{"id":415380,"date":"2026-04-24T15:11:08","date_gmt":"2026-04-24T15:11:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/415380\/"},"modified":"2026-04-24T15:11:08","modified_gmt":"2026-04-24T15:11:08","slug":"another-spyware-maker-caught-distributing-fake-android-snooping-apps","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/415380\/","title":{"rendered":"Another spyware maker caught distributing fake Android snooping apps"},"content":{"rendered":"<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Yet another government spyware maker has been caught after its customers used fake Android apps to install its surveillance software on targets, according to a new report.<\/p>\n<p class=\"wp-block-paragraph\">On Thursday, Osservatorio Nessuno, an Italian digital rights organization that researches spyware, <a href=\"https:\/\/osservatorionessuno.org\/blog\/2026\/04\/morpheus-a-new-spyware-linked-to-ips-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">published a report<\/a> on a new malware it calls Morpheus. The spyware, which masquerades as a phone updating app, is capable of stealing a broad range of data from an intended target\u2019s device.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The researchers\u2019 findings show that the demand for spyware by law enforcement and intelligence agencies is so high that there are a large number of companies providing this technology, some of whom operate outside of the public spotlight.<\/p>\n<p class=\"wp-block-paragraph\">In this case, Osservatorio Nessuno concluded that the spyware is linked to IPS, an Italian company that has been operating for more than 30 years providing traditional so-called lawful interception technology, meaning tools used by governments to capture a person\u2019s real-time communications that flow through the networks of phone and internet providers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.ips-intelligence.com\/en\/about\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to IPS\u2019 website<\/a>, the company operates in more than 20 countries, though that likely does not refer to its spyware product, which until today was a secret. The company lists several Italian police forces among its customers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">IPS did not respond to TechCrunch\u2019s request for comment about the report.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The researchers called Morpheus \u201clow cost\u201d spyware because it relies on the rudimentary infection mechanism of tricking the targets into installing the spyware on their own.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">More advanced government spyware makers, such as <a href=\"https:\/\/techcrunch.com\/tag\/nso-group\/\" rel=\"nofollow noopener\" target=\"_blank\">NSO Group<\/a> and <a href=\"https:\/\/techcrunch.com\/tag\/paragon-solutions\/\" rel=\"nofollow noopener\" target=\"_blank\">Paragon Solutions<\/a>, allow their government customers to infect their targets with invisible techniques, known as <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-click-one-click-attacks\" rel=\"nofollow noopener\" target=\"_blank\">zero-click attacks<\/a>, which install the malware in a completely stealthy and invisible way by exploiting expensive and difficult-to-find vulnerabilities that break through a device\u2019s security defenses.<\/p>\n<p class=\"wp-block-paragraph\">In this case, the researchers said the authorities had help from the target\u2019s cellphone provider, which began deliberately blocking the target\u2019s mobile data. At that point, the telecom provider sent the target an SMS, prompting them to install an app that was supposed to help them update the phone, and regain cellular data access. This is a strategy that <a href=\"https:\/\/techcrunch.com\/2022\/06\/23\/hermit-zero-day-android-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">has been well documented<\/a> in other cases involving other Italian spyware makers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" height=\"680\" width=\"314\" src=\"https:\/\/www.newsbeep.com\/ie\/wp-content\/uploads\/2026\/04\/ips-spyware-whatsapp.gif\" alt=\"\" class=\"wp-image-3116017\"\/>Image Credits:Osservatorio Nessuno<\/p>\n<p class=\"wp-block-paragraph\">Once the spyware was installed, it abused Android\u2019s in-built accessibility features, which allows the spyware to read the data on the victim\u2019s screen and interact with other apps. The malware was designed to access all kinds of information on the device, according to the researchers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The spyware then prompted a fake update, showed the target a reboot screen, and finally spoofed the WhatsApp app asking the target to provide their biometrics to prove that it\u2019s them. Unbeknownst to the target, the biometric tap granted the spyware full access to their WhatsApp account by adding a device to the account. This is a known strategy <a href=\"https:\/\/techcrunch.com\/2026\/03\/09\/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn\/\" rel=\"nofollow noopener\" target=\"_blank\">used by government hackers in Ukraine<\/a>, as well as <a href=\"https:\/\/techcrunch.com\/2026\/04\/01\/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-was-actually-government-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">in a recent spy campaign in Italy<\/a>.<\/p>\n<p>An old company with a new spyware<\/p>\n<p class=\"wp-block-paragraph\">Osservatorio Nessuno\u2019s researchers, who asked to be referred only with their first names, Davide and Giulio, concluded that the spyware belongs to IPS based on the spyware\u2019s infrastructure.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In particular, one of the IP addresses used in the campaign was registered to \u201cIPS Intelligence Public Security.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The two also found several fragments of code that contained Italian phrases \u2014 something that has seemingly <a href=\"https:\/\/techcrunch.com\/2025\/02\/13\/spyware-maker-caught-distributing-malicious-android-apps-for-years\/#:~:text=According%20to%20Lookout%20and%20the%20other%20unnamed,of%20the%20traditional%20Neapolitan%20song%20%E2%80%9CGuapparia.%E2%80%9D\" rel=\"nofollow noopener\" target=\"_blank\">become<\/a> <a href=\"https:\/\/www.vice.com\/en\/article\/hackers-hid-android-malware-in-google-play-store-exodus-esurv\/#:~:text=The%20first%20hint,footballer%20from%20Calabria.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">tradition<\/a> among the Italian spyware industry. The malware code included words in Italian, including references to Gomorra, the famous book and TV show about the Neapolitan mob, and \u201cspaghetti.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Davide and Giulio told TechCrunch that they can\u2019t provide specifics about who the target was, but they said they believe the attack is \u201crelated to political activism\u201d in Italy, a world where \u201cthis type of targeted attacks are very common nowadays.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">A researcher at a cybersecurity firm told TechCrunch that their company has been tracking this specific malware. After reviewing the Osservatorio Nessuno report, the researcher said that the malware is definitely developed by an Italian surveillance tech maker.<\/p>\n<p class=\"wp-block-paragraph\">IPS is the latest in a long list of Italian spyware makers that have filled the void left by the long-defunct Italian company Hacking Team, one of the first spyware makers in the world. The company controlled a large share of the local market apart from selling abroad before it was hacked, and later sold and rebranded. In recent years, researchers have publicly exposed several Italian spyware makers, including <a href=\"https:\/\/www.vice.com\/en\/article\/a-spyware-vendor-seemingly-made-a-fake-whatsapp-to-hack-targets\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CY4GATE<\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/government-spyware-maker-doxes-itself-by-linking-to-its-site-in-malware-code\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GR Sistemi<\/a>, <a href=\"https:\/\/www.intelligenceonline.com\/europe-russia\/2023\/11\/08\/italian-cyber-intelligence-specialist-movia-goes-global,110085487-art\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Movia<\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/malware-to-spy-hack-iphones\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Negg<\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/malware-hunters-catch-new-android-spyware-raxir\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Raxir<\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/rcs-lab-government-spyware-infects-a-computer-in-this-leaked-demo-video\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">RCS Lab<\/a>, and most recently <a href=\"https:\/\/techcrunch.com\/2025\/02\/13\/spyware-maker-caught-distributing-malicious-android-apps-for-years\/\" rel=\"nofollow noopener\" target=\"_blank\">SIO<\/a>.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Earlier this month <a href=\"https:\/\/techcrunch.com\/2026\/04\/01\/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-was-actually-government-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">WhatsApp notified around 200 users<\/a> who installed a fake version of the app, which was actually spyware made by SIO. In 2021, Italian prosecutors <a href=\"http:\/\/vice.com\/en\/article\/prosecutors-suspend-cy4gate-government-spyware-used-in-whatsapp-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">suspended their use<\/a> of CY4GATE and SIO spyware due to serious malfunctions.<\/p>\n<p>When you purchase through links in our articles, <a href=\"https:\/\/techcrunch.com\/techcrunch-affiliate-monetization-standards\/\" rel=\"nofollow noopener\" target=\"_blank\">we may earn a small commission<\/a>. This doesn\u2019t affect our editorial independence.<\/p>\n","protected":false},"excerpt":{"rendered":"Yet another government spyware maker has been caught after its customers used fake Android apps to install its&hellip;\n","protected":false},"author":2,"featured_media":415381,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[3312,14480,14481,61,78999,77828,60,102,5702,14484,19636,80],"class_list":{"0":"post-415380","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-cybersecurity","9":"tag-hackers","10":"tag-hacking","11":"tag-ie","12":"tag-infosec","13":"tag-ips","14":"tag-ireland","15":"tag-italy","16":"tag-privacy","17":"tag-spyware","18":"tag-surveillance","19":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/415380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=415380"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/415380\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/415381"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=415380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=415380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=415380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}