Can Cyber Mercenaries and Human Rights Coexist?
This panel discussion explores the intersection of the commercial spyware industry and human rights, focusing on the proliferation of state-sponsored surveillance tools. The speakers analyze the business models of cyber mercenary companies, their targeting of vulnerable populations like journalists and activists, and the role of venture capital in funding these operations. The discussion highlights the challenges of tracking these entities and the limitations of current international regulatory frameworks in curbing the abuse of surveillance technology.
The Business of Zero-Click Exploitation: Tracking the Cyber Mercenary Supply Chain
TLDR: The commercial spyware market has shifted from boutique, state-run operations to a globalized, venture-backed industry that sells zero-click exploits to the highest bidder. These tools, such as those developed by NSO Group and Intellexa, are increasingly used to target journalists and activists, often bypassing traditional perimeter defenses. For researchers and pentesters, the key is to stop viewing these as isolated incidents and start mapping the infrastructure and financial backing that sustain these mercenary groups.
The cybersecurity industry often fixates on the "who" behind an attack, but the "how" of the commercial spyware market is far more revealing. We are no longer dealing with a handful of nation-state actors building bespoke malware in a basement. We are looking at a multi-billion dollar industry that operates with the same venture capital, sales cycles, and product roadmaps as any Silicon Valley startup. The difference is that their product is a zero-click exploit chain, and their customers are governments with questionable human rights records.
The Mechanics of the Mercenary Model
Cyber mercenary companies like NSO Group and Intellexa have commoditized the most difficult part of offensive security: the initial access. By focusing on zero-click exploits, they remove the need for user interaction, which is the primary hurdle for most traditional phishing-based campaigns. These exploits often target the deepest layers of mobile operating systems, such as the iMessage or WhatsApp stacks, where a single malformed packet can lead to full device compromise.
From a technical perspective, these companies are not just selling a payload; they are selling a managed service. They provide the infrastructure to host the command-and-control servers, the obfuscation layers to evade detection, and the post-exploitation frameworks to exfiltrate data. When a target is compromised, the operator doesn't need to know how the exploit works. They simply log into a dashboard, select the target, and wait for the data to flow.
Following the Money and the Infrastructure
Tracking these entities requires a shift in methodology. If you are a researcher, you cannot rely on static signatures or simple IP blacklists. These groups are masters of infrastructure rotation. They use domain fronting and complex proxy chains to hide their C2 traffic. However, they cannot hide their financial footprint.
The industry relies on venture capital to scale. When a company like Intellexa or NSO Group is sanctioned or exposed, the capital often just moves to a new entity in a different jurisdiction. We have seen a clear migration of these companies from Western Europe to places like Cyprus and Spain, where regulatory oversight is often less stringent.
For a pentester, the most effective way to identify these threats is through mobile device log analysis. Look for anomalies in system processes that shouldn't be communicating with external IPs. If you are performing a red team engagement, you can simulate these threats by focusing on the T1448 mobile device compromise technique. This involves testing how your client's mobile fleet handles unexpected traffic from unknown sources and whether their MDM solutions can detect unauthorized configuration changes.
The Illusion of Plausible Deniability
One of the most dangerous aspects of this industry is the plausible deniability it provides to the purchasing governments. When a journalist is targeted, the government can claim they had no involvement, pointing to the "private company" that provided the tool. This is a deliberate feature of the business model. By outsourcing the development and deployment of the exploit, the state creates a layer of separation that is difficult to penetrate through legal or diplomatic channels.
The only way to break this cycle is to increase the cost of doing business for these companies. This means exposing their infrastructure, identifying their employees, and pressuring the venture capital firms that fund them. When the risk of being exposed outweighs the profit from a government contract, the business model begins to fail.
What Comes Next
Defenders need to stop treating mobile devices as "black boxes." If you are managing a high-risk environment, you must implement strict network-level monitoring for mobile devices. Use tools that can inspect encrypted traffic at the gateway and look for patterns consistent with C2 communication. More importantly, advocate for transparency in your organization's procurement process. If you are buying security tools, know who is building them and what their track record is.
The era of the "lone wolf" hacker is over. We are in the era of the corporate-grade cyber mercenary. If we want to defend against them, we have to be as organized, as persistent, and as well-funded as they are. Start by mapping the supply chain of the tools you use, and don't be afraid to ask the hard questions about where your security software is actually coming from. The next time you see a suspicious process on a mobile device, don't just kill it. Trace it back to the infrastructure, and you might just find the next mercenary operation before they find their next target.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




