Executive Summary
In September 2025, the U.S. Immigration and Customs Enforcement (ICE) reactivated a $2 million contract with Israeli spyware vendor Paragon Solutions, initially signed in 2024 but paused for compliance review under an executive order restricting the use of commercial spyware. The contract involves Paragon's Graphite spyware, capable of infiltrating mobile devices and accessing encrypted communications. This reactivation has raised significant concerns among civil rights organizations regarding potential overreach and misuse of surveillance technology. The decision to proceed with the contract underscores the ongoing debate over the balance between national security measures and individual privacy rights, especially in light of previous controversies surrounding the use of commercial spyware by government agencies.
Why This Matters Now
The reactivation of ICE's contract with Paragon Solutions highlights the urgent need for clear policies and oversight regarding the use of powerful surveillance tools by government agencies, as their deployment can have profound implications for civil liberties and privacy rights.
Attack Path Analysis
The adversary initiated the attack by exploiting vulnerabilities in public-facing applications to gain initial access. They then escalated privileges by exploiting unpatched vulnerabilities, allowing them to execute commands with higher-level permissions. Utilizing command and scripting interpreters, the attacker moved laterally within the network, executing malicious scripts to compromise additional systems. For command and control, they established communication channels over standard application layer protocols to blend malicious traffic with legitimate network activity. Data was exfiltrated by transferring collected information over these established channels. The impact included unauthorized access to sensitive data and potential disruption of services.
Kill Chain Progression
Initial Compromise
Description
The adversary exploited vulnerabilities in public-facing applications to gain initial access to the network.
MITRE ATT&CK® Techniques
Command and Scripting Interpreter
Application Layer Protocol
Impair Defenses
Data from Local System
Valid Accounts
Boot or Logon Autostart Execution
Masquerading
Exploit Public-Facing Application
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity
Control ID: Pillar 1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Commercial spyware like Predator and Pegasus directly targets government officials and political candidates, compromising national security and democratic processes through zero-day exploits.
Newspapers/Journalism
Journalists face systematic targeting by commercial spyware vendors using sophisticated surveillance tools, threatening press freedom and source protection through mobile device compromise.
Law Enforcement
Law enforcement agencies like ICE utilize commercial spyware contracts despite policy restrictions, creating legal compliance risks and potential misuse of surveillance capabilities.
Telecommunications
Telecom infrastructure becomes attack vector for spyware distribution through mobile messaging services, requiring enhanced encrypted traffic monitoring and east-west security controls.
Sources
- Commercial Spyware Opponents Fear US Policy Shiftinghttps://www.darkreading.com/threat-intelligence/commercial-spyware-opponents-fear-us-policy-shiftingVerified
- ICE Quietly Reactivates $2 Million Spyware Contract After Year-Long Pausehttps://www.yahoo.com/news/articles/ice-quietly-reactivates-2-million-163918485.htmlVerified
- Trump administration removes three spyware-linked executives from sanctions listhttps://www.yahoo.com/news/articles/trump-administration-removes-three-spyware-233350283.htmlVerified
- Bennet, Warren, Colleagues Press Treasury and State to Explain Lifting of Sanctions on Three Enablers of Commercial Spyware Used Against Americans, Journalists, and Dissidentshttps://www.bennet.senate.gov/2026/02/18/bennet-warren-colleagues-press-treasury-and-state-to-explain-lifting-of-sanctions-on-three-enablers-of-commercial-spyware-used-against-americans-journalists-and-dissidents/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to exploit vulnerabilities, escalate privileges, move laterally, establish command and control channels, and exfiltrate data, thereby reducing the overall blast radius of the attack.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit vulnerabilities in public-facing applications would likely be constrained, limiting their initial access to the network.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges would likely be constrained, reducing their capacity to execute commands with higher-level permissions.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement within the network would likely be constrained, limiting their ability to compromise additional systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels would likely be constrained, reducing their capacity to blend malicious traffic with legitimate network activity.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate data would likely be constrained, limiting the unauthorized transfer of sensitive information.
The attacker's ability to access sensitive data and disrupt services would likely be constrained, reducing the overall impact of the attack.
Impact at a Glance
Affected Business Functions
- Immigration Enforcement Operations
- Surveillance and Monitoring
- Data Collection and Analysis
Estimated downtime: N/A
Estimated loss: N/A
Potential unauthorized surveillance of individuals, including journalists and activists, leading to privacy violations and potential misuse of collected data.
Recommended Actions
Key Takeaways & Next Steps
- • Implement regular patch management to address vulnerabilities in public-facing applications.
- • Deploy intrusion prevention systems to detect and block exploitation attempts.
- • Utilize command and scripting interpreter monitoring to detect unauthorized script execution.
- • Establish network segmentation to limit lateral movement within the network.
- • Monitor and control outbound traffic to detect and prevent data exfiltration.



