Graphite Caught: First Forensic Confirmation of Paragon's iOS Mercenary Spyware Finds Journalists Targeted

Medium
Published: Thu Jun 12 2025 (06/12/2025, 22:00:29 UTC)
Source: AlienVault OTX General

Description

An investigation reveals that two journalists were targeted with Paragon's Graphite mercenary spyware on iOS devices. Forensic analysis confirmed the use of a zero-click attack exploiting a vulnerability (CVE-2025-43200) in iOS 18.2.1. The same attacker targeted both victims, suggesting a coordinated effort against media professionals. The spyware was linked to a specific server and iMessage account. This discovery is part of a broader pattern of spyware use against European journalists, raising concerns about press freedom and digital security. The Italian government acknowledged using Graphite in some cases but denied involvement in targeting certain journalists. The incident highlights the ongoing threat of mercenary spyware to civil society and the need for greater accountability.

AI-Powered Analysis

AILast updated: 06/13/2025, 08:50:20 UTC

Technical Analysis

The threat involves Paragon's Graphite mercenary spyware targeting iOS devices, specifically exploiting a zero-click vulnerability identified as CVE-2025-43200 in iOS version 18.2.1. This vulnerability allows attackers to compromise devices without any user interaction, leveraging a flaw in the iMessage protocol or related components to silently install spyware. The forensic investigation confirmed that two journalists were targeted, indicating a coordinated campaign against media professionals. The spyware communicates with a specific command-and-control server (IP 46.183.184.91) and is linked to a particular iMessage account, suggesting a sophisticated and targeted attack infrastructure. The Italian government has acknowledged limited use of Graphite spyware but denies involvement in targeting these journalists. This incident is part of a broader pattern of mercenary spyware deployment against European journalists, raising significant concerns about press freedom, privacy, and digital security. The attack vector being zero-click and exploiting a high-profile iOS vulnerability underscores the advanced capabilities of the Paragon group and the ongoing risks posed by mercenary spyware vendors. The lack of public patches or mitigations at the time of discovery further exacerbates the threat landscape for iOS users, especially those in sensitive professions such as journalism.

Potential Impact

The impact on European organizations, particularly media and civil society entities, is substantial. The use of zero-click spyware enables attackers to compromise devices stealthily, leading to the potential exfiltration of sensitive communications, confidential sources, and unpublished investigative material. This undermines journalistic integrity and freedom of the press, critical pillars of democratic societies. Beyond individual journalists, media organizations face reputational damage and operational disruption if their staff's devices are compromised. The spyware's ability to operate without user interaction increases the risk of widespread undetected surveillance. Additionally, the targeting of journalists may have a chilling effect on investigative reporting and whistleblowing activities across Europe. Given the spyware's linkage to a specific server and iMessage account, there is also a risk of broader espionage campaigns against other high-value targets using similar tactics. The incident highlights vulnerabilities in widely used consumer technology (iOS devices), which are prevalent across European countries, thereby posing a systemic risk to digital security and privacy.

Mitigation Recommendations

1. Immediate deployment of iOS updates once Apple releases patches addressing CVE-2025-43200 is critical. Organizations should prioritize patch management for all iOS devices, especially those used by journalists and sensitive personnel. 2. Implement device usage policies that restrict the use of iMessage or other vulnerable communication apps on devices handling sensitive information until patches are confirmed. 3. Employ mobile threat detection solutions capable of identifying anomalous device behavior indicative of spyware activity, including unusual network connections to suspicious IPs like 46.183.184.91. 4. Conduct regular forensic audits and device integrity checks for high-risk users to detect early signs of compromise. 5. Enhance operational security (OpSec) training for journalists and staff, emphasizing the risks of zero-click attacks and encouraging the use of secure communication alternatives where feasible. 6. Collaborate with cybersecurity intelligence sharing groups to stay informed about emerging threats and indicators of compromise related to mercenary spyware. 7. Advocate for transparency and accountability regarding government use of mercenary spyware to reduce misuse against civil society. 8. Consider deploying hardware-based security modules or secure enclave features on devices to limit spyware capabilities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/"]
Adversary
Paragon
Pulse Id
684b4dfdc754eff94f8e1f53
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-43200

Ip

ValueDescriptionCopy
ip46.183.184.91

Threat ID: 684be28ea8c9212743803a68

Added to database: 6/13/2025, 8:34:22 AM

Last enriched: 6/13/2025, 8:50:20 AM

Last updated: 6/16/2025, 4:43:48 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats