{"id":57117,"date":"2024-09-17T14:53:56","date_gmt":"2024-09-17T14:53:56","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36346\/Predator-Spyware-Kingpins-Added-To-US-Sanctions-List.html"},"modified":"2024-09-17T14:53:56","modified_gmt":"2024-09-17T14:53:56","slug":"predator-spyware-kingpins-added-to-us-sanctions-list","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/","title":{"rendered":"Predator Spyware Kingpins Added To US Sanctions List"},"content":{"rendered":"<p>Five individuals and one company with ties to spyware developer Intellexa are the latest to earn sanctions as the US expands efforts to stamp out spyware.<\/p>\n<p>The latest sanctions from the Department of the Treasury&#8217;s Office of Foreign Assets Control (OFAC) follow initial action taken in July 2023, when Intellexa itself was added to the list after being deemed a potential threat to national security.<\/p>\n<p>Intellexa is on the naughty list for developing the Predator spyware, similar to NSO Group&#8217;s Pegasus &#8211; which arguably carries a little more notoriety &#8211; yet Intellexa also has all the features you definitely don&#8217;t want running on any of your devices.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Phone calls, messages, GPS data, and microphone and camera access \u2013 among others \u2013 are all believed to be compromised if the software, which can <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/05\/27\/predator_analysis_talos\/\" rel=\"noopener\">run silently on iOS and Android<\/a>, worms its way onto a device.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>After going a little quiet <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/09\/predator_spyware_trump_crypto\/\" rel=\"noopener\">earlier this year<\/a>, researchers <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/09\/predator_spyware_trump_crypto\/\" rel=\"noopener\">recently spotted evidence<\/a> of new Predator infrastructure popping up in African countries like the Democratic Republic of the Congo and Angola, suggesting Intellexa was hardly bothered by its initial OFAC sanctioning.<\/p>\n<p>Insikt Group, Recorded Future&#8217;s threat intel arm, <a target=\"_blank\" href=\"https:\/\/www.recordedfuture.com\/research\/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices\" rel=\"nofollow noopener\">identified<\/a> various other potential customers of Predator spyware in March. These included Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman, the Philippines, Saudi Arabia, and Trinidad and Tobago.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Included among the five individuals to be sanctioned is Greek businessman Felix Bitzios, the majority shareholder at Intellexa. Bitzios has also acted as a manager of the company, as has senior executive Merom Harpaz, who was sanctioned alongside him.<\/p>\n<p>Andrea Nicola Constantino Hermes Gambazzi, the Swiss-born Emirates-based owner of Intellexa&#8217;s parent company, Thalestris Limited, which also has distribution rights for Predator and is already designated by the OFAC, joins Bitzios. Panagiota Karaoli is a director of multiple Thalestris subsidiaries, the OFAC said, which is why the Cypriot has now also earned a spot on the list.<\/p>\n<p>Artemis Artemiou is the last individual to be added to this round of sanctions. Artemiou is described as the general manager and board member at Cytrox Holdings \u2013 the Hungary-based company responsible for developing earlier versions of Predator before production moved to Cytrox AD, located in North Macedonia. The company is part of the Intellexa Consortium and was first designated in 2023 for trafficking vulnerability exploits.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Finally, Aliada Group is based in the British Virgin Islands and is described as an enabler of transactions for Intellexa valued at tens of millions of dollars. It&#8217;s currently directed by Tal Jonathan Dilian, who founded the Intellexa Consortium, the OFAC said.<\/p>\n<p>&#8220;The United States will not tolerate the reckless propagation of disruptive technologies that threaten our national security and undermine the privacy and civil liberties of our citizens,&#8221; <a target=\"_blank\" href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy2581\" rel=\"nofollow noopener\">said<\/a> Bradley T Smith, acting under secretary of the Treasury for terrorism and financial intelligence.&nbsp;<\/p>\n<p>&#8220;We will continue to hold accountable those that seek to enable the proliferation of exploitative technologies, while also encouraging the responsible development of technologies that align with international standards.&#8221;<\/p>\n<h3 class=\"crosshead\">Costly spyware<\/h3>\n<p>As <em>The Register<\/em> <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/07\/spyware_business_booming\/\" rel=\"noopener\">previously reported<\/a>, the commercial spyware market is worth big bucks \u2013 approximately $12 billion a year \u2013 and, according to experts, &#8220;appears to be booming.&#8221;<\/p>\n<p>Purchase prices of kit such as Predator and Pegasus don&#8217;t come cheap, since they&#8217;re pre-loaded with exploit chains that harness various zero-day vulnerabilities \u2013 valuable stuff for anyone operating on either side of the cybersecurity game.<\/p>\n<p>Amnesty International&#8217;s Security Lab republished a <a target=\"_blank\" href=\"https:\/\/securitylab.amnesty.org\/latest\/2023\/10\/technical-deep-dive-into-intellexa-alliance-surveillance-products\/#:~:text=This%202022%20commercial%20proposal%20only,also%20included%20in%20the%20proposal.\" rel=\"nofollow noopener\">leaked price proposal for Predator<\/a> in 2022 after it was leaked on the XSS cybercrime forum. The proposal was for a package deal including both Predator and Nova, Intellexa&#8217;s data analysis system. The price was set at \u20ac8 million ($8.9 million at today&#8217;s exchange rate).<\/p>\n<p>Considering the dirt such software could unearth on targets of interest, it&#8217;s easy to see why some states can justify the expenditure.<\/p>\n<p>Targets typically include government figures, journalists, and human rights activists, but this could feasibly be extended to wider and less specific pools of people in civil society too.<\/p>\n<h3 class=\"crosshead\">Apple drops NSO Group lawsuit<\/h3>\n<p>In other news, Apple has reportedly abandoned its plan to sue Israeli Pegasus peddler NSO Group.<\/p>\n<p>The iGiant <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/11\/24\/apples_pegasus_lawsuit\/\" rel=\"noopener\">announced<\/a> its intention to impose costs on the spyware maker in 2021, but recently cited concerns that proceeding with litigation might expose sensitive details that could harm the cybersecurity community if revealed in open court.<\/p>\n<p>&#8220;State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability. That needs to change,&#8221; said Craig Federighi, Apple&#8217;s senior vice president of software engineering in 2021.&nbsp;<\/p>\n<p>&#8220;Apple devices are the most secure consumer hardware on the market \u2013 but private companies developing state-sponsored spyware have become even more dangerous. While these cybersecurity threats only impact a very small number of our customers, we take any attack on our users very seriously, and we&#8217;re constantly working to strengthen the security and privacy protections in iOS to keep all our users safe.&#8221;<\/p>\n<p>Pegasus spyware used what&#8217;s referred to as the FORCEDENTRY exploit to break into iOS and install itself on targeted devices. The exploit, which involved specially crafted iMessage messages, required no interaction from the victim (zero-click) for it to be carried out.<\/p>\n<p>NSO Group unsuccessfully <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/01\/24\/us_judge_rejects_pegasus_spyware\/\" rel=\"noopener\">attempted<\/a> to get Apple&#8217;s case thrown out earlier this year, but has now had its wish granted by Apple itself, the Washington Post <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/technology\/2024\/09\/13\/apple-lawsuit-nso-pegasus-spyware\/\" rel=\"nofollow noopener\">reported<\/a> on Friday.<\/p>\n<p>Apple maintains its claims are still valid but now feels that by going to trial, critical threat intelligence would come to light that may lead the growing commercial spyware ecosystem to develop workarounds for Apple&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/07\/06\/apple_lockdown_mode\/\" rel=\"noopener\">anti-spyware protections<\/a>. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36346\/Predator-Spyware-Kingpins-Added-To-US-Sanctions-List.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[11045],"class_list":["post-57117","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentprivacyspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-17T14:53:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Predator Spyware Kingpins Added To US Sanctions List\",\"datePublished\":\"2024-09-17T14:53:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\"},\"wordCount\":937,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"keywords\":[\"headline,hacker,government,privacy,spyware\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\",\"name\":\"Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-09-17T14:53:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage\",\"url\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,privacy,spyware\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacyspyware\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Predator Spyware Kingpins Added To US Sanctions List\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/","og_locale":"en_US","og_type":"article","og_title":"Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-09-17T14:53:56+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Predator Spyware Kingpins Added To US Sanctions List","datePublished":"2024-09-17T14:53:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/"},"wordCount":937,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","keywords":["headline,hacker,government,privacy,spyware"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/","url":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/","name":"Predator Spyware Kingpins Added To US Sanctions List 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-09-17T14:53:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZunGlCFXvO3joo7DMZFTpwAAAkU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/predator-spyware-kingpins-added-to-us-sanctions-list\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,privacy,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacyspyware\/"},{"@type":"ListItem","position":3,"name":"Predator Spyware Kingpins Added To US Sanctions List"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57117"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}