Fact-checked by Grok 2 weeks ago

Quadream

QuaDream Ltd. was an company incorporated in that specialized in developing and selling advanced offensive cybersecurity tools, including the platform, exclusively to governments for intelligence and purposes. The firm's products, such as the KingsPawn , enabled zero-click exploits targeting devices—often via invisible iCloud calendar invitations—to exfiltrate data like messages, location information, and camera access without user awareness or interaction. QuaDream's client base included governments in , , , and , with reported pitches to entities in and , reflecting its focus on state actors seeking remote capabilities. Despite claims of restricting sales to approved uses, independent analyses linked QuaDream's tools to infections of targets, including journalists, political opposition figures, and NGO workers across , Europe, Central Asia, the , and . The company faced significant scrutiny following 2023 disclosures by cybersecurity researchers, which detailed exploit chains like ENDOFDAYS and operational infrastructure in multiple countries, prompting QuaDream to cease operations amid regulatory blocks on prospective deals and heightened global attention to proliferation. Co-founders included former Israeli official Ilan Dabelstein alongside ex-employees from rival firm , underscoring the sector's roots in Israel's defense ecosystem.

History

Founding and Early Years

Quadream Ltd., an developer of technologies, was established in 2014 by a team including Guy Geva and Nimrod Rinsky, both former employees of the firm , and Ilan Dabelstein, a former official who served as co-founder, major shareholder, and initial CEO. The founders leveraged their prior experience in offensive cyber tools to focus on advanced digital intrusion capabilities, particularly targeting devices, amid Israel's ecosystem of private-sector firms staffed by ex- intelligence personnel. From inception, Quadream maintained a highly secretive operational profile, lacking a public or presence and instructing employees to avoid references to . Early development centered on proprietary platforms such as "," designed for clients seeking remote access to encrypted communications and device data without user interaction. By 2017, the firm formalized a agreement on with InReach, a Cyprus-based , to facilitate international sales and deployment outside , marking an initial expansion of its commercial footprint. Key early hires included Zvi Fischler as head of sales, drawing from his 16 years in Israeli military intelligence (1973–1989) and subsequent roles at , underscoring Quadream's reliance on veterans of state-sponsored cyber operations. Corporate records indicate formal registration documents dated February 17, 2021, though operational activities predated this amid Israel's regulatory environment for export-controlled cyber tools.

Expansion and Key Milestones

Quadream expanded its international reach through a with InReach, a Cyprus-based entity incorporated in September 2017, via a agreement signed on July 5, 2017, which allocated 92% of external sales revenue to Quadream. A key milestone was the development and marketing of its primary spyware platform, , designed for zero-click infections targeting devices, enabling governments to deploy tools without user interaction. The company secured sales contracts with governments in multiple countries, including , , , and , with reports indicating deployments in at least ten nations overall by early 2023. Further growth efforts included pitches for deals with entities in and , though the latter was reportedly blocked by Israeli authorities in 2023.

Decline and Closure

In 2023, QuaDream faced significant scrutiny following a detailed report by the at the , which exposed the company's deployment against civil society targets, including journalists and activists in , , , and the . The report identified traces of QuaDream's "KingsPawn" exploit chain, a zero-click iOS vulnerability affecting versions up to , used to install tools without user interaction, and linked the technology to at least five confirmed victims alongside suspected government clients from over 10 countries. Threat Intelligence corroborated these findings, highlighting the spyware's evasion of Apple security measures and its potential for widespread abuse. By April 16, 2023, QuaDream announced the cessation of operations in , firing all employees and effectively shutting down the company, as reported by media outlets. This closure came amid broader regulatory pressures on 's cyber-export industry, including tightened export licensing rules implemented in 2022 that restricted sales to non-democratic regimes and scrutinized end-use, impacting firms like QuaDream similarly to competitors and . A key factor was the government's of a major sales deal with in late 2022, which deprived QuaDream of critical revenue and accelerated its financial collapse, according to investigative reporting. Post-closure, no evidence of resumed operations or asset transfers to new entities has emerged as of 2025, with the company's technology ceasing active development or deployment in documented cases. The shutdown underscored vulnerabilities in the mercenary market, where public exposures and state interventions can render business models untenable, though similar tools from other vendors persist.

Technology and Products

Core Spyware Platforms

QuaDream's principal spyware offering was the platform, a suite of offensive cyber-intelligence tools designed for remote device compromise and persistent surveillance, marketed exclusively to government clients for and applications. incorporated modular implants, including the iOS-specific KingsPawn , which functioned as both a downloader and a full-featured payload to establish control over targeted devices. Unlike broader commercial hacking tools, emphasized zero-click deployment to minimize detection risks, leveraging custom exploits rather than user-dependent . Infection typically occurred through the ENDOFDAYS exploit chain, which exploited zero-day vulnerabilities in (such as versions 14.4 and 14.4.2) via invisible invitations sent to victims' devices, enabling installation without any user interaction or visible prompts. This method bypassed standard defenses like ing and code-signing through techniques including PMAP and AMFI bypasses, sandbox escapes, and covert XPC messaging via a fake app extension (fud.appex). Once deployed, KingsPawn persisted by masquerading under process names like "subridged" and staging files in system directories such as /private/var/db/com.apple.xpc.roleaccountd.staging, while generating future-dated time-based one-time passwords (TOTPs) for ongoing access. The implant included anti-forensic measures, such as self-destruct mechanisms to delete execution artifacts, events, and records upon command or detection. Reign's surveillance capabilities encompassed comprehensive device monitoring, including real-time audio recording from calls and the , photo and via front and rear cameras (often silently through mediaserverd), geolocation tracking via the navigation system, and extraction of sensitive data such as keychain credentials, SQL databases, filesystem contents, /cellular details, battery status, and iCloud-stored messages, images, and videos. relied on HTTPS POST requests, secured with custom root certificates potentially tied to self-signed infrastructure, ensuring encrypted transmission to command-and-control servers. The platform's monitor agent, implemented in , minimized its forensic footprint, while the main agent in Go facilitated advanced operations like framework hijacking for TOTP code generation and removal to evade recovery. Primarily targeting devices, Reign demonstrated potential extensibility to , though documented deployments focused on Apple ecosystems up to vulnerabilities patched by Apple in early 2021. Technically, distinguished itself from competitors like NSO Group's through unique exploit chains (ENDOFDAYS versus FORCEDENTRY) and implementation details, such as distinct process masquerading and structures, reflecting QuaDream's independent development path from former NSO personnel. Indicators of compromise included network traffic to domains like fosterunch[.]com and womnbling[.]com, alongside anomalous files in avcapture and roleaccountd pathways. While effective against pre-2021 versions, the platform's exposure led to its operational wind-down by mid-2023, with no verified updates for later iterations.

Exploitation Methods and Capabilities

QuaDream's , primarily known as (also referred to as KingsPawn), employed zero-click techniques to compromise target devices without user interaction. These methods targeted vulnerabilities in , particularly versions 14.4 and 14.4.2, using invisible invitations containing malicious payloads delivered via XML injection with tags. The invitations featured backdated and overlapping events, exploiting the calendar processing mechanism to initiate infection, with activity traced to 2021 before Apple's patching in March of that year. In parallel, QuaDream actors exploited at least one software flaw simultaneously with NSO Group's in 2021, bypassing protections like PMAP and AMFI while escaping restrictions. A specific zero-day exploit chain, dubbed ENDOFDAYS, facilitated remote code execution through these vectors, distinct from NSO's in its implementation and artifacts, such as the use of the "duetexpertd" process potentially for WebKit-based escalation. Persistence was achieved via staging directories like /private/var/db/com.apple.xpc.roleaccountd.staging/subridged and plugins such as fud.appex, enabling ongoing access post-infection. Limited evidence indicates testing against devices, though primary deployments focused on , with Meta identifying related activity in that ecosystem. Once installed, provided extensive capabilities, including activation of the device's and camera for audio/video recording, granular tracking, call interception, and extraction of files, device information, Wi-Fi/cellular details, and time-based one-time passwords (TOTP). data access allowed retrieval of credentials and sensitive stored information, supplemented by SQL database queries for deeper system enumeration. occurred via POST requests to command-and-control domains, potentially leveraging custom or self-signed certificates for evasion, with a mechanism to erase forensic traces, including linked events. These features distinguished through unique indicators like the "subridged" process name, separate from comparable tools like .

Innovations and Technical Distinctions

Quadream's Reign spyware platform pioneered zero-click infection via exploitation of iCloud calendar synchronization, utilizing the ENDOFDAYS zero-day vulnerability against iOS 14.4 and 14.4.2 from January to November 2021. Malicious invitations, embedded with CDATA tags and backdated to evade notifications, triggered automatic payload delivery during device sync without user interaction, distinguishing this vector from messaging-based exploits prevalent in contemporary tools. The platform's architecture featured a monitor in for forensic evasion—deleting crash logs and managing processes via waitpid and sigaction—and a primary Go-based for , enabling silent and camera activation through mediaserverd, extraction, SQL database queries, filesystem , and location tracking via removal of locationd records. Persistence relied on hijacking Apple's framework to forge iCloud TOTP codes for sustained exfiltration over with potential custom certificates, complemented by a routine that purged events, plist entries, and other traces to minimize detection. Deployment occurred within a nested XPC extension at /private/var/db/com.apple.xpc.roleaccountd.staging/PlugIns/fud.appex/, bypassing sandboxing, AMFI, and PMAP protections under the unique "subridged" process, which contrasted with NSO Group's through distinct cleanup mechanisms and exploit chains like ENDOFDAYS versus . While primarily iOS-oriented with compatibility indicated, leaked code pointed to potential integration for targeting, underscoring Reign's emphasis on elite, low-footprint operations tailored for governmental clients over mass deployment.

Operations and Customers

Client Base and Sales

Quadream primarily marketed its products, such as , to governments and agencies seeking advanced capabilities. The company reportedly sold its tools to clients in at least ten countries, focusing on entities requiring zero-click infection methods for targeting high-value individuals. Confirmed government customers included , where Quadream supplied spyware enabling phone hacking, data extraction, and user tracking for intelligence purposes. Additional reports identified sales to the governments of and , aligning with Quadream's strategy of targeting authoritarian or strategically aligned regimes. An attempted transaction with was vetoed by authorities in 2023, reportedly due to considerations, which contributed to the company's operational shutdown. Public details on Quadream's sales figures and revenue remain limited, as the firm operated privately without mandatory disclosures. Business models involved partnerships, such as with InReach, under which Quadream retained 92% of revenues from product sales while the partner handled distribution and support. Unlike larger competitors like NSO Group, Quadream maintained a lower profile, with no verified annual revenue estimates exceeding those of peers in the tens of millions, reflecting its smaller scale before closure in 2023.

Deployment Patterns

Quadream's spyware deployments relied heavily on zero-click exploits, enabling infection without user interaction, primarily targeting devices running versions such as 14.4 and 14.4.2. The ENDOFDAYS exploit, active from January to November 2021, exploited vulnerabilities in calendar processing through invisible calendar invitations containing malicious XML payloads, allowing remote code execution and subsequent spyware installation. This method bypassed traditional phishing vectors like SMS links, favoring stealth over interaction-dependent tactics, with payloads such as Reign providing zero-click access and KingsPawn featuring modular downloaders that self-destructed post-installation to minimize forensic traces. Infection chains incorporated advanced persistence mechanisms, including escapes, escalations via processes like tccd and mediaserverd for camera/ access, and artifact deletion to evade detection. While was the primary platform, evidence suggests compatibility testing for , though specific exploits for it remain undocumented in analyzed samples. Supplementary one-click browser-based exploits were observed via infrastructure scanning, indicating hybrid approaches for less-secured targets, but zero-click remained the hallmark for high-value operations. Deployment patterns emphasized precision targeting of figures, including journalists, opposition politicians, and NGO workers, across , , the , , and , often facilitated by government clients operating from infrastructure in countries like , , , and the UAE. At least five such victims were confirmed in 2021 campaigns, with operations linked to at least 10 undisclosed governments, reflecting a focus on geopolitical intelligence rather than . These patterns prioritized exploit sophistication and regional diversity, distinguishing Quadream from competitors by leveraging calendar-based vectors over iMessage-exclusive attacks.

Intelligence Applications

Quadream's platforms, such as the suite and KingsPawn , were designed for deployment by agencies to enable covert, persistent surveillance of mobile devices. These tools facilitated zero-click infections, primarily targeting devices through exploits like invisible iCloud calendar invitations on versions 14.4 to 14.4.2, allowing operators to bypass security features including code-signing protections and sandboxing. Once installed, the granted access to sensitive data including messages, call logs, geolocation, photos, videos, audio recordings via and camera, keychain credentials, and iCloud two-factor authentication codes, supporting real-time gathering on high-value targets. In practice, these capabilities were applied in state-sponsored operations across multiple regions, with infrastructure hosted on servers in countries including , , , , , , , , UAE, and to mask origins and reduce forensic traceability. For instance, Saudi Arabian authorities acquired spyware, which enabled without user interaction, data extraction, and location tracking via navigation systems, aligning with broader intelligence efforts to monitor individuals perceived as threats. Similar deployments occurred in and , where the technology supported targeted against political opposition and figures, often justified by clients as necessary for national security and counter-espionage. The platform's modular s, including a monitor for low-footprint persistence and a main for comprehensive via covert , enhanced its utility in long-term operations by minimizing detection risks. QuaDream marketed these tools exclusively to vetted government clients in at least 10 countries, including , with operations linked to a private-sector that provided services for monitoring private communications and movements in support of and mandates. Despite claims of restricting sales to democratic allies, evidence from operator networks indicates widespread application in authoritarian contexts for suppressing under the guise of work.

Controversies and Ethical Debates

Reported Misuses and Victims

In April 2023, researchers from and Threat Intelligence reported that QuaDream's , including the KingsPawn iOS implant, had been used to target at least five members of worldwide, including journalists, political opposition figures, and NGO workers. These infections enabled extensive capabilities, such as audio and video recording, geolocation tracking, message exfiltration, and access to device keychains and two-factor authentication codes. The victims were located across , , , , and the , with two high-confidence cases linked to 2021 deployments and three medium-confidence cases spanning 2019 to 2021. Infections often occurred via zero-click exploits, notably the ENDOFDAYS vulnerability in versions 14.4 and 14.4.2, which weaponized invisible calendar invitations to deliver without user interaction. Such targeting mirrored patterns of misuse seen with other commercial spyware, where tools sold to governments for were deployed against dissidents and critics, including in countries like , , , and the , which have documented histories of surveilling defenders. QuaDream's infrastructure was traced to operators in at least ten countries, including and as confirmed customers. A specific case involves Yahya Assiri, a UK-based Saudi dissident and founder of the human rights organization ALQST, whose iPhones were infected with QuaDream spyware between 2018 and 2020 while he resided in London. Independent forensic analysis by Citizen Lab confirmed the presence of QuaDream indicators, attributing the attacks to Saudi Arabian authorities seeking to extract data from Assiri's devices and endanger his contacts. In May 2024, Assiri filed a legal claim in the UK High Court against the Kingdom of Saudi Arabia, alleging misuse of private information, harassment, and trespass to goods; on October 11, 2024, the court granted permission to serve the claim via diplomatic channels, marking a rare instance of accountability for extraterritorial spyware deployment against a resident in a Western jurisdiction. Other victims' identities remain undisclosed to protect them from further retaliation.

Criticisms from Privacy Advocates

Privacy advocates and cybersecurity researchers have condemned QuaDream's , such as Reign and KingsPawn, for enabling unauthorized of journalists, political opposition figures, and organizations through zero-click exploits that require no user interaction, such as iCloud calendar invitations. These tools, deployed as early as 2021 against devices, allow extensive including encrypted messages, audio recordings, camera access, geolocation tracking, and iCloud credential theft, fundamentally undermining device security and personal without detection. Citizen Lab researchers identified at least five victims across North America, Europe, Central Asia, Southeast Asia, and the Middle East, including an NGO worker, highlighting a "repetition of the abuses found with more notorious players, like NSO Group’s Pegasus spyware," where high-risk individuals are systematically targeted to suppress dissent. This opacity in QuaDream's operations, including partnerships like InReach and sales to governments with poor human rights records such as Saudi Arabia, exacerbates concerns over inadequate export controls and accountability, as the firm maintained a low public profile while evading regulatory scrutiny. Microsoft Threat Intelligence has echoed these criticisms, attributing KingsPawn deployments to an Israel-based offensive actor linked to QuaDream and noting the spyware's role in facilitating state-sponsored suppression of free expression across at least 10 countries, urging greater awareness to counter such threats to . Advocates argue that the of such commercial tools, rivaling state-level capabilities, erodes global norms and enables authoritarian overreach, with victims often unaware of infections until forensic analysis reveals them.

Defenses and Security Justifications

QuaDream marketed its platform exclusively to governments for and applications, positioning the technology as essential for accessing encrypted communications on targeted devices used by criminals and terrorists. The company emphasized that its tools enabled zero-click exploits to monitor high-value targets where conventional was ineffective due to strong device , such as Apple's protections. Supporters of such offensive cyber capabilities, including spyware vendors, argue that they fill critical gaps in operations, allowing agencies to preempt threats like and that evade traditional warrants through secure apps and . QuaDream's sales were reportedly restricted to vetted clients, including legitimate agencies, with the firm operating under Israel's strict export controls administered by the Defense Export Controls Agency (DECA), which reviews transactions for compliance with security and ethical standards. These controls served as a justification for the technology's legitimacy, as demonstrated by Israel's intervention in 2023 to block QuaDream's proposed sales to countries like , citing misalignment with national interests. The broader industry rationale holds that advanced prevents greater harms by providing actionable , with proponents claiming rigorous vetting processes minimize abuse risks, though QuaDream itself issued no public statements responding to misuse allegations prior to its 2023 shutdown.

Impact and Legacy

Influence on Cybersecurity Landscape

QuaDream's platform, including exploits like ENDOFDAYS, enabled zero-click compromises of devices via invisible calendar invitations with XML injection, targeting versions such as 14.4 and 14.4.2 before patches were available. These capabilities highlighted persistent gaps in defenses, such as insufficient validation of , prompting Apple to issue updates that eliminated the exploited vulnerabilities in 14. The subsequent reverse-engineering of QuaDream's KingsPawn , which facilitated persistent access to device cameras, keychains, location data, and call logs through techniques like process injection and escapes, advanced threat intelligence on offensive actors (PSOAs). and Citizen Lab's disclosures enabled platforms like to detect and block QuaDream-linked activity on over 250 accounts in December 2022, while Apple's November 2021 notifications to affected users underscored proactive mitigation against such threats. This fostered greater inter-company collaboration on indicators, contributing to enhanced endpoint detection tools and forensic artifact monitoring in ecosystems. Revelations of QuaDream's deployment against targets across at least 10 countries amplified scrutiny of the commercial industry, accelerating regulatory responses such as Israel's tightened export controls on cyber tools, which directly led to the firm's shutdown in 2023. By exposing the opaque of over 600 servers and 200 domains used by QuaDream clients from 2021 to 2023, these events heightened awareness of PSOA evasion tactics, influencing broader defensive strategies like zero-trust architectures and rapid security response mechanisms in consumer devices.

Regulatory and Policy Responses

In response to revelations about Quadream's deployment of invasive such as KingsPawn, authorities intensified oversight of exports, with the Defense Ministry denying the company's application for a license to sell tools to in early 2023, a move that reportedly precipitated Quadream's operational collapse and shutdown by May of that year. Quadream had attempted to navigate these restrictions by channeling sales through InReach, a Cyprus-registered intermediary established in 2017, which facilitated deals without Israeli export approval, including to entities in ; however, updated Israeli regulations enacted in late 2022—requiring case-by-case Defense Ministry vetting for offensive cyber capabilities—severely constrained such practices and contributed to the firm's financial and operational difficulties. Unlike competitor , which faced Commerce Department blacklisting in November 2021 for risks, Quadream encountered no equivalent direct sanctions from the , though exposures by and in April 2023 amplified global awareness and aligned with broader policy shifts, including a March 2023 barring federal agencies from using commercial posing threats. Internationally, advocacy groups like urged stricter enforcement of dual-use export controls to curb proliferation, citing Quadream's activities as emblematic of regulatory gaps, but no multilateral bans or EU-specific measures targeted the company prior to its dissolution.

Broader Geopolitical Implications

The proliferation of Quadream's to governments in at least 10 countries, including , , and , enabled enhanced state capabilities that extended beyond national borders, facilitating the targeting of actors, journalists, and political opponents across , , the , and . This cross-regional deployment underscored a pattern of transnational repression, where authoritarian-leaning regimes leveraged Israeli-developed tools to suppress dissent, thereby straining diplomatic relations with democratic states whose citizens or allies were inadvertently or directly affected. Israel's Ministry of Defense, which regulates spyware exports under a framework established in and tightened by January 2023, approved Quadream's sales as part of a broader strategy to cultivate alliances, particularly with Gulf states like and the UAE, amid efforts to counter Iranian influence and normalize relations via frameworks such as the . However, such approvals drew geopolitical backlash, exemplified by Israel's of a Quadream deal with in early 2023—despite bilateral ties strengthened by the 2020 normalization agreement—prioritizing perceived security risks over commercial interests and contributing to the firm's operational shutdown by mid-2023. This intervention highlighted tensions within Israel's cyber export policy, balancing economic gains from a sector valued at hundreds of millions annually against international reputational costs and domestic regulatory pressures. The exposure of Quadream's activities accelerated global regulatory scrutiny, influencing U.S. policies such as the 2021 Commerce Department blacklist of comparable firms like —though Quadream itself evaded formal designation—and prompting multilateral calls for norms restricting to verified uses. In response, entities like the advanced proposals for export controls and accountability mechanisms, while the firm's closure signaled a contraction in Israel's spyware market, potentially shifting competitive dynamics toward state-dominated actors in and and exacerbating an asymmetric cyber favoring offensive over defensive measures. This evolution risked eroding trust in cross-border digital infrastructure, as zero-click exploits like those in undermined platform security assurances from firms such as Apple, indirectly pressuring tech-exporting nations to align cyber policies with standards amid great-power rivalries.

References

  1. [1]
    DEV-0196: QuaDream's “KingsPawn” malware used to target civil ...
    Apr 11, 2023 · Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream.
  2. [2]
    A First Look at Spyware Vendor QuaDream's Exploits, Victims, and ...
    Apr 11, 2023 · At least five civil society victims of QuaDream's spyware and exploits were identified in North America, Central Asia, Southeast Asia, ...
  3. [3]
    Report: Israel nixed QuaDream's spyware deal with Morocco ...
    May 23, 2023 · An Israeli spyware firm was reportedly forced to shut down after the Israeli government prevented it from moving ahead with deals to sell its highly invasive ...
  4. [4]
    Secretive Israeli Cyber Firm Selling Spy-tech to Saudi Arabia
    Jun 8, 2021 · Quadream, Led by a Former Israeli Military Intelligence Official, and the Phone-hacking Tech Was Sold to Saudi Arabia.
  5. [5]
    ISRAEL • Change of control at NSO's rival in strategic market ...
    Jun 22, 2022 · Guy Geva and Nimrod Reznik, who co-founded Israeli cyber intelligence company Quadream with Ilan Dabelstein, have sold their shares.
  6. [6]
    'We're on the U.S. Blacklist Because of You': The Dirty Clash ...
    Dec 17, 2021 · NSO Has Enough Evidence That Netanyahu and ex-Mossad Chief Yossi Cohen Promoted Its Pegasus Sales Candiru's Client List Revealed As These ...
  7. [7]
    EXCLUSIVE iPhone flaw exploited by second Israeli spy firm-sources
    Feb 3, 2022 · A flaw in Apple's software exploited by Israeli surveillance firm NSO Group to break into iPhones in 2021 was simultaneously abused by a ...
  8. [8]
    Another Israeli spy app has been sold to 10 countries, researchers say
    Apr 11, 2023 · Citizen Lab and Microsoft report the hacking tool QuaDream has been used against politicians and journalists, but they did not identify the ...
  9. [9]
    Israeli Spyware Vendor QuaDream to Shut Down Following Citizen ...
    Apr 17, 2023 · Israeli spyware vendor QuaDream is reportedly shutting down its operations after its hacking toolset was exposed by Citizen Lab and ...
  10. [10]
    Israeli Spyware Maker QuaDream Closes, Fires All Employees
    Apr 16, 2023 · The company, which specializes in software to hack iPhones for governments, halts operations in Israel following investigative report.<|separator|>
  11. [11]
    ISRAEL • Quadream reels from impact of new regulations - 10/01/2023
    Jan 10, 2023 · Just like its competitors NSO Group and Candiru, Quadream is feeling the impact of Israel's new export licence regulations.Missing: closure | Show results with:closure
  12. [12]
    Israel Torpedoed Morocco Spyware Deal - and NSO Competitor ...
    May 23, 2023 · Quadream Offered Zero-click Infections for iPhone. Leaked Code Reveals Their Spyware May Have Abused WhatsApp Firm Also Developed ...Missing: establishment background
  13. [13]
    Quadream - Business & Human Rights Resource Centre
    Sep 24, 2025 · Technology: Software & web-based/digital services, Military/weapons/security equipment: General · Israel · QuaDream, which has been called a " ...
  14. [14]
    Spyware Company QuaDreams Set to Close - Infosecurity Magazine
    Apr 17, 2023 · An Israeli commercial spyware maker recently linked to a new zero-day iPhone exploit is closing its doors for good, according to a local ...Missing: shutdown | Show results with:shutdown
  15. [15]
    Mercenary spyware hacked iPhone victims with rogue ... - TechCrunch
    Apr 11, 2023 · Hackers using spyware made by a little known cyber mercenary company used malicious calendar invites to hack the iPhones of journalists, ...Missing: history | Show results with:history<|separator|>
  16. [16]
    QuaDream - Surveillance Watch
    Description. QuaDream Ltd is an Israeli company that specialises in the development and sale of advanced digital offensive technology to government clients.
  17. [17]
    Israeli cyber co. Quadream provides Saudi Arabia with spyware tech ...
    Quadream, a Tel Aviv-based company, has reportedly sold to Saudi authorities a program called Reign, which has the ability to hack phones, extract their data ...
  18. [18]
    QuaDream spyware reportedly sold to Mexican, Singaporean and ...
    QuaDream, the sources said, is a smaller and lower profile Israeli firm that also develops smartphone hacking tools intended for government clients...
  19. [19]
    QuaDream 'Reign' Spyware Used to Hack iPhones of High-Profile ...
    Security researchers have discovered new evidence of spyware targeting Apple smartphones during the vulnerable days of iOS 14, dating back to 2021.
  20. [20]
    UK High Court grants ALQST founder Yahya Assiri permission to ...
    Oct 21, 2024 · ALQST for Human Rights is an independent NGO established in 2014 by Saudi Arabian human rights defender Yahya Assiri for the purpose of ...
  21. [21]
    Saudi Arabia: UK Court Accepts Case About Saudi Spyware Use
    Oct 22, 2024 · “The Saudi government has been accused of using the NSO Group's Pegasus spyware to monitor and silence Saudi human rights defenders for years ...
  22. [22]
    UK-based dissident can sue Saudi Arabia for alleged spyware, court ...
    Oct 21, 2024 · A prominent Saudi dissident who accuses Saudi Arabia of targeting him with spyware can sue the kingdom in London, his lawyers said on Monday.
  23. [23]
    High Court grants permission to Yahya Assiri to bring a spyware ...
    High Court grants permission to Yahya Assiri to bring a spyware based legal claim against the Kingdom of Saudi Arabia over Pegasus and Quadream cyberattacks.
  24. [24]
    Experts warn of new spyware threat targeting journalists and ...
    Apr 12, 2023 · Citizen Lab says victims' phones infected after being sent an iCloud calendar invitation in a 'zero-click' attack.
  25. [25]
    Israeli spyware used to hack across 10 countries, Microsoft ... - Reuters
    Apr 11, 2023 · An Israeli firm's hacking tools have been used against journalists, opposition figures and advocacy organizations across at least 10 ...<|separator|>
  26. [26]
    Details Emerge on Israeli Spyware Vendor QuaDream and Its iOS ...
    Apr 12, 2023 · Microsoft and Citizen Lab release information on the activities, malware and victims of Israeli spyware vendor QuaDream.<|separator|>
  27. [27]
    Secretive Israeli cyber firm selling spy-tech to Saudi Arabia
    ... Among Quadream's clients are law enforcement agencies from a number of legitimate countries, a source says, “but there are also others.” Haaretz has ...
  28. [28]
    Report reveals details about iOS 14 exploit, spyware, and ... - 9to5Mac
    Apr 11, 2023 · While an update to iOS 14 eliminated the zero-click exploit that QuaDream customers targeted, Apple has been more aggressive about ...Missing: response | Show results with:response
  29. [29]
    Prohibition on Use by the United States Government of Commercial ...
    Mar 30, 2023 · It shall not make operational use of commercial spyware that poses significant counterintelligence or security risks to the United States Government.
  30. [30]
    [PDF] A WEB OF SURVEILLANCE - Amnesty International USA
    The unchecked spread of highly invasive spyware underscores the urgent need for robust oversight and enforcement of dual-use regulations to prevent its misuse.
  31. [31]
    QuaDream spyware reportedly sold to Mexican, Singaporean and ...
    "iPhone flaw exploited by second Israeli spy firm-sources" 3 February 2022. A flaw in Apple's software exploited by Israeli surveillance firm NSO Group to ...
  32. [32]
    Limiting Government Use of Commercial Spyware | GJIA
    Sep 4, 2024 · Over the past decade, to strengthen its political alliances with countries such as Saudi Arabia and the UAE, Israel has turned to the NSO ...Missing: growth | Show results with:growth<|control11|><|separator|>
  33. [33]
    Pegasus Spyware Firm NSO Lobbies to Get Off U.S. Blacklist
    Oct 21, 2024 · On the same day lobbyists for NSO met with Rep. Pete Sessions, a lawyer from the lobbying firm gave $1000 to “Pete Sessions for Congress.”
  34. [34]
    Mythical Beasts and where to find them - Atlantic Council
    Sep 4, 2024 · By Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava ...