An Israeli spyware firm, Paragon Solutions, accidentally exposed its secretive Graphite control panel in a LinkedIn post, drawing sharp criticism from cybersecurity experts. The blunder offers a rare glimpse into the tool’s operations
targeting encrypted communications.
Founded in 2019 in Israel, Paragon markets Graphite as sophisticated surveillance software, granting remote access to cell phones. Dubbed “
mercenary spyware,” it infiltrates devices without user interaction,
extracting messages from apps like WhatsApp and Signal, stored data, and live communications.
WhatsApp accused Paragon in early 2025 of targeting 90 journalists and civil society figures via zero-click vulnerabilities, including Italian editor Francesco Cancellato of Fanpage.it. Citizen Lab linked Graphite to infrastructure in Israel and confirmed forensic artifacts like “BIGPRETZEL” on infected Android devices.
Paragon’s clients include governments in Australia, Canada, Cyprus, Denmark, Israel, and Singapore, per Citizen Lab analysis. In January 2025, the Trump administration publicly noted U.S. government purchases of Graphite to support ICE operations.
An Israeli spyware firm, Paragon Solutions, accidentally exposed its secretive Graphite control panel in a LinkedIn post, drawing sharp criticism from cybersecurity experts.
cybersecuritynews.com