Italian Political Consultant Claims He Was Targeted with Israeli Paragon Spyware
An Italian political consultant says his phone was infected with spyware developed by Israeli surveillance firm Paragon, a revelation that raises new concerns about the growing use of military-grade hacking tools against civilians and political figures in Europe.
According to cybersecurity researchers who examined the device, the intrusion occurred earlier this year through Paragon’s “Graphite” spyware, a sophisticated tool capable of remotely accessing messages, camera feeds, and microphones on both iOS and Android devices.
The consultant, whose identity has not been publicly disclosed for security reasons, was working with multiple European political organizations when he noticed unusual device behavior and contacted independent analysts.
How the Spyware Works
Paragon’s Graphite spyware has been described by experts as one of the most advanced surveillance tools in circulation - on par with NSO Group’s Pegasus, which was at the center of a global scandal involving government surveillance of journalists and activists.
Graphite reportedly exploits zero-click vulnerabilities, meaning it can infect phones without the victim clicking or opening any link. Once installed, it allows full access to personal communications, location history, and app data, while maintaining stealth operations that evade detection.
Security analysts believe the attack was state-sponsored, though investigators have not identified which government may have ordered the surveillance.
Political Implications in Europe
The alleged targeting comes amid growing alarm within the European Union over the use of commercial spyware in domestic and cross-border surveillance. EU lawmakers have called for stricter regulations and a potential ban on spyware exports linked to human rights violations.
Last year, the European Parliament launched an inquiry into illegal surveillance operations in several member states. The investigation highlighted how companies like NSO Group, Intellexa, and Paragon continue to operate in legal gray zones — marketing their products to both state agencies and private clients under national security exemptions.
In a statement to TechCrunch, Paragon declined to comment on the specific case but said its software “is licensed exclusively to vetted government entities for the purpose of lawful investigations.”
Human rights organizations, however, argue that such assurances are meaningless without independent oversight. “The recurring pattern is the same: claims of lawful use followed by proof of political targeting,” said one European digital rights advocate.
The Broader Cyber Arms Race
Paragon was founded by Ehud Schneorson, a former Israeli intelligence commander, and has received investment from U.S.-based venture firms. Its tools are marketed as “next-generation lawful interception,” focusing on counterterrorism and organized crime.
But as with Pegasus, once these technologies escape direct state control, they risk being deployed for political espionage or corporate surveillance.
Cybersecurity analysts warn that the incident in Italy underscores how spyware proliferation is eroding digital privacy across democracies, with each new revelation chipping away at public trust in both governments and tech firms.
What Happens Next
Italy’s national cyber authority has reportedly opened an inquiry into the case, while members of the European Data Protection Board (EDPB) are pushing for a unified framework that limits the deployment of surveillance technology within the bloc.
For now, the consultant remains under digital protection, his devices isolated for forensic analysis. If verified, this incident would mark the first known case of Paragon spyware targeting an EU-based political figure, adding a new chapter to Europe’s ongoing spyware crisis.

Comments
Post a Comment