Company Check : Italian Spyware Firm Accused of Distributing Malicious Apps

According to TechCrunch, it’s alleged that Italian spyware maker SIO has been distributing malicious Android apps designed to masquerade as WhatsApp and other widely used applications while covertly harvesting sensitive data from targeted devices.

The spyware, dubbed ‘Spyrtacus,’ has been operating undetected for years, raising fresh concerns about government-backed surveillance tools and the extent of their reach.

It’s been reported that the discovery was triggered late last year when a security researcher provided TechCrunch with three suspicious Android apps, believed to be government spyware used in Italy. Following independent analyses by Google and mobile security firm Lookout, it was confirmed that these apps contained spyware designed to infiltrate users’ devices. Spyrtacus has been found capable of stealing text messages, social media chats, and contact details, recording calls and ambient audio, and even taking images via a device’s cameras.

SIO, the company behind the spyware, is an Italian firm that sells surveillance tools to the Italian government. Lookout has reported that Spyrtacus samples were found to be embedded within apps mimicking popular services, including those belonging to Italian mobile providers TIM, Vodafone, and WINDTRE. It’s alleged that these fraudulent applications were distributed through malicious websites disguised as official sources. While Google confirmed that no versions of this malware exist on its Play Store, a 2024 report by Kaspersky suggests that earlier versions were available there in 2018 before moving to independent distribution channels.

The spyware appears to have been used in a highly targeted campaign, but the identities of those affected remain unclear. Given that the apps and distribution sites were in Italian, security analysts believe that law enforcement agencies in Italy were the likely operators of the campaign. The scandal comes amid separate allegations that Israeli spyware firm Paragon provided sophisticated surveillance tools used against journalists and NGO founders in Italy.

Kristina Balaam, a researcher at Lookout, revealed that 13 distinct Spyrtacus samples had been identified, with the earliest dating back to 2019 and the most recent traced to October 2024. The continued presence of these samples across multiple years highlights the persistence of state-sponsored spyware and its evolving distribution methods. Also, Kaspersky researchers report finding indications of a Windows version of Spyrtacus and possible variants for iOS and macOS, suggesting a broader cross-platform surveillance effort.

Despite multiple requests for comment, neither SIO nor its senior executives, including CEO Elio Cattaneo, CFO Claudio Pezzano, and CTO Alberto Fabbri, have responded to the allegations. Also, the Italian government and Ministry of Justice have remained silent on the issue, leaving major questions unanswered about the scope and legality of such surveillance operations. The case adds to growing concerns about the global spyware industry and the blurred lines between national security and invasive digital espionage.

What Does This Mean For Your Business?

The allegations against SIO and its Spyrtacus spyware highlight growing concerns over state-backed surveillance and the ethical boundaries of digital espionage. While governments often justify such tools for security purposes, the secrecy surrounding their use raises serious questions. The knowledge of the deployment of spyware disguised as legitimate apps undermines public trust and exposes broader cybersecurity risks.

For UK businesses, this case is a reminder of the dangers posed by sophisticated malware. While not direct targets, organisations handling sensitive data must remain vigilant against similar threats. The methods used, i.e. malicious websites and fake applications, demonstrate vulnerabilities that cybercriminals could exploit.

More widely, this case reflects the unchecked expansion of the spyware industry. With no accountability from SIO or the Italian government, concerns grow over how such tools can be used without oversight. Stronger international regulations are needed to balance security with the protection of civil liberties, or the lines between lawful surveillance and invasive digital monitoring will only continue to blur.

Security Stop Press : Cyber Criminals Exploit Trusted Platforms in LOTS Attacks

Cyber criminals are exploiting trusted services like Microsoft, Google, and DocuSign to deliver malware and phishing attacks.

Known as Living off Trusted Services (LOTS), this tactic allows them to evade detection by leveraging widely used platforms.

Mimecast’s H2 2024 Global Threat Intelligence Report flagged LOTS attacks as a growing concern, with over 5 billion threats detected. Attackers use CAPTCHAs to block security scans and host malicious payloads on cloud platforms.

By infiltrating third-party providers, cyber criminals gain deep access to networks, making detection difficult. Traditional security measures based on domain reputation and authentication often fail.

To defend against LOTS attacks, businesses should implement AI-driven threat detection, Zero Trust policies, enhanced email security, and user training to mitigate risks and prevent exploitation of trusted services.

Sustainability-in-Tech : Global Electricity Demand Soaring

The world’s electricity consumption is forecast to rise at its fastest pace in recent years, growing at close to 4 per cent annually through 2027, according to a new report by the International Energy Agency (IEA).

The “Age of Electricity”

This IEA report states that the sharp acceleration is being driven by a combination of industrial expansion, the rapid rise of data centres, increasing air conditioning demand, and the global push towards electrification. The report’s findings therefore (as the world enters what the IEA describes as the “Age of Electricity,”) can renewable energy and sustainability measures keep up with surging demand?

What’s Driving The Surge in Demand?

According to the IEA’s Electricity 2025 report, global electricity demand surged by 4.3 per cent in 2024 and is expected to continue rising at a similar rate, adding the equivalent of Japan’s entire annual electricity consumption to the grid each year! The scale of growth looks to be unprecedented, with global consumption set to increase by a massive 3,500 terawatt-hours (TWh) between 2025 and 2027.

Most of this additional demand looks likely to come from emerging economies, particularly China, India, and Southeast Asia, which will account for 85 per cent of global growth. China alone saw a 7 per cent increase in electricity consumption in 2024 and is projected to maintain an average growth rate of 6 per cent through 2027. The key drivers include the rise of electricity-intensive industries, particularly in manufacturing sectors linked to clean energy technologies such as solar panels, batteries, and electric vehicles (EVs). For example, in 2024, these industries consumed over 300 TWh of electricity, the equivalent of Italy’s entire annual power usage!

Meanwhile, India’s electricity demand is projected to grow at an annual rate of 6.3 per cent, outpacing its 5 per cent average growth over the past decade. Also, air conditioning use in India is soaring as temperatures rise due to climate change, with electricity demand for cooling contributing significantly to the overall increase.

The Rise of Energy-Hungry Sectors

Beyond industrial production, the global appetite for electricity is being fuelled by the rapid expansion of data centres and digital infrastructure. The explosion of artificial intelligence (AI), cloud computing, and 5G networks is contributing to massive and unprecedented electricity consumption. For example, in the United States alone, electricity demand from data centres is expected to grow so significantly that it will add the equivalent of California’s current power consumption to the national grid within three years.

Electric vehicle (EV) adoption also appears to be a major factor. The IEA notes that China’s EV fleet grew to 30 million vehicles in 2024, a near tenfold increase from 2021. Charging infrastructure expansion is set to push electricity demand even higher in the coming years.

Air conditioning is another major player in this surge. With climate change causing increasingly severe heatwaves, demand for cooling systems is soaring, particularly in emerging economies where AC penetration is still relatively low. The IEA highlights that in China, cooling already accounts for up to 40 per cent of peak electricity demand in some provinces, and demand is set to rise sharply.

Can Low-Carbon Energy Keep Up?

Thankfully, there is some good news, which is that renewables and nuclear power are expanding rapidly and, according to the IEA, should be able to meet nearly all the additional electricity demand by 2027. Solar photovoltaic (PV) energy, in particular, is leading the way. Solar generation surpassed coal in the European Union in 2024 and is expected to account for roughly half of global electricity demand growth through 2027.

China, the US, and India are all expected to see solar power exceed 10 per cent of their total electricity generation within the next three years. Wind power is also set to play a key role, meeting about one-third of the additional demand.

Also, it seems that nuclear power is undergoing a revival. The IEA forecasts that nuclear electricity generation will hit record highs each year from 2025 onwards, driven by a resurgence in nuclear projects in China, India, Korea, and France, as well as the reopening of previously shuttered plants in Europe and the US.

The Carbon Emissions Challenge

Despite the strong growth in renewables, global CO2 emissions from electricity generation are projected to plateau rather than decline in the coming years. The IEA warns that while coal-fired electricity generation is stagnating, fossil fuel use remains high, particularly in India and Southeast Asia. Although emissions in Europe and the US are declining, overall global emissions from electricity generation stood at a staggering 13.8 billion tonnes of CO2 in 2024.

Volatile Electricity Prices

One other critical issue highlighted in the report is the increasing volatility of electricity prices, largely due to the growing reliance on weather-dependent renewables. Instances of negative electricity prices (something that UK users can only dream about) where energy producers pay customers to use power, are becoming more common in markets where renewable output outpaces grid flexibility. The IEA states, “Negative pricing events highlight the need for greater system flexibility and storage solutions to accommodate variable renewable generation.”

The Risk of Grid Instability

Extreme weather events are also adding pressure to electricity systems worldwide. The IEA report details how winter storms, hurricanes, droughts, and heatwaves have caused widespread power outages in multiple countries. In 2024, severe weather disrupted electricity supply across the US, Australia, and Latin America, exposing vulnerabilities in grid resilience.

As Keisuke Sadamori, IEA Director of Energy Markets and Security, warns: “Ensuring a secure, affordable, and sustainable electricity supply is becoming increasingly complex. Policymakers need to urgently strengthen grid infrastructure, improve storage capacity, and enhance flexibility to cope with changing energy dynamics.”

The report stresses the need for significant investment in grid modernisation, energy storage, and demand-side management to prevent blackouts and price spikes as electricity consumption continues to soar.

What Does This Mean For Your Organisation?

The IEA’s findings paint a picture of a world that’s entering a new era of electricity consumption at an unprecedented pace. The rapid growth in demand (largely driven by industrial expansion, data centres, EV adoption, and air conditioning) looks like presenting some major challenges. While the acceleration of renewable energy and nuclear power is encouraging, it’s difficult not to ask the question ‘can these clean energy sources keep pace with the soaring appetite for electricity, especially in emerging economies?’

One of the most pressing concerns is, of course, the impact on global carbon emissions. Despite the expansion of renewables, the fact that emissions from electricity generation are likely to plateau rather than decline is a stark reminder of the continued reliance on fossil fuels. This highlights the urgency for policymakers to not only scale up clean energy but also implement stronger measures to phase out coal and gas-fired power generation. Grid instability and electricity price volatility further complicate the landscape, raising concerns about energy security and affordability, especially as extreme weather events become more frequent.

For UK businesses, these developments have significant implications. On one hand, the transition towards renewables could present opportunities for investment in energy-efficient technologies, on-site solar generation, and demand-side management solutions. Businesses with high energy consumption will need to adapt to potential price fluctuations and grid challenges, making resilience and sustainability key priorities. Furthermore, with data centres and AI-driven industries driving much of the global electricity surge, UK tech firms will need to assess the long-term viability of their energy strategies to remain competitive in an increasingly power-hungry digital economy.

It seems, therefore, that the world’s ability to navigate this energy transformation will depend on a combination of strategic investment, technological innovation, and policy reform. The rise in electricity demand is not inherently problematic (after all, electrification is crucial for decarbonisation) but without the right infrastructure and regulatory frameworks, it could become a bottleneck rather than a catalyst for progress. As we move deeper into the “Age of Electricity,” striking the right balance between growth, sustainability, and stability will be paramount.

Tech Tip – Right-Click the Start Button for a Quick Admin Menu

You don’t always need to go through multiple menus to access key system tools—there’s a shortcut! Here’s how it works:

How to:

– Right-click the Start button (or press Win + X).

– This opens a hidden menu with direct access to Task Manager, Device Manager, Power Options, and more.

– This is ideal for quickly accessing system settings without searching.

Featured Article : UK Government Demands Apple Reveal Your Data

The UK government has reportedly ordered Apple to grant it access to encrypted data stored in iCloud by users worldwide, a move that has sparked fierce debate over privacy, security, and government surveillance.

IPA

The demand, issued under the Investigatory Powers Act 2016 (IPA), represents one of the most significant clashes between a government and a major technology company over encryption and data protection.

What Has the UK Government Demanded?

According to recent reports (first published by The Washington Post and later confirmed by other media sources), the UK Home Office has served tech giant Apple with a “technical capability notice” under the IPA. This notice legally compels companies to provide law enforcement agencies with access to data, even if it is encrypted.

The government’s demand specifically targets Apple’s Advanced Data Protection (ADP) feature, which offers end-to-end encryption for iCloud storage. This means that only the user has the decryption keys and even Apple itself cannot access the data. By enforcing this demand, the UK government appears to be seeking the ability to bypass or weaken this encryption, potentially gaining access to vast amounts of personal data stored by Apple users worldwide.

It’s been reported that when asked about the order, a Home Office spokesperson declined to confirm or deny its existence, stating, “We do not comment on operational matters, including, for example, confirming or denying the existence of any such notices.”

Why Is the UK Government Doing This?

The UK government argues that encryption enables criminals, including terrorists and child abusers, to evade law enforcement. The National Society for the Prevention of Cruelty to Children (NSPCC) has previously criticised Apple’s encryption policies, arguing that they hinder efforts to track down online child abuse networks.

The UK’s intelligence agencies have long pushed for greater access to encrypted communications, claiming that end-to-end encryption makes it harder to investigate serious crimes. Officials insist that their goal is not mass surveillance but rather targeted access to individuals who pose security threats.

The Global Ramifications of Apple’s Response

The UK’s demand for access to encrypted iCloud data has raised global concerns over privacy and security. Security experts warn that creating a backdoor, even for government use, could expose vulnerabilities that may be exploited by cybercriminals or authoritarian regimes.

Apple now faces a difficult decision. Reports suggest that instead of complying with the UK order, Apple may remove the Advanced Data Protection feature for UK users altogether. While this would protect encryption standards globally, it would leave UK users more vulnerable to potential government access.

Privacy advocates, including Big Brother Watch, have condemned the UK’s move, calling it a “draconian overreach” that could set a precedent for other governments to demand similar access. The U.S.-based Electronic Frontier Foundation described the order as a global security emergency, warning that if Apple concedes, it could open the floodgates for further government-mandated backdoors worldwide.

Also, the timing of the order raises concerns. Recent revelations of large-scale cyber espionage campaigns, including Chinese state-sponsored hacks on telecoms firms, highlight the importance of strong encryption. Critics argue that weakening encryption in the name of security could paradoxically increase risks, exposing sensitive data to foreign adversaries and malicious actors.

The outcome of Apple’s decision will be closely watched by governments, privacy groups, and other tech giants, as it could define the future of encryption policies worldwide.

Privacy and Security Experts React

Privacy campaigners and cybersecurity experts have strongly condemned the UK government’s move.

For example, Rebecca Vincent, interim director of civil liberties group Big Brother Watch, described the demand as “an unprecedented attack on privacy rights that has no place in any democracy” and added that “we all want the government to be able to effectively tackle crime and terrorism, but breaking encryption will not make us safer. Instead, it will erode the fundamental rights and civil liberties of the entire population, and it will not stop with Apple.”

Professor Alan Woodward, a cybersecurity expert from the University of Surrey, has been quoted as saying he was “stunned” by the news, warning that creating a backdoor into encrypted systems poses a significant risk. “Once such an entry point is in place, it is only a matter of time before bad actors also discover it,” he cautioned.

Dangerous Precedent

On his X feed, Professor Woodward also said: “I fear the UK govt is being badly advised in picking this fight. For one thing, President Trump doesn’t welcome foreign regulation of US tech companies.”

Other major tech firms will be closely watching Apple’s response. If the UK government succeeds in forcing Apple to break its encryption, it could set a dangerous precedent, leading to similar demands for data access from other governments worldwide.

Can Apple Stop It?

Apple does have legal avenues to challenge the order. Under the IPA, companies can appeal. However, the law also states that compliance must continue during the appeals process, meaning Apple would have to implement the changes even as it fights the ruling in court.

If Apple refuses to comply outright, the UK government could impose financial penalties or take further legal action against the company. Given Apple’s previous stances on encryption, a legal battle between the tech giant and the UK government seems highly likely.

What Can Apple Users Do to Protect Their Data?

For concerned Apple users, there are a few steps to enhance personal data security:

– Turn off iCloud backups. Without iCloud backups, there would be no cloud-stored data for the government to access. However, this also means losing the ability to recover data if a device is lost or damaged.

– Use local device encryption. Data stored directly on Apple devices remains encrypted with hardware security features, making it more difficult for third parties to access.

– Enable two-factor authentication. This adds an extra layer of security to Apple accounts.

– Stay informed. Users should keep up to date with Apple’s response to this demand and any changes in privacy policies.

What Happens Next?

If the UK government successfully enforces this demand, it could mark the beginning of widespread government intervention in encrypted services. Other Western governments, including the United States, have previously attempted to pressure Apple into providing encryption backdoors, but so far, the company has resisted.

This case could be regarded, therefore, as being a crucial test of how far governments can push back against end-to-end encryption. If Apple bows to UK demands, it could embolden other governments to seek similar access. On the other hand, if Apple stands firm, it could set a precedent for other tech firms to resist government pressure on encryption.

Also, this may not stop with Apple. The UK government has previously targeted encrypted messaging services, such as Meta’s WhatsApp. In 2023, the UK government threatened to ban WhatsApp unless it provided a mechanism to scan encrypted messages for harmful content, a move that was widely criticised by privacy advocates. Other end-to-end encrypted services, including Signal and Telegram, could also face similar demands in the near future.

For now, the battle between Apple and the UK government is far from over. Whether the UK government backs down, Apple fights and wins, or encryption is permanently weakened, the outcome will have lasting implications for digital privacy and security worldwide.

What Does This Mean for Your Business?

The UK government’s demand for access to Apple users’ encrypted data has raised some fundamental questions about the balance between security, privacy, and government oversight in the digital age. While law enforcement agencies argue that such measures are necessary to combat serious crimes, critics warn that undermining encryption sets a dangerous precedent that could weaken security for all users.

At the heart of this debate is the issue of trust i.e., trust in governments to act proportionately and trust in technology companies to uphold user privacy. If Apple concedes to the UK’s demand, it could signal the beginning of wider state intervention in encrypted services, potentially opening the door for similar requests from other nations. However, if Apple refuses, it risks legal repercussions, financial penalties, or even restrictions on its UK operations. This standoff will be watched closely not only by tech firms and governments but also by privacy advocates and cybersecurity experts worldwide.

The case highlights the ever-growing tension between technological advancements and regulatory controls. Encryption is not just a tool for privacy but is also a safeguard against cyber threats, corporate espionage, and authoritarian overreach. Weakening it in the name of security may, paradoxically, create more vulnerabilities rather than resolve them.

Whatever the outcome, this confrontation is unlikely to be the last of its kind. As digital privacy becomes an increasingly contested space, both governments and tech companies will continue to grapple with the difficult task of balancing individual rights with national security. Whether Apple’s response sets a new global standard or merely delays the inevitable, the impact of this battle will be felt far beyond the UK’s borders.

For UK businesses that rely on Apple’s encrypted services, the implications could be significant. Many companies depend on end-to-end encryption to protect sensitive corporate data, financial transactions, and confidential communications. Also, compliance with UK government demands could create conflicts with data protection regulations, such as GDPR, raising legal uncertainties for organisations handling customer and client information. If Apple withdraws certain encryption services from the UK market, businesses may be left searching for alternative, potentially less secure, solutions. In a global economy where data security is paramount, UK firms could find themselves at a competitive disadvantage compared to counterparts operating in jurisdictions with stronger privacy protections.

Each week we bring you the latest tech news and tips that may relate to your business, re-written in an techy free style. 

Archives