed forces’ locations in Ukraine, along with the open-source software UltraVNC for remote access.

However, while GamaCopy mirrors many techniques used by Gamaredon, researchers identified notable differences. For example, GamaCopy primarily uses Russian-language victims, whereas Gamaredon typically targets Ukrainian speakers. Additionally, GamaCopy’s use of UltraVNC represents a unique element in its attack chain.

Since June 2023, GamaCopy has targeted Russia’s defense and critical infrastructure sectors. However, the group is believed to have been active even earlier, i.e. since August 2021. Knownsec’s analysis suggests that GamaCopy’s operations are part of a deliberate false-flag campaign and links the group to another state-sponsored actor known as Core Werewolf, which has similarly targeted Russian defense systems since 2021.

This discovery follows recent reports of other hacker groups, conducting cyber-espionage campaigns against Russian entities, highlighting the increasing complexity and state-backed nature of these threats.