Italy’s Adviser Emerges as New Target in Growing Paragon Graphite Surveillance Probe

Italy’s Adviser Emerges as New Target in Growing Paragon Graphite Surveillance Probe
Italy’s Adviser Emerges as New Target in Growing Paragon Graphite Surveillance Probe
Francesco Nicodemo, a seasoned communications consultant and former Democratic Party director under Matteo Renzi, has been revealed as one of the latest victims in Italy’s unfolding Paragon Graphite surveillance case.

The revelation comes after Nicodemo received a suspicious WhatsApp Support message, which he initially dismissed as a phishing attempt.

However, subsequent messages and calls, most notably from Citizen Lab’s John Scott Railton, confirmed that the controversial Paragon spyware compromised his device a sophisticated surveillance technology believed to be used by government entities for targeted interception.

Having shifted from Android to iPhone days before the notification, Nicodemo later realized the targeted device was an unused phone left at home, raising alarming questions on how the spying tool operates across dormant and abandoned hardware.

Until now, Nicodemo kept his experience private, fearing exploitation by political actors and the media, but recent developments and external confirmation have prompted him to break his silence.

“The abuse of these spying tools is scary,” he stated, voicing concerns about potential overreach and the risks faced by ordinary citizens, activists, and journalists.

The Mechanics of Paragon Graphite: Technical Underpinnings

Paragon Graphite is recognized for its advanced capabilities, often associated with nation-state operations and high-level investigations.

The spyware exploits zero-day vulnerabilities, intercepts network traffic covertly, and leverages advanced privilege escalation techniques to infiltrate mobile devices, gaining access to encrypted communications, call logs, messages, and even real-time microphone audio.

These tools circumvent conventional mobile security barriers, sometimes infecting phones that are powered off, rarely used, or physically distant from their owners, likely through cloud-based or device association exploits.

The mechanics involve silent remote exploitation, with log evidence suggesting device-to-device persistence and multi-vector initial access such as social engineering, malicious attachments, or compromised messaging platforms.

In Nicodemo’s case, the attack vector may have leveraged authentication weaknesses in WhatsApp or exploited dormant phone profiles linked to cloud backups, enabling long-term surveillance and the harvesting of political communications.

Surveillance Amid Election Campaigns: Political Ramifications

Nicodemo’s agency, Lievito, managed communications for opposition candidates in 13 campaigns in 2024, including notable left-wing victories over candidates from Giorgia Meloni’s Brothers of Italy party.

Detailed digital conversations from groups aligned with the Democratic Party, shared with parliamentary candidates and senior officials, may have been compromised, intensifying the political fallout.

Nicodemo’s connections with top political figures, repeated contact with party leadership, and role in shaping opposition messaging suggest the targeting was strategic. Until his disclosure, few in Italy realized the scope or selectivity of Paragon’s reach.

The episode has already spurred calls for government accountability, transparency on nation-state spyware use, and renewed scrutiny of Italy’s cybersecurity posture.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Italy’s Adviser Emerges as New Target in Growing Paragon Graphite Surveillance Probe appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading