Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Posted on September 11, 2025September 11, 2025 By CWS

4 Kenyan filmmakers grew to become victims of refined surveillance when FlexiSPY spyware and adware was covertly put in on their units whereas in police custody, based on forensic evaluation performed by the College of Toronto’s Citizen Lab.

The incident occurred on or round Could 21, 2025, after authorities seized the units throughout arrests related to allegations surrounding the BBC documentary “Blood Parliament.”

The filmmakers—MarkDenver Karubiu, Bryan Adagala, Nicholas Wambugu, and Christopher Wamae—had been arrested on Could 2 at a Nairobi studio on costs of publishing false info.

Although launched with out costs the next day, their digital units remained in police custody till July 10, offering a window for the unauthorized spyware and adware set up.

CPJ analysts famous that the FlexiSPY set up represents a big breach of journalistic privateness and safety.

The commercially accessible surveillance device grants operators complete entry to victims’ digital communications, together with real-time monitoring of messages, emails, and social media actions.

Senior researcher John Scott-Railton emphasised that the spyware and adware offers “silent, secret entry to all types of personal enterprise and details about their journalism.”

FlexiSPY markets itself as a monitoring answer for fogeys and employers, promoting capabilities that stretch far past primary surveillance.

The software program can report telephone calls, observe system places and web site visits, seize passwords, obtain pictures and movies, and even activate system microphones for environmental listening.

This complete surveillance functionality makes it notably regarding when deployed towards journalists and media professionals.

Superior Persistence and Monitoring Capabilities

The FlexiSPY spyware and adware demonstrates refined persistence mechanisms designed to take care of long-term entry to compromised units.

As soon as put in, the malware operates stealthily within the background, repeatedly transmitting knowledge to distant servers whereas avoiding detection by commonplace safety measures.

The software program’s structure permits it to outlive system reboots and resist elimination makes an attempt by means of hidden system-level integration.

The spyware and adware’s monitoring capabilities prolong to encrypted messaging platforms, probably compromising safe communications that journalists depend upon for supply safety.

By intercepting knowledge earlier than encryption happens on the utility degree, FlexiSPY can seize delicate info that will in any other case stay protected.

This performance poses specific dangers for investigative journalists who rely on confidential communications with sources and colleagues.

The incident highlights rising considerations about state surveillance of media professionals and the weaponization of business spyware and adware towards press freedom advocates worldwide.

Enhance your SOC and assist your group shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Filmmakers, FlexiSPY, Installed, Kenyan, Media, Messages, Monitors, Social, Spyware

Post navigation

Previous Post: New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads
Next Post: Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

Related Posts

BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User Cyber Security News
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark