Feedpost Specials    •    6 min read

Italian Firm's Spyware Trick: WhatsApp Users Fooled into Downloading Malware

WHAT'S THE STORY?

Discover how an Italian surveillance company used a cunning ruse, tricking around 200 individuals into installing malware disguised as WhatsApp. Learn about the methods employed and the implications for digital security.

Deceptive App Installation

A recent security alert from WhatsApp, a platform owned by Meta Platforms, has revealed a concerning cyberattack originating from Italy. The attack involved

AD

a subsidiary of an Italian company named SIO, specifically its arm ASIGINT, which successfully deceived roughly 200 users into downloading a counterfeit version of the popular messaging application. This malicious software was cleverly disguised to appear legitimate, prompting unsuspecting users to install it onto their devices. Once installed, this bogus application served as a conduit for deploying spyware, effectively turning the users' own devices into tools for surveillance. The operation was noted for its highly targeted nature, employing a strategy of deception to ensure victims would willingly install the compromised software, which mimicked the genuine WhatsApp experience to avoid immediate suspicion. The primary victims were identified as being located in Italy, highlighting a regional focus for this particular campaign.

ASIGINT's Deceptive Tactics

The company behind this intrusive operation, ASIGINT, is identified as a subsidiary of SIO, a firm based in northern Italy. SIO's public profile boasts of providing advanced cyber intelligence solutions and technologies, often marketed as being suitable for "Law Enforcement Agencies, Government Organizations, Police and Intelligence Agencies." This suggests a focus on sophisticated surveillance tools. The method employed by ASIGINT was particularly insidious, as it did not rely on exploiting technical vulnerabilities in WhatsApp itself. Instead, it leveraged social engineering and outright deception, creating a convincing fake application that users were led to believe was the genuine messaging service. This approach bypasses many traditional security defenses, as the user's own actions of downloading and installing the application are the critical step that enables the malware to take hold. The limited scope of around 200 affected users indicates a precision-based strategy rather than a mass-distribution effort, suggesting a deliberate focus on specific targets.

Broader Spyware Concerns

This incident marks the second time within a 15-month period that Meta has publicly disclosed and disrupted spyware activity linked to Italy. This recurrence underscores ongoing concerns about the proliferation and use of such surveillance technologies within the region. Following this latest event, Italy continues to grapple with the aftermath of a previous surveillance operation in early 2025, which involved spyware from the U.S.-based firm Paragon. Although Italy and Paragon have since concluded their association, the repeated emergence of such sophisticated spyware campaigns indicates a persistent challenge in safeguarding digital privacy. SIO, when contacted for comment regarding ASIGINT's activities, did not issue an immediate response. Similarly, Italian authorities, including the interior ministry, referred inquiries to the police, who also did not provide immediate clarification on the matter. The lack of immediate official comment leaves many questions unanswered regarding the scope and oversight of such surveillance operations.

AD
More Stories You Might Enjoy