{"id":54057,"date":"2023-10-10T13:48:58","date_gmt":"2023-10-10T13:48:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35107\/Predator-Files-Report-Prompts-Call-For-Worldwide-Ban-On-Spyware.html"},"modified":"2023-10-10T13:48:58","modified_gmt":"2023-10-10T13:48:58","slug":"predator-files-report-prompts-call-for-worldwide-ban-on-spyware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/","title":{"rendered":"Predator Files Report Prompts Call For Worldwide Ban On Spyware"},"content":{"rendered":"<p>Amnesty International on Monday <a href=\"https:\/\/www.amnesty.org\/en\/documents\/act10\/7245\/2023\/en\/\">reported<\/a> that a series of unsettling Predator spyware attacks have been attempted on civil society, journalists, politicians and academics in the European Union (EU), the United States, and Asia.<\/p>\n<p>The human rights group said these attacks are so serious that it called for a worldwide ban on spyware.<\/p>\n<p>\u201cIntellexa alliance, the European-based developers of Predator and other surveillance products have done nothing to limit who is able to use this spyware and for what purpose,\u201d said Agnes Callamard, secretary general at Amnesty International. \u201cInstead, they are lining their pockets and ignoring the serious human rights implications at stake. In the wake of this latest scandal, surely the only effective response is for states to impose an immediate worldwide ban on highly-invasive spyware.\u201d&nbsp;<\/p>\n<p>The report published Oct. 9 by Amnesty International\u2019s&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/securitylab.amnesty.org\/\" target=\"_blank\">Security Lab<\/a>, those targeted \u2014 though not necessarily infected \u2014 include members of the U.S. Congress Rep. Michael McCaul, R-Texas, and Sen. John Hoeven, R-N.D. Others mentioned in the report include President of the European Parliament Roberta Metsola, Taiwan President Tsai Ing-Wen, German Ambassador to the U.S. Emily Haber, and French Member of the European Parliament Pierre Karlesksind.<\/p>\n<p>The Amnesty International investigation is part of the \u2018<a rel=\"noreferrer noopener\" href=\"https:\/\/eic.network\/projects\/predator-files.html\" target=\"_blank\">Predator Files<\/a>\u2019 project, in partnership with the European Investigative Collaborations (EIC) and backed by additional in-depth reporting by Mediapart and Der Spiegel.<\/p>\n<p>As Amnesty International explained, Predator is a type of highly invasive spyware that has unfettered access to a device&#8217;s microphone and camera and all its data, such as contacts, messages, photos and videos, while users are entirely unaware once it has infiltrated the device.<\/p>\n<p>Between February and June 2023, Amnesty International said social media platforms X (formerly Twitter) and Facebook were used to publicly target at least 50 accounts belonging to 27 individuals and 23 institutions. The cyber-surveillance weapon used for targeting was Predator, which was developed and sold by the Intellexa alliance. This alliance, which has advertised itself as \u201cEU based and regulated,\u201d functions as a complex and often-changing group of companies that develops and sells surveillance products, including Predator spyware.<\/p>\n<h2>The Citizen Lab confirms Amnesty\u2019s findings<\/h2>\n<p>In its own research, <a rel=\"noreferrer noopener\" href=\"https:\/\/citizenlab.ca\/2023\/10\/predator-spyware-targets-us-eu-lawmakers-journalists\/\" target=\"_blank\">The Citizen Lab<\/a> independently received and collected a set of since-deleted posts by the threat actor using Predator to target all the high-profile officials, which it calls&nbsp;&#8220;REPLYSPY.&#8221;<\/p>\n<p>Citizen Lab said its findings align with Amnesty International\u2019s Security Lab conclusions concerning Predator, and they assessed with \u201chigh confidence\u201d that REPLYSPY&nbsp;included Cytrox Predator infection links in replies to numerous U.S. and international officials and others. Cytrox is a subsidiary of Intellexa.<\/p>\n<p>Here\u2019s how Citizen Lab said the spyware works: Once a user clicks on one of the links, and a validation procedure is satisfied, the user\u2019s device gets infected with the Predator spyware, likely using a chain of zero-day exploits.<\/p>\n<p>Citizen Lab also noted a wider range of suspects targeted by the REPLYSPY actor. For example, \u201cJoseph Gordon,\u201d a phony Twitter handle used by the threat actor, repeatedly replied to tweets mentioning multiple additional elected U.S. officials. Notably the targeting occurred on themes related to Taiwan with links to URLs on the domain name&nbsp;<em>caavn[.]org<\/em>.<\/p>\n<figure><img alt srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=750&amp;q=75 1x, https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75 2x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\" width=\"697\" height=\"418\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><\/figure>\n<p>The targeting of high-ranking officials and journalists demonstrates the strategic deployment of this spyware, with a clear motive to gain invaluable insights into policy-making or to quell dissent, said Callie Guenther, senior manager, cyber threat research at Critical Start. Guenther said what heightens the concern is the utilization of ubiquitous platforms like X and Facebook, which are deeply integrated into daily communications, amplifying the potential reach and impact of these cyber threats.<\/p>\n<p>\u201cFor businesses, the ramifications of such sophisticated spyware tools are manifold,\u201d said Guenther. \u201cThe surreptitious nature of these tools could lead to intellectual property theft, compromising sensitive company data ranging from financial records to strategic blueprints. Moreover, the potential breach of confidential communications poses risks of reputational damage, particularly if discussions about internal strategies, mergers, or acquisitions are inadvertently disclosed.\u201d<\/p>\n<p>Guenther also pointed out that firms operating in sectors with stringent regulatory protocols, such as finance and healthcare, also face elevated legal and compliance risks. An intrusion could result in breaches, leading to significant legal consequences. Furthermore, Guenther said high-value employees, including executives and R&amp;D leads, might find themselves targeted not just for the data they possess but also for their influential capacities.<\/p>\n<p>\u201cAnother lurking danger is economic espionage, where the spyware is used to gain economic or trade advantages over competitors,\u201d said Guenther. \u201cEven if a firm boasts robust security measures, its supply chain might present vulnerabilities. Malicious entities could exploit weaker entities within the chain to indirectly gain access to larger corporations.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35107\/Predator-Files-Report-Prompts-Call-For-Worldwide-Ban-On-Spyware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10736],"class_list":["post-54057","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentprivacymalwarephonespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T13:48:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Predator Files Report Prompts Call For Worldwide Ban On Spyware\",\"datePublished\":\"2023-10-10T13:48:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/\"},\"wordCount\":790,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\",\"keywords\":[\"headline,hacker,government,privacy,malware,phone,spyware\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/\",\"name\":\"Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\",\"datePublished\":\"2023-10-10T13:48:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\",\"contentUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,privacy,malware,phone,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentprivacymalwarephonespyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Predator Files Report Prompts Call For Worldwide Ban On Spyware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/","og_locale":"en_US","og_type":"article","og_title":"Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-10T13:48:58+00:00","og_image":[{"url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Predator Files Report Prompts Call For Worldwide Ban On Spyware","datePublished":"2023-10-10T13:48:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/"},"wordCount":790,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75","keywords":["headline,hacker,government,privacy,malware,phone,spyware"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/","url":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/","name":"Predator Files Report Prompts Call For Worldwide Ban On Spyware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75","datePublished":"2023-10-10T13:48:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#primaryimage","url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75","contentUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FHoeventweet.webp&amp;w=1920&amp;q=75"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/predator-files-report-prompts-call-for-worldwide-ban-on-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,privacy,malware,phone,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacymalwarephonespyware\/"},{"@type":"ListItem","position":3,"name":"Predator Files Report Prompts Call For Worldwide Ban On Spyware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54057"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54057\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}