Connect with us

CyberSecurity

ICE Confirms Purchase and Use of Paragon Spyware in Drug Trafficking Investigations

Published

on

ICE Confirms Purchase and Use of Paragon Spyware in Drug Trafficking Investigations

In a significant disclosure, the acting director of U.S. Immigration and Customs Enforcement has confirmed the agency acquired and deployed spyware from Paragon Solutions for use in drug trafficking cases. This revelation, detailed in a letter to lawmakers, spotlights the ongoing tension between national security imperatives and the protection of civil liberties in the digital age.

Official Justification for Spyware Deployment

Acting Director Todd Lyons outlined the rationale in his correspondence. He stated he approved the use of “cutting-edge technological tools” by the Homeland Security Investigations (HSI) unit. The stated goal is to counter the exploitation of encrypted communication platforms by foreign terrorist organizations and criminal networks. Consequently, this official acknowledgment provides a rare window into the operational tactics employed by domestic law enforcement agencies.

Navigating the Encryption Dilemma

For years, law enforcement has argued that strong encryption creates insurmountable barriers to criminal investigations. Tools like those from Paragon Solutions offer a potential workaround by extracting data directly from a target’s device. However, this capability sits at the heart of a fierce debate. Critics consistently warn that such powerful surveillance technology, once acquired, is prone to misuse and threatens the privacy of journalists, activists, and political dissidents.

Constitutional Assurances and Mounting Skepticism

In his letter, Director Lyons sought to preempt concerns by asserting that ICE’s use of the spyware would “comply with constitutional requirements.” He further certified that the tool did not pose significant security risks or risks of improper use by foreign entities. Building on this, the agency appears to be framing the technology as a necessary and controlled instrument for high-stakes investigations.

Nevertheless, these assurances have failed to satisfy key lawmakers. Representative Summer Lee, who was among those requesting information from ICE, expressed deep skepticism. “Instead of answering the serious constitutional and civil rights concerns that we raised, DHS is asking the public to accept vague assurances and fear-based justifications,” Lee stated. This response indicates a clear disconnect between the agency’s internal risk assessment and the external scrutiny from legislative overseers.

A Contract Mired in Controversy and Scandal

The path to this deployment was neither straightforward nor without controversy. ICE initially signed a contract with the U.S.-Israeli spyware maker in 2024. Almost immediately, the Biden administration suspended the deal. This pause was to determine if it complied with an executive order restricting U.S. agencies from using spyware that could target Americans abroad or facilitate human rights abuses.

By September 2025, ICE had lifted the block and reactivated the contract. Until now, however, it was unclear whether the agency had moved beyond procurement to actual operational use. This confirmation from the acting director settles that question definitively. For more context on government surveillance tools, you can read our analysis on evolving surveillance trends.

Paragon’s Troubled International Profile

The decision to proceed with Paragon is notable given the company’s recent history. Paragon has been entangled in a major scandal in Italy, where its Graphite spyware was allegedly used to target journalists and pro-immigration activists. In reaction to the fallout, Paragon severed its ties with Italian intelligence agencies. This international context raises pertinent questions about vendor selection and the lifecycle accountability of surveillance technologies purchased by the U.S. government.

Civil Rights and Community Impact Concerns

The implications of domestic spyware use extend far beyond the specific drug cases cited by ICE. Representative Lee emphasized the broader threat, noting that the agency is moving forward “with invasive spyware technology inside the United States.” She highlighted the populations most vulnerable to potential overreach, including immigrants, Black and brown communities, journalists, and organizers.

“The people most at risk… deserve more than secrecy and deflection from an agency with a long record of overreach and abuse,” Lee argued. This perspective underscores a fundamental fear: that tools justified for targeting foreign terrorists and drug traffickers will inevitably be turned inward, chilling dissent and undermining trust. Our previous report on digital privacy rights explores these themes in greater depth.

Ultimately, the ICE letter does more than confirm a procurement detail; it reignites a critical conversation about the boundaries of state power in a digitally connected world. While the fight against transnational crime demands effective tools, the precedent set by deploying commercial spyware domestically carries profound and lasting consequences for civil liberties.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

CyberSecurity

Venom PhaaS: The New Phishing-as-a-Service Platform Behind Sophisticated Executive Credential Theft

Published

on

Venom PhaaS: The New Phishing-as-a-Service Platform Behind Sophisticated Executive Credential Theft

Security researchers have exposed a highly targeted credential theft campaign that operated for months, focusing on top-tier executives at major global corporations. This operation, analyzed by experts at Abnormal Security, was powered by a previously unseen and sophisticated phishing platform known as Venom.

This discovery signals a dangerous evolution in the cyber threat landscape. Building on this, the campaign’s success was not due to a single breakthrough but to the meticulous integration of multiple evasion and deception techniques.

The Anatomy of a Deceptive Phishing Campaign

The attackers employed a multi-layered approach to lure their high-value targets. Instead of generic spam, they crafted emails that appeared to be SharePoint document-sharing notifications. These messages were sent to a curated list of CEOs, CFOs, and other senior leaders across more than twenty different industries.

Personalized Lures and Evasion Tactics

To appear legitimate, the emails used financial report themes and contained a QR code directly in the body, urging the recipient to scan it. However, the deception went much deeper. Each email was uniquely structured with randomized HTML elements to avoid signature-based detection systems.

Furthermore, the phishing template automatically generated a fake, multi-message email thread. This thread was personalized with the target’s own email prefix and display name, complete with a fabricated signature containing their real details. A second, randomly generated persona was added as a correspondent, and the message bodies used multilingual text from fixed templates to mimic authentic corporate chatter.

Bypassing Human and Automated Defenses

Once a target scanned the QR code, they were taken to a landing page designed as a verification checkpoint. This page’s primary function was to filter out non-human visitors, such as security scanners, sandboxes, or automated analysis tools.

As a result, only visitors who passed these checks were directed to the actual credential-harvesting page. Everyone else was sent to a dead end, leaving no trace of malicious activity for security teams to find. This step was crucial for isolating real human targets from automated defenses.

How This Phishing Platform Neutralizes Multi-Factor Authentication

The campaign’s most alarming feature was its ability to render multifactor authentication (MFA) ineffective. Victims faced one of two sophisticated harvesting methods.

In the first, an adversary-in-the-middle (AiTM) setup perfectly cloned the victim’s real corporate login portal. It included company branding, a pre-filled email field, and even mimicked the organization’s actual identity provider. While the victim entered their credentials and MFA code, the platform silently relayed this information to the legitimate Microsoft servers, simultaneously giving the attacker access.

Alternatively, the second method avoided login forms altogether. It tricked the user into approving a device sign-in via Microsoft’s legitimate device code flow, which then handed access tokens directly to the attacker. This meant the attacker never needed to see the password at all.

Ensuring Persistent Access

In the AiTM mode, the attacker would quietly register a secondary MFA device on the compromised account, leaving the victim’s original authenticator untouched. In the device code mode, the stolen refresh token remained valid even after a password reset, unless an administrator manually revoked all active sessions—a step not commonly taken by default.

Therefore, the attack blended seamlessly into normal authentication flows, evaded detection, and maintained long-term access.

Venom PhaaS: A Force Multiplier for Cybercrime

The engine behind this operation was the Venom Phishing-as-a-Service platform. This platform featured a professional licensing model, structured token storage, and a full campaign management interface, indicating a high level of commercial development.

Critically, at the time of discovery, Venom had not appeared in any public threat intelligence feeds or open marketplaces, suggesting it is a closed-access, private service. This makes the phishing platform particularly dangerous, as its capabilities are not limited to a single operator but can be rented by others.

Researchers warn that the discovery of Venom acts as a force multiplier. The techniques documented are engineered to work together in an end-to-end pipeline where each stage actively protects the next. Consequently, defensive strategies that rely on MFA as an impenetrable final barrier require immediate reassessment. For more on evolving authentication threats, see our analysis on advanced MFA bypass techniques.

In summary, the Venom platform represents a significant shift towards industrialized, service-based cybercrime. Its focus on high-value targets, sophisticated evasion, and MFA circumvention means organizations must adopt more proactive, behavior-based security measures to defend their most critical accounts.

Continue Reading

CyberSecurity

Duc Money Transfer App Exposes Thousands of Driver’s Licenses and Passports in Major Security Failure

Published

on

Duc Money Transfer App Exposes Thousands of Driver’s Licenses and Passports in Major Security Failure

A significant security failure at a Canadian fintech company has put the personal data of potentially hundreds of thousands of people at risk. The Duc App, a money-transfer service, left a cloud storage server containing sensitive user documents openly accessible to anyone on the internet without a password. This incident highlights a persistent and dangerous trend in digital finance.

How the Duc App Data Breach Happened

Security researcher Anurag Sen discovered the exposed server earlier this week. The server, hosted on Amazon Web Services, was configured to publicly list its contents. Consequently, anyone with a web browser could view and download the files simply by knowing its web address. The data was stored without encryption, removing any final barrier to accessing the full contents of the files.

According to Sen’s analysis, the server contained over 360,000 files. These were not just random documents; they were the core identity verification materials submitted by users. This means the breach involved driver’s licenses, passports, and user-uploaded selfies—the very documents used to prove “who you are” in the digital world.

The Scope of the Exposed Information

Building on this, the exposure was not limited to static images. The server also held spreadsheets with detailed customer records. These files listed names, home addresses, and the specific dates, times, and details of financial transactions. The files dated back to September 2020 and were being updated daily, indicating a live, ongoing leak of personal and financial data.

Company Response and Lingering Questions

When contacted by TechCrunch, Duales CEO Henry Martinez González stated the data was on a “staging site” used for testing. However, he did not explain why real, sensitive customer information was present on a test server or why that server was publicly accessible. His claim that “all protections are in place” stands in stark contrast to the reality of the open server.

After the notification, the company made the files inaccessible. Nevertheless, a critical question remains unanswered: Martinez González would not confirm if the company has logs to determine who accessed the data or how many times it was downloaded. This lack of visibility means affected users may never know if their data was copied by malicious actors.

A Recurring Problem in Digital Verification

This Duc App data breach is not an isolated event. It fits a worrying pattern where companies aggressively collect sensitive identity documents but fail to implement corresponding security measures. Apps and websites increasingly demand passports and driver’s licenses for “Know Your Customer” (KYC) checks, yet the custodianship of this data is often shockingly weak.

For instance, last year, the social app TeaOnHer exposed thousands of similar documents required for user verification. In another case, Discord confirmed a breach affecting about 70,000 government IDs uploaded for age verification. Each incident erodes user trust and demonstrates a systemic failure to prioritize data security from the outset.

Therefore, the core issue extends beyond a single misconfigured server. It points to a flawed approach where data collection is prioritized over data protection. Companies treat sensitive ID documents as just another file type, storing them in standard cloud buckets without the stringent, additional safeguards they inherently require.

Regulatory Scrutiny and User Fallout

In response to this incident, the Office of the Privacy Commissioner of Canada has initiated contact with Duales. The regulator is seeking more information to determine its next steps, which could include an investigation and potential penalties. This regulatory attention is becoming more common as the frequency and severity of such breaches increase.

For users of the Duc App, the implications are severe. Exposure of a driver’s license or passport number creates a high risk of identity theft and fraud. These documents are difficult to change and are master keys to a person’s identity. Combined with exposed home addresses and transaction histories, the potential for targeted phishing attacks or financial fraud is significantly heightened.

As a result, affected individuals must remain vigilant. They should monitor their financial accounts for unusual activity, be wary of sophisticated phishing attempts referencing their Duc App transactions, and consider placing fraud alerts with credit bureaus. For more guidance on protecting yourself after a data breach, read our guide on post-breach security steps.

Preventing the Next Cloud Storage Catastrophe

So, what can be done to stop this cycle? First, companies must adopt a “security by design” philosophy. Sensitive data like government IDs should be encrypted at rest and in transit by default. Access should be governed by strict, role-based permissions, not left open to the public internet. Regular security audits and penetration testing are non-negotiable for any service handling financial or identity data.

Furthermore, the use of production data on staging or test servers should be strictly prohibited. These environments are inherently less secure and are frequent targets for attacks. Instead, anonymized or synthetic data should be used for all testing and development purposes. Learn more about secure development practices in our article on building secure fintech applications.

Ultimately, the Duc App data breach serves as another stark reminder. In the rush to build and launch digital services, fundamental security practices are too often an afterthought. Until companies are held fully accountable for the data they collect—both legally and in the court of public opinion—these preventable exposures will continue to put millions of people at risk.

Continue Reading

CyberSecurity

Venom Stealer: The Malware-as-a-Service Platform Automating Persistent Cyber Theft

Published

on

Venom Stealer: The Malware-as-a-Service Platform Automating Persistent Cyber Theft

A new and sophisticated threat has emerged in the cybercrime ecosystem. Dubbed Venom Stealer, this malware-as-a-service (MaaS) platform is shifting the goalposts for data theft by automating not just the initial breach, but also maintaining persistent, ongoing access to stolen information. This represents a significant escalation from traditional one-time credential harvesters.

Security researchers from BlackFog detailed the platform’s capabilities in a recent advisory. What sets Venom Stealer apart is its operational model and its relentless focus on continuity, ensuring that a single infection can yield a stream of data for as long as the victim remains compromised.

The Subscription-Based Cybercrime Model

Operating like a legitimate software business, Venom Stealer is sold on underground forums using a clear subscription model. Aspiring cybercriminals can pay $250 per month or opt for a lifetime access fee of $1,800. This commercial approach includes Telegram-based licensing and an affiliate program, lowering the barrier to entry for less technically skilled attackers and scaling the threat’s potential reach.

How the Venom Stealer Infection Chain Works

The attack begins with a classic yet effective social engineering trap. Victims are lured to fake webpages mimicking familiar prompts—a Cloudflare CAPTCHA, a system update notification, an SSL certificate error, or a font installation page. Crucially, the victim is then instructed to manually open a Run dialog or Terminal and paste a command themselves. This clever tactic makes the malicious activity appear user-initiated, helping it slip past many behavioral detection systems that flag automated processes.

Once executed, the malware springs into action. It immediately scours Chromium and Firefox-based browsers, extracting saved passwords, session cookies, browsing history, autofill data, and critically, information from cryptocurrency wallets. It also performs detailed system fingerprinting and collects data on installed browser extensions, building a comprehensive profile of the infected machine.

Beyond One-Time Theft: The Continuous Exfiltration Engine

This is where Venom Stealer truly differentiates itself. Unlike older infostealers that run once and exit, this malware remains resident and active. It continuously monitors the Chrome login database, capturing newly saved credentials in real-time the moment a user enters them. Consequently, common defense strategies like credential rotation become far less effective, as the malware simply harvests the new passwords as they are created.

Building on this, the platform’s financial theft capabilities are highly automated. If cryptocurrency wallets are discovered, the data is sent to a powerful server-side cracking engine running on GPU infrastructure. Once the wallet is cracked, funds are automatically liquidated and transferred across multiple blockchain networks, including tokens and decentralized finance (DeFi) positions.

Key Capabilities and Integrated Social Engineering

A particularly dangerous feature is the direct integration of ClickFix social engineering templates into the attacker’s operator panel. This allows threat actors to automate the entire attack chain from the initial lure to the final data theft, streamlining their operations. The platform’s key capabilities include:

  • Automated ClickFix delivery templates for both Windows and macOS systems.
  • Continuous, real-time credential monitoring post-infection.
  • Automated cryptocurrency wallet cracking and fund transfers.
  • File system searches for cryptocurrency seed phrases and password files.

Therefore, the platform represents a full-service cybercrime toolkit. For more insights on the social engineering tactics often paired with such malware, consider reading about the Anatomy of a Service Desk Social Engineering Attack.

Mitigation Strategies Against Venom Stealer

So, how can organizations defend against this persistent threat? BlackFog researchers recommend a multi-layered defense strategy. First, technical controls can disrupt the attack chain: restrict PowerShell execution where possible, and disable the Run dialog for standard user accounts on Windows systems.

In addition, human vigilance remains paramount. Security awareness training must evolve to help employees recognize and report ClickFix-style social engineering attempts that urge them to run suspicious commands. Furthermore, robust network monitoring is essential. Since Venom Stealer relies on immediate data exfiltration to attacker-controlled servers, monitoring for unusual outbound traffic patterns can provide a crucial detection opportunity.

This means that a combination of technical hardening, user education, and network surveillance forms the best defense. For broader strategies on securing your digital assets, explore our guide on Protecting Against Advanced Data Exfiltration.

An Actively Maintained Threat

The research indicates that Venom Stealer is not a static tool. Evidence points to an actively maintained, full-time development operation, with multiple updates observed as recently as March 2026. This commitment to development suggests the platform’s operators are intent on refining its capabilities and evading detection for the long term, making it a persistent and evolving danger in the cybersecurity landscape.

Continue Reading

Trending