WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware
The Meta-owned company said it identified around 200 users who were tricked into installing a fake version of WhatsApp that was actually Italian-made spyware.
WhatsApp says it has notified around 200 users who were tricked into installing a malicious fake version of the chat app that contained spyware.
WhatsApp accused Italian spyware maker SIO of creating a fake version of its messaging app for iPhones, according to an announcement the company shared with TechCrunch.
“Our security team proactively identified around 200 users primarily in Italy who we believe may have downloaded this malicious unofficial client,” WhatsApp said in its statement. “We have logged them out, alerted [them] to the risks to their privacy and security that come with downloading fake unofficial clients, and encouraged them to remove it and download the official WhatsApp app.”
WhatsApp spokesperson Margarita Franklin told TechCrunch that, at this point, the company cannot share more information about the users it notified, such as whether they were journalists or members of civil society.
“Our priority has been protecting the users who may have been tricked into downloading this fake iOS app,” said Franklin.
In its announcement, WhatsApp also said it plans to “send a formal legal demand to stop any such malicious activity to this spyware firm.”
A screenshot of the notification Whatsapp sent to users warning them to download the official appImage Credits:WhatsApp
Italian newspaper La Repubblica and news agency ANSA first reported the news.
Last year, TechCrunch revealed that SIO was behind a series of malicious Android apps that contained its spyware, including fake versions of WhatsApp, as well as fake customer support tools for cellphone providers. SIO’s spyware was identified with the name Spyrtacus, a word that appeared in the spyware’s code.
Contact Us
Do you have more information about SIO, or other government spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.
Using fake apps against targets of surveillance is a well-established tactic used by authorities in Italy, who often get collaboration from cellphone providers, who send phishing links to their customers on behalf of law enforcement.
SIO develops government spyware through its subsidiary ASIGINT.
Apple and SIO did not respond to a request for comment.
WhatsApp’s latest announcement comes a year after the company alerted around 90 users that they had been targeted with spyware made by the U.S.-Israeli surveillance tech maker Paragon Solutions. WhatsApp sent those notifications to journalists and pro-immigration activists, among others, sparking a wide-ranging scandal across Italy.
In response, Paragon cut ties with Italy’s spy agencies, which were its customers.
Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy.
You can contact or verify outreach from Lorenzo by emailing [email protected], via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram.
View Bio
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
versioncompanygovernment
Listen to Gryffindor
Lesson: The enemy is compliance, and the solution is courage. (This post uses the Hogwarts houses as an evocative lens. See the footnote [1] if you are unfamiliar.) Behaviour: You're making a career choice. Your local EA community needs a director. You're unsure but commit, since it's important work. You don't get funded, work for less than your happy price, and start running on fumes. You're trying to think how to get something real done, again. You think of HJPEV. You realize you need to be more diligent, lock in and apply conscientiousness, and solve the problem. You spend years trying to simulate conscientiousness, and pay the rent to unworkable TODO systems, overburdened calendars, and feeling trapped in systems devised by you. You buy a robot vacuum. You tell your SO how it cost 1/40

Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Products

Show HN: Wazear – A visual AI orchestrator where agents review each other
Hey folks, For the past month I've been working on a visual AI orchestartor tool that allows users to create a pipeline similar to SDLC. Basically you fire up Wazear, create a project and add your brief. You select the agents (each agent serves a role such as planner, architect, etc...) and set which agent reviews which other agent's work and let it do the work. At any point you can pause the pipeline to review output yourself. You can check it out here: https://wazear.space . Any feedback is welcome. Thank you very much. Best Regards. Comments URL: https://news.ycombinator.com/item?id=47624203 Points: 2 # Comments: 0

Is AI Insurance the Answer to AI Legal Battles?
Chief legal advisors and general counsels might need to consider new AI insurance offerings as part of their strategy to stay on top of their organisation s exposure to AI-related risks, according to Gartner. “As AI incidents surge and insurers increasingly add AI exclusions to traditional policies, companies face growing exposure to legal, financial and regulatory [ ] The post Is AI Insurance the Answer to AI Legal Battles? appeared first on DIGIT .

Akira Hackers Shrink Encryption Timeline to Under One Hour
A notorious ransomware group has been observed leveraging long‑standing exploits and stolen credentials to slip past MFA protections and execute attacks in as little as one hour. Tracking the well-known Akira ransomware group, security researchers from Halcyon witnessed hackers abusing CVE-2024-40766 to gain unauthorised access to SonicWall management interfaces and configuration backups on unpatched devices. [ ] The post Akira Hackers Shrink Encryption Timeline to Under One Hour appeared first on DIGIT .



Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!