<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[NEW: Researchers have have exposed yet another spyware maker that makes fake Android apps for its government customers.]]></title><description><![CDATA[<p>NEW: Researchers have have exposed yet another spyware maker that makes fake Android apps for its government customers. The apps were pushed with help of telecom providers.</p><p>And it's yet another Italian company: IPS. Until now, IPS was only known to make traditional wiretapping surveillance systems. </p><p>The researchers tied the spyware to IPS thanks to an IP address used in its infrastructure that was registered to “IPS Intelligence Public Security.” </p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://techcrunch.com/2026/04/24/another-spyware-maker-caught-distributing-fake-android-snooping-apps/" title="Another spyware maker caught distributing fake Android snooping apps | TechCrunch">
<img src="https://techcrunch.com/wp-content/uploads/2021/09/android-spyware-malloc.jpg?resize=1200,751" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://techcrunch.com/2026/04/24/another-spyware-maker-caught-distributing-fake-android-snooping-apps/">
Another spyware maker caught distributing fake Android snooping apps | TechCrunch
</a>
</h5>
<p class="card-text line-clamp-3">Researchers have found a new case where government authorities used a fake Android app to plant spyware on a target’s phone. The company that allegedly developed the spyware was not previously known to sell this type of software.</p>
</div>
<a href="https://techcrunch.com/2026/04/24/another-spyware-maker-caught-distributing-fake-android-snooping-apps/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://techcrunch.com/wp-content/uploads/2015/02/cropped-cropped-favicon-gradient.png?w=32" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />







<p class="d-inline-block text-truncate mb-0">TechCrunch <span class="text-secondary">(techcrunch.com)</span></p>
</a>
</div></p>]]></description><link>https://board.circlewithadot.net/topic/15e980ac-7b4a-46be-8aac-36d1aeb4d1ff/new-researchers-have-have-exposed-yet-another-spyware-maker-that-makes-fake-android-apps-for-its-government-customers.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:59:55 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/15e980ac-7b4a-46be-8aac-36d1aeb4d1ff.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 24 Apr 2026 14:21:35 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to NEW: Researchers have have exposed yet another spyware maker that makes fake Android apps for its government customers. on Fri, 24 Apr 2026 17:25:47 GMT]]></title><description><![CDATA[<p>If you're counting at home, this is a list of spyware makers from Italy, which have come out since the 2015 breach of Hacking Team, which at the time was the main player in the country.  </p><ul><li>CY4GATE </li><li>eSurv </li><li>GR Sistemi </li><li>Movia<br /></li><li>Negg </li><li>Raxir<br /></li><li>RCS Lab </li><li>SIO<br /></li></ul><p>And now IPS.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/lorenzofb/statuses/116460850231075986</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/lorenzofb/statuses/116460850231075986</guid><dc:creator><![CDATA[lorenzofb@infosec.exchange]]></dc:creator><pubDate>Fri, 24 Apr 2026 17:25:47 GMT</pubDate></item></channel></rss>