Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Posted on September 11, 2025September 11, 2025 By CWS

4 Kenyan filmmakers grew to become victims of refined surveillance when FlexiSPY spyware and adware was covertly put in on their units whereas in police custody, based on forensic evaluation performed by the College of Toronto’s Citizen Lab.

The incident occurred on or round Could 21, 2025, after authorities seized the units throughout arrests related to allegations surrounding the BBC documentary “Blood Parliament.”

The filmmakers—MarkDenver Karubiu, Bryan Adagala, Nicholas Wambugu, and Christopher Wamae—had been arrested on Could 2 at a Nairobi studio on costs of publishing false info.

Although launched with out costs the next day, their digital units remained in police custody till July 10, offering a window for the unauthorized spyware and adware set up.

CPJ analysts famous that the FlexiSPY set up represents a big breach of journalistic privateness and safety.

The commercially accessible surveillance device grants operators complete entry to victims’ digital communications, together with real-time monitoring of messages, emails, and social media actions.

Senior researcher John Scott-Railton emphasised that the spyware and adware offers “silent, secret entry to all types of personal enterprise and details about their journalism.”

FlexiSPY markets itself as a monitoring answer for fogeys and employers, promoting capabilities that stretch far past primary surveillance.

The software program can report telephone calls, observe system places and web site visits, seize passwords, obtain pictures and movies, and even activate system microphones for environmental listening.

This complete surveillance functionality makes it notably regarding when deployed towards journalists and media professionals.

Superior Persistence and Monitoring Capabilities

The FlexiSPY spyware and adware demonstrates refined persistence mechanisms designed to take care of long-term entry to compromised units.

As soon as put in, the malware operates stealthily within the background, repeatedly transmitting knowledge to distant servers whereas avoiding detection by commonplace safety measures.

The software program’s structure permits it to outlive system reboots and resist elimination makes an attempt by means of hidden system-level integration.

The spyware and adware’s monitoring capabilities prolong to encrypted messaging platforms, probably compromising safe communications that journalists depend upon for supply safety.

By intercepting knowledge earlier than encryption happens on the utility degree, FlexiSPY can seize delicate info that will in any other case stay protected.

This performance poses specific dangers for investigative journalists who rely on confidential communications with sources and colleagues.

The incident highlights rising considerations about state surveillance of media professionals and the weaponization of business spyware and adware towards press freedom advocates worldwide.

Enhance your SOC and assist your group shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Filmmakers, FlexiSPY, Installed, Kenyan, Media, Messages, Monitors, Social, Spyware

Post navigation

Previous Post: New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads
Next Post: Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

Related Posts

United Natural Foods Suffers Cyberattack Cyber Security News
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Cyber Security News
WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch Cyber Security News
Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News