Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Graphite Caught: First Forensic Confirmation of Paragon's iOS Mercenary Spyware Finds Journalists Targeted

0
Medium
Published: Thu Jun 12 2025 (06/12/2025, 22:00:29 UTC)
Source: AlienVault OTX General

Description

Graphite is a sophisticated mercenary spyware developed by the Paragon group that exploits a zero-click vulnerability (CVE-2025-43200) in iOS 18. 2. 1 via iMessage, enabling silent device compromise without user interaction. Forensic evidence confirms targeted attacks against European journalists, threatening press freedom and digital privacy. The spyware communicates with a command-and-control server at IP 46. 183. 184. 91 and uses a unique iMessage account, indicating a well-resourced infrastructure. The Italian government acknowledged limited use of Graphite but denied involvement in these specific attacks. The zero-click nature and stealthy operation make detection and prevention extremely difficult, risking exposure of sensitive communications and confidential sources.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 19:30:03 UTC

Technical Analysis

Graphite is a highly advanced mercenary spyware tool created by the Paragon group that exploits a zero-click vulnerability identified as CVE-2025-43200 in iOS version 18.2.1, specifically targeting the iMessage protocol or its related components. This zero-click exploit allows attackers to silently compromise iOS devices without any user interaction such as clicking links or opening messages, enabling stealthy installation of spyware. Once installed, Graphite provides attackers with extensive surveillance capabilities including exfiltration of sensitive data, monitoring of communications, and persistent device control. Forensic investigations have confirmed that this spyware has been used in targeted attacks against European journalists, posing a direct threat to press freedom and digital privacy. The spyware communicates with a command-and-control server at IP address 46.183.184.91 and operates through a unique iMessage account, demonstrating a sophisticated and well-resourced infrastructure. The Italian government has acknowledged limited use of Graphite spyware but denied involvement in these specific journalist-targeted attacks, illustrating the complex attribution challenges associated with mercenary spyware. At the time of discovery, no official patches or fixes were available, leaving affected users vulnerable. The advanced capabilities of the Paragon group combined with the zero-click exploit make detection and prevention extremely challenging, emphasizing the need for enhanced security measures, forensic audits, and operational security awareness among high-risk users such as journalists and media personnel.

Potential Impact

This threat poses significant risks to European organizations, particularly media outlets, journalists, and civil society groups. The zero-click exploit enables attackers to silently compromise devices, leading to potential exfiltration of sensitive communications, confidential sources, unpublished investigative materials, and personal data. Such compromises undermine journalistic integrity and press freedom, which are critical to democratic societies. The exposure of confidential sources and sensitive information can cause reputational damage and operational disruption to media organizations. The stealthy nature of the spyware increases the likelihood of prolonged undetected surveillance, potentially chilling investigative journalism and whistleblowing activities across Europe. The targeting of journalists also signals a broader espionage threat to other high-value individuals and organizations using similar tactics. Given the widespread use of iOS devices in Europe, this vulnerability poses a systemic risk to digital security and privacy. The involvement or acknowledgment by a government actor adds geopolitical and legal complexities, potentially affecting trust in state institutions and international relations.

Mitigation Recommendations

1. Prioritize immediate deployment of official iOS patches addressing CVE-2025-43200 as soon as Apple releases them, ensuring all devices, especially those used by journalists and sensitive personnel, are updated promptly. 2. Temporarily restrict or disable the use of iMessage and other vulnerable communication apps on devices handling sensitive information until patches are confirmed and applied. 3. Deploy advanced mobile threat detection solutions capable of identifying anomalous behaviors indicative of spyware, such as unusual network traffic to known malicious IPs like 46.183.184.91. 4. Conduct regular forensic audits and integrity checks on devices used by high-risk users to detect early signs of compromise. 5. Enhance operational security training for journalists and staff, focusing on the risks of zero-click attacks and promoting the use of secure communication alternatives where feasible. 6. Establish and maintain active collaboration with cybersecurity intelligence sharing groups to stay updated on emerging threats, indicators of compromise, and mitigation strategies related to mercenary spyware. 7. Advocate for transparency, oversight, and accountability regarding government use of mercenary spyware to prevent misuse against civil society and protect press freedom. 8. Consider deploying hardware-based security features such as secure enclaves or trusted execution environments on devices to limit spyware capabilities and improve resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/"]
Adversary
Paragon
Pulse Id
684b4dfdc754eff94f8e1f53
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-43200

Ip

ValueDescriptionCopy
ip46.183.184.91

Threat ID: 684be28ea8c9212743803a68

Added to database: 6/13/2025, 8:34:22 AM

Last enriched: 4/2/2026, 7:30:03 PM

Last updated: 5/10/2026, 5:20:11 AM

Views: 278

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses