Graphite Spyware: ICE Targets Signal and Telegram
Business Apps & AIRemote Collaboration Apps

Graphite Spyware: ICE Targets Signal and Telegram

ICE's contract for Graphite spyware targets encrypted apps. Learn how to secure your device against zero-click exploits and remote surveillance.

Quick Facts

  • Core Threat: Graphite spyware is a sophisticated surveillance tool developed by Paragon Solutions that compromises smartphones to bypass encryption.
  • Primary Targets: Encrypted communication platforms including Signal, Telegram, WhatsApp, and Snapchat are the main focus of data extraction.
  • Exploit Type: The software uses zero-click exploits, notably CVE-2025-43200, which allow infection without any user interaction or suspicious links.
  • Government Involvement: U.S. Immigration and Customs Enforcement (ICE) reactivated a $2 million contract for this technology in August 2025.
  • Critical Update: Security researchers recommend immediate installation of iOS 18.3.1 or later to patch the specific vulnerabilities exploited by this tool.
  • Detection Markers: Forensic analysts have identified the presence of the spyware through technical indicators labeled SMALLPRETZEL on iOS and BIGPRETZEL on Android.

Graphite spyware, developed by Paragon Solutions, is a sophisticated surveillance tool designed to breach encrypted messaging apps like Signal and Telegram. It utilizes zero-click exploits to infect smartphones without user interaction, allowing government agencies to extract private data directly from the device operating system.

The ICE Connection: How $2M Bypassed Federal Bans

The landscape of mobile surveillance shifted significantly on August 30, 2025, when U.S. Immigration and Customs Enforcement (ICE) officially reactivated a high-stakes partnership. Under a $2 million contract with Paragon Solutions, federal agents are now authorized to deploy Graphite spyware to access private messages and sensitive documents on mobile devices. This move has sparked intense debate among digital privacy advocates and members of Congress, as it appears to navigate a complex web of executive restrictions.

The resurgence of this contract is tied to a strategic corporate restructuring designed to bypass Executive Order 14093, which prohibits U.S. agencies from using commercial spyware that poses a risk to national security or has been linked to human rights abuses. Originally an Israeli-based firm, Paragon Solutions moved its domestic operations under the control of AE Industrial Partners and the American defense contractor REDLattice. By bringing its U.S. arm under domestic ownership, the company successfully rebranded its technology as a sanctioned tool for American law enforcement, effectively masking its foreign origins.

While the Department of Homeland Security maintains that the tool is used exclusively for targeting high-level drug trafficking and terrorist organizations, the potential for mission creep is a primary concern for civil liberties groups. The ability to protect signal messages from ice graphite spyware has become a top priority for activists and journalists who fear that the definition of a threat could expand to include political surveillance. The lack of transparent oversight regarding how ICE selects its targets remains a contentious point in the ongoing discussion about federal surveillance powers.

Technical Deep Dive: Why Signal and Telegram Are Vulnerable

To understand why your secure chats are at risk, we must look at the difference between app-level security and operating system integrity. Many users rely on Signal and Telegram because they offer end-to-end encryption, which ensures that messages are unreadable while they travel across the internet. However, Graphite spyware does not try to "break" the math behind the encryption. Instead, it waits for the message to reach your phone and be decrypted by the app so you can read it. By compromising the underlying operating system, the spyware can simply "read over your shoulder" or scrape the data directly from the device's memory.

The primary infection vector for this latest wave of surveillance is CVE-2025-43200, a critical zero-click exploit located within the iMessage framework. A zero-click attack is particularly dangerous because the victim does not have to click a malicious link or download a suspicious file. The phone simply receives a specially crafted hidden message that triggers the installation of the Remote Access Trojan. Once the device is compromised, the software begins the process of data exfiltration, sending logs of your private conversations back to a command-and-control server.

A smartphone screen showing the Signal and Telegram app icons with a digital hacking overlay.
Graphite spyware circumvents encryption by targeting the device's OS, allowing it to capture data after it has been decrypted for the user.

The risk is even more pronounced for those wondering is telegram safe from paragon graphite spyware. Unlike Signal, which encrypts all chats by default, Telegram only uses end-to-end encryption for its Secret Chats feature. Furthermore, Telegram has become increasingly cooperative with legal requests. In 2024, Telegram disclosed user data to U.S. law enforcement on 900 occasions, which affected a total of 2,253 users. This represented a massive surge compared to the beginning of that year, indicating that the platform's reputation for total resistance to authority is changing. When you combine this legal cooperation with the technical threat of Graphite, the "secure" nature of the app becomes much more fragile.

While tools like Pegasus are known for taking total control of a phone—including the camera and microphone—Graphite spyware often takes a more surgical approach. It is specifically optimized for harvesting data from encrypted messaging app vulnerabilities. It can target:

  • Decrypted message databases from Signal and WhatsApp
  • Location history stored within the OS
  • Private keys used for authentication
  • Deleted message fragments found in the phone's cache

Detection and Prevention: Hardening Your Mobile Device

For the average user, the idea of being targeted by a multi-million dollar spyware suite is daunting, but there are concrete steps you can take to improve your cybersecurity posture. The most critical defense is ensuring your software is current. Apple recently released a patch specifically designed to mitigate the vulnerabilities used by Paragon. If you are an iPhone user, installing the ios 18.3.1 update for graphite spyware prevention is the single most effective way to close the door on CVE-2025-43200.

Beyond simple updates, those in high-risk professions should consider utilizing Apple's Lockdown Mode. This feature drastically reduces the attack surface of the device by disabling certain web technologies, blocking complex file types, and preventing incoming iMessage attachments from unknown senders. In a head-to-head comparison of apple lockdown mode vs graphite spyware, the security mode serves as a powerful deterrent. While it does limit some of the phone's functionality, it effectively neutralizes the zero-click exploits that tools like Graphite depend on for silent entry.

If you suspect your device has already been targeted, there are certain forensic indicators to look for. Security researchers at Citizen Lab have identified specific technical markers known as SMALLPRETZEL on iOS and BIGPRETZEL on Android that suggest an infection. While these are difficult for the average user to find without specialized software, knowing how to detect graphite spyware on iphone often involves monitoring for unusual battery drain, unexpected data spikes, or receiving notifications from Apple regarding state-sponsored attacks.

Pro Tip: Regularly rebooting your device can be a surprisingly effective defense. Many modern spyware payloads are non-persistent, meaning they live in the device's temporary memory (RAM). A simple restart can sometimes clear the infection, forcing the attacker to re-send the exploit and giving your security software another chance to block it.

Finally, following mobile device security best practices is essential for long-term protection. This includes using a strong, unique passcode for your device, enabling two-factor authentication on all messaging accounts, and being wary of unsolicited communications. While zero-click variants are the headline threat, social engineering remains a common secondary method for attackers to gain a foothold.

FAQ

What is Graphite spyware?

Graphite spyware is an On-Device Investigative Tool created by the company Paragon Solutions. It is designed to help law enforcement and intelligence agencies bypass the encryption of mobile apps by infecting the smartphone's operating system, allowing it to collect messages, call logs, and location data after they have been decrypted on the device.

How does Graphite spyware infect mobile devices?

The software primarily uses zero-click exploits, such as CVE-2025-43200, which are delivered through messaging frameworks like iMessage. These exploits do not require the user to interact with the message or click any links; the infection happens automatically in the background when the device processes a malicious data packet.

Can Graphite spyware target iPhones?

Yes, iPhones are a major target for this surveillance tool. The spyware specifically leverages vulnerabilities in iOS to gain access to data. However, Apple frequently releases security patches, such as iOS 18.3.1, to close these loopholes and protect users from being compromised.

What is the difference between Pegasus and Graphite spyware?

While both are high-end surveillance tools, they have different focuses. Pegasus, created by NSO Group, is designed for total device takeover, including remote activation of cameras and microphones. Graphite, created by Paragon Solutions, is often described as being more specialized in exfiltrating data from encrypted messaging apps and cloud backups while maintaining a lower profile on the device.

How can you protect your device against Graphite spyware?

Protection starts with keeping your operating system updated to the latest version to patch known vulnerabilities. You can also enable Lockdown Mode on your iPhone for maximum security, perform regular device reboots to clear temporary payloads, and stay alert for security notifications from your device manufacturer regarding potential state-sponsored threats.

By staying informed and maintaining a proactive approach to your mobile security, you can significantly reduce your risk of falling victim to sophisticated surveillance tools. If you are a journalist, activist, or legal professional, ensure your team is aware of these threats and the critical importance of the latest system updates.

Related stories

More from Business Apps & AI