Israeli firm’s spyware linked to attacks on websites in UK and Middle East

Canada-based researchers say new evidence suggests Candiru’s software used to target critics of autocratic regimes

Researchers have found new evidence that suggests spyware made by an Israeli company that was recently blacklisted in the US has been used to target critics of Saudi Arabia and other autocratic regimes, including some readers of a London-based news website.

A report by Montreal-based researchers from Slovakian company Eset, an internet security firm, found links between attacks against high-profile websites in the Middle East and UK, and the Israeli company Candiru, which has been called Israel’s “most mysterious cyberwarfare company”.

Candiru and NSO Group, a much more prominent Israeli surveillance company, were both added to a US blacklist this month after the Biden administration took the rare step of accusing the firms of acting against US national security interests.

Sign up to our weekly technology newsletter, TechScape.

The Eset report revealed new information about so-called “watering hole attacks”. In such attacks, spyware users launch malware against ordinary websites that are known to attract readers or users who are considered “targets of interest” by the user of the malware.

The sophisticated attacks allow the malware user to identify characteristics about the individuals who have visited the website, including what kind of browser and operating system they are using. In some cases the malware user can then launch an exploit that allows them to take over an individual target’s computer.

Unlike NSO Group’s signature spyware, which is called Pegasus and infects mobile phones, Candiru’s malware is believed by researchers to infect computers. The company appears to be named after a parasitic freshwater catfish that can be found in the Amazon.

The researchers found that the websites that were “known targets” of this kind of attack included Middle East Eye, a London-based news website, and multiple websites associated with government ministries in Iran and Yemen.

Candiru did not respond to the Guardian’s request for comment.

Middle East Eye condemned the attacks. In a statement, its editor-in-chief, David Hearst, said the outlet was no stranger to attempts to take the website down by state and non-state actors.

“Substantial sums of money have been spent trying to take us out. This has not stopped us reporting what is going on in all corners of the region and I am confident that they will not stop us in future,” he said.

Once websites are compromised, researchers at Eset say, they are considered “jumping off sites” that help malware users target individuals. In other words, not every individual who visited one of the compromised websites would have been in danger of being hacked, but users of the malware are believed to have used the websites as a starting point to help identify a much smaller group of individuals who were then targeted.

Matthieu Faou, who uncovered the campaigns, said Eset developed a custom in-house system in 2018 to uncover “watering holes” on high-profile websites. In July 2020, the system notified them that an Iranian embassy website in Abu Dhabi had been tainted with malicious code.

“Our curiosity was aroused by the high-profile nature of the targeted website, and in the following weeks we noticed that other websites with connections to the Middle East were also targeted,” Faou said.

The “threat group” then “went quiet” until it resurfaced in January 2021 and was active until late summer in 2021, when all the websites that were observed to have been victims of attacks were then “cleaned”, Eset said.

Eset said it believed hacking activities ended in late July 2021 after a report by researchers at Citizen Lab, released in conjunction with Microsoft, detailed Candiru’s alleged surveillance activities. That report accused Candiru of selling spyware to governments linked to fake Black Lives Matter and Amnesty International websites that were used to hack targets.

In the July 2021 report, Citizen Lab, a research group affiliated with the University of Toronto, said the Tel Aviv-based Candiru made “untraceable” spyware that could infect computers and phones.

At the time, Candiru declined to comment.

Microsoft said in July that it appeared that Candiru sold the spyware that enabled the hacks, and that the governments generally chose who to target and ran the operations themselves. The company also announced at the time that it had disabled the “cyberweapons” of Candiru and built protections against the malware, including issuing a Windows software update.

There is little public information available about Candiru, which was founded in 2014 and has undergone several name changes. In 2017 the company was selling its malware to clients in the Gulf, western Europe and Asia, according to a lawsuit reported in an Israeli newspaper. Candiru may have deals with Uzbekistan, Saudi Arabia and the UAE, Forbes has reported.

Do you have information about this story? Email, or (using a non-work phone) use Signal or WhatsApp to message +1 646 886 8761.

Microsoft reported that it had found victims of the spyware in Israel and Iran. Citizen Lab said it was able to identify a computer that had been hacked by Candiru’s malware, and then used that hard drive to extract a copy of the firm’s Windows spyware. The owner of the computer was a “politically active” individual in western Europe, it said.

This month Candiru made headlines after the Biden administration announced it had added the company to the commerce department’s entity list, a blacklist usually reserved for America’s worst enemies, including Chinese and Russian hackers.

In its press release, the commerce department said it had evidence that Candiru developed and supplied spyware to foreign governments that used it to maliciously target government officials, journalists, businesspeople, activists, academics and embassy workers. The tools also helped to enable foreign governments to conduct “transnational repression”, the department said.

Candiru has not commented on its placement on the entity list.


Stephanie Kirchgaessner in Washington

The GuardianTramp

Related Content

Article image
Israeli firm linked to WhatsApp spyware attack faces lawsuit
Amnesty International fears its staff may be ‘surveilled via NSO Pegasus software’

Dan Sabbagh

18, May, 2019 @5:00 AM

Article image
Hacking of activists is latest in long line of cyber-attacks on Palestinians
Analysis: while identity of hackers is not known in this case, Palestinians have long been spied on by Israeli military

Peter Beaumont

08, Nov, 2021 @4:22 PM

Article image
Israeli firm accused of creating iPhone spyware
Program that can turn iPhones into remote spying devices was allegedly used to target Middle Eastern human rights activist

Peter Beaumont in Jerusalem

26, Aug, 2016 @3:45 PM

Article image
Israeli citizens targeted by police using Pegasus spyware, report claims
Investigation alleges Israeli police carried out phone intercepts without court supervision or monitoring of how data was used

Peter Beaumont

18, Jan, 2022 @2:54 PM

Article image
Police use of Pegasus malware not illegal, Israeli inquiry finds
Police have been accused of spying on at least 26 individuals who are not criminal suspects

Bethan McKernan in Jerusalem

22, Feb, 2022 @6:28 PM

Article image
‘Amoral 21st-century mercenaries’: problems mount for NSO Group
Israeli spyware firm’s problems go from bad to worse as scathing Apple lawsuit follows US blacklisting

Stephanie Kirchgaessner in Washington DC

26, Nov, 2021 @3:37 PM

Article image
US judge: WhatsApp lawsuit against Israeli spyware firm NSO can proceed
NSO Group was sued last year by messaging app owned by Facebook

Stephanie Kirchgaessner in Washington

17, Jul, 2020 @4:27 PM

Article image
Israeli spyware company NSO Group placed on US blacklist
Decision against company at heart of Pegasus project reflects deep concern about impact of spyware on US national security interests

Stephanie Kirchgaessner in Washington

03, Nov, 2021 @7:53 PM

Article image
CEO of Israeli Pegasus spyware firm NSO to step down
CEO Shalev Hulio is stepping down as part of NSO reorganisation that will see it focus on sales in Nato member countries

Staff and agencies

21, Aug, 2022 @11:50 PM

Article image
Inquiry finds Israeli police used spyware against three people, report says
Initial investigation is said to have found NSO Group’s Pegasus tool was used against three of 26 alleged targets

Peter Beaumont

09, Feb, 2022 @12:09 PM