Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Posted on September 11, 2025September 11, 2025 By CWS

4 Kenyan filmmakers grew to become victims of refined surveillance when FlexiSPY spyware and adware was covertly put in on their units whereas in police custody, based on forensic evaluation performed by the College of Toronto’s Citizen Lab.

The incident occurred on or round Could 21, 2025, after authorities seized the units throughout arrests related to allegations surrounding the BBC documentary “Blood Parliament.”

The filmmakers—MarkDenver Karubiu, Bryan Adagala, Nicholas Wambugu, and Christopher Wamae—had been arrested on Could 2 at a Nairobi studio on costs of publishing false info.

Although launched with out costs the next day, their digital units remained in police custody till July 10, offering a window for the unauthorized spyware and adware set up.

CPJ analysts famous that the FlexiSPY set up represents a big breach of journalistic privateness and safety.

The commercially accessible surveillance device grants operators complete entry to victims’ digital communications, together with real-time monitoring of messages, emails, and social media actions.

Senior researcher John Scott-Railton emphasised that the spyware and adware offers “silent, secret entry to all types of personal enterprise and details about their journalism.”

FlexiSPY markets itself as a monitoring answer for fogeys and employers, promoting capabilities that stretch far past primary surveillance.

The software program can report telephone calls, observe system places and web site visits, seize passwords, obtain pictures and movies, and even activate system microphones for environmental listening.

This complete surveillance functionality makes it notably regarding when deployed towards journalists and media professionals.

Superior Persistence and Monitoring Capabilities

The FlexiSPY spyware and adware demonstrates refined persistence mechanisms designed to take care of long-term entry to compromised units.

As soon as put in, the malware operates stealthily within the background, repeatedly transmitting knowledge to distant servers whereas avoiding detection by commonplace safety measures.

The software program’s structure permits it to outlive system reboots and resist elimination makes an attempt by means of hidden system-level integration.

The spyware and adware’s monitoring capabilities prolong to encrypted messaging platforms, probably compromising safe communications that journalists depend upon for supply safety.

By intercepting knowledge earlier than encryption happens on the utility degree, FlexiSPY can seize delicate info that will in any other case stay protected.

This performance poses specific dangers for investigative journalists who rely on confidential communications with sources and colleagues.

The incident highlights rising considerations about state surveillance of media professionals and the weaponization of business spyware and adware towards press freedom advocates worldwide.

Enhance your SOC and assist your group shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Filmmakers, FlexiSPY, Installed, Kenyan, Media, Messages, Monitors, Social, Spyware

Post navigation

Previous Post: New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads
Next Post: Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

Related Posts

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Cyber Security News
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Cyber Security News
10 Best AI penetration Testing Companies in 2025 Cyber Security News
ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News