3

Pegasus, Cytrox, Predator Spyware

Hello,

  • NSO Group (Pegasus),
  • Cytrox/Intellexa (Predatorar),
  • Candiru (Sykophant/DevilsTongue),
  • QuaDream (Reign),
  • Paragon Solutions (Graphite)
  • Hacking Team (RCS)
  • L3Harris Technologies (Drone/IMSI catcher spyware)
  • Palantir Technologies (Surveillance Platforms)
  • Raytheon (Blackbird / Silent Break Security exploits)
  • Boldend
  • Toka Cyber
  • Verint (Cognyte),

are part of the global ecosystem of commercial spyware, offensive cyber tools, and state-level surveillance technologies.

They include actively exploited spyware platforms confirmed in investigations by Citizen Lab, Amnesty International Security Lab, Meta Threat Reports, Google TAG, ESET, and Sekoia.io, as well as interception and surveillance systems used by governments for device compromise, data extraction, targeted monitoring, and large-scale digital surveillance.

 

Because of that:

 

  • 1. can you add all of these lists in NextDNS from the link: https://windgate.net/adguard-privacy-security-block-lists-2025/ ?
  • 2. can you add more blocklists that blocks Pegasus, Predator & others upper described? e.g. Add the official open-source datasets from:
    • Citizen Lab (Predator / Intellexa reports)
    • Amnesty International Security Lab – Predator Files
    • Meta Threat Report (Intellexa/Cytrox infrastructure)
    • Google TAG Predator exploit infrastructure
    • Sekoia.io Predator IOC feed
    • MISP community Predator datasets
    • NSO Pegasus, and NSO Pegasus2 blocklist, 
    • TheGreatWall blocklist..

These include domains, IP addresses, ASN ranges and C2 infrastructure attributed to Predator, Pegasus etc., used for command-and-control, exploit delivery and network beacons.
 

Thank you.

Reply

null

Content aside

  • 3 Votes
  • 2 mths agoLast active
  • 63Views
  • 1 Following