{
	"id": "6c9035e8-a684-4567-b7b2-ebe8132f590a",
	"created_at": "2026-04-06T00:14:31.346226Z",
	"updated_at": "2026-04-10T03:22:10.25076Z",
	"deleted_at": null,
	"sha1_hash": "27b21a344ce68933a438d118a8db16773b99322e",
	"title": "U.S. sanctions Predator spyware operators for spying on Americans",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 790977,
	"plain_text": "U.S. sanctions Predator spyware operators for spying on Americans\r\nBy Bill Toulas\r\nPublished: 2024-03-05 · Archived: 2026-04-05 14:11:38 UTC\r\nThe U.S. has imposed sanctions on two individuals and five entities linked to the development and distribution of the\r\nPredator commercial spyware used to target Americans, including government officials and journalists.\r\n\"Today, the Department of the Treasury's Office of Foreign Assets Control (OFAC) designated two individuals and five\r\nentities associated with the Intellexa Consortium for their role in developing, operating, and distributing commercial\r\nspyware technology used to target Americans, including U.S. government officials, journalists, and policy experts,\" reads\r\na press release by the Office of Foreign Assets Control (OFAC).\r\nThe sanctions target Intellexa Consortium's Israeli founder, Tal Jonathan Dilian, and Polish corporate specialist, Sara\r\nAleksandra Fayssal Hamou.\r\nhttps://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nThe sanctioned companies that are linked to spyware tech distribution are:\r\n1. Cytrox AD – North Macedonia\r\n2. Cytrox Holdings Zartkoruen Mukodo Reszvenytarsasag (Cytrox Holdings ZRT) – Hungary\r\n3. Intellexa Limited – Ireland\r\n4. Intellexa S.A. - Greece\r\n5. Thalestris Limited – Ireland\r\nIntellexa's commercial spyware technologies, specifically a product named 'Predator,' have been used to target key persons\r\nworldwide, including the United States. The attacks have enabled human rights abuses and the targeting of dissidents by\r\noppressive regimes or state-sponsored cyberespionage by governments.\r\nCommon targets of Predator include government officials, journalists, politicians, activists, policy experts, and even high-ranking tech firm executives, with more details about Predator's targets found here.\r\nIntellexa was also highlighted in a recent Google report where researchers warned the company utilizes zero-day\r\nvulnerability to install the spyware. In 2022, Google's Threat Analysis Group (TAG) reported that Predator was using zero-day vulnerabilities in Chrome and Android to infect fully-patched phones.\r\nCisco Talos has also shared technical details about the spyware's infection process and mapped many of its data-theft\r\ncapabilities.\r\nThe inclusion of individuals and entities on OFAC's Specially Designated Nationals (SDN) List has significant legal and\r\nfinancial implications. It is considered a powerful tool in the hands of the U.S. government, used in this case to underline\r\nthe Biden administration's commitment to countering the misuse of spyware technology.\r\nInclusion in the SDN List means all U.S.-based assets linked to those persons and entities are frozen, and U.S.-linked\r\nindividuals and companies are prohibited from engaging in any transactions with them. Those who violate these restrictions\r\ncan face massive fines and imprisonment.\r\nAlso, these sanctions send a powerful signal to the international community, dissuading organizations based in US-allied\r\ncountries from doing business with sanctioned entities or supporting sanctioned individuals.\r\nThis action from the U.S. government comes only days after Recorded Future revealed that despite the recent calls for\r\ntighter regulation in the commercial spyware space and the public outcry about Predator's shady deployment cases, the\r\nspyware was already spreading to new countries in Asia, Africa, and the Caribbean.\r\nhttps://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/\r\nhttps://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/"
	],
	"report_names": [
		"us-sanctions-predator-spyware-operators-for-spying-on-americans"
	],
	"threat_actors": [],
	"ts_created_at": 1775434471,
	"ts_updated_at": 1775791330,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/27b21a344ce68933a438d118a8db16773b99322e.pdf",
		"text": "https://archive.orkl.eu/27b21a344ce68933a438d118a8db16773b99322e.txt",
		"img": "https://archive.orkl.eu/27b21a344ce68933a438d118a8db16773b99322e.jpg"
	}
}