• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. treasury lifts sanctions on three individuals linked to intellexa

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

You are here: Home / General Cyber Security News / U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
December 31, 2025

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa Consortium, the holding company behind a commercial spyware known as Predator, from the specially designated nationals list.

The names of the individuals are as follows –

  • Merom Harpaz
  • Andrea Nicola Constantino Hermes Gambazzi
  • Sara Aleksandra Fayssal Hamou

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Hamou was sanctioned by OFAC in March 2024, and Harpaz and Gambazzi were targeted in September 2024 in connection with developing, operating, and distributing Predator. It’s currently not known why they were removed from the list.

Harpaz is said to be working as a manager of Intellexa S.A., while Gambazzi was identified as the owner of Thalestris Limited and Intellexa Limited. Thalestris, Treasury Department said, held the distribution rights to the spyware, and processed transactions on behalf of other entities within the Intellexa Consortium. It’s also the parent company to Intellexa S.A.

Hamou was listed by the Treasury as one of the key enablers of the Intellexa Consortium, working as a corporate off-shoring specialist in charge of providing managerial services, including renting office space in Greece on behalf of Intellexa S.A. It’s not known if these individuals are still holding the same positions.

At that time, the agency said the proliferation of commercial spyware presents a growing security risk to the U.S. and its citizens. It called for the need to establish guardrails to ensure the responsible development and use of these technologies while balancing human rights and civil liberties of individuals.

“Any hasty decisions to remove sanctions from individuals involved in attacking U.S. persons and interests risk signaling to bad actors that this behavior may come with little consequences as long as you pay enough [money] for fancy lobbyists,” said Natalia Krapiva, senior tech legal counsel at Access Now.

The development comes merely weeks after an Amnesty International report revealed that a human rights lawyer from Pakistan’s Balochistan province was targeted by a Predator attack attempt via a WhatsApp message.

Active since at least 2019, Predator is designed for stealth, leaving little to no traces of compromise, while harvesting sensitive data from infected devices. It’s typically delivered via 1-click or zero-click attack vectors.

Cybersecurity

Similar to NSO Group’s Pegasus, the tool is officially marketed for counterterrorism and law enforcement use. But investigations have revealed a broader pattern of its deployment against civil society figures, including journalists, activists, and politicians.

An investigation from Recorded Future published this month found continued use of Predator despite increased public reporting and international measures.

“Several key trends are shaping the spyware ecosystem, including growing balkanization as companies split along geopolitical lines, with some sanctioned entities seeking renewed legitimacy through acquisitions while others shift toward regions with weaker oversight,” the Mastercard-owned company said.

“Furthermore, rising competition and secrecy surrounding high-value exploit technologies are heightening risks of corruption, insider leaks, and attacks on spyware vendors themselves.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «csa issues alert on critical smartermail bug allowing remote code CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
  • CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
  • How to Integrate AI into Modern SOC Workflows
  • Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
  • ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
  • MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
  • Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

Copyright © TheCyberSecurity.News, All Rights Reserved.