## 🧨 **Notorious & Well-Documented Malware Contractors**
### 1. [[NSO Group (Israel)]]
- 🔧 **Famous for**: Pegasus spyware
- 📱 Targets: iOS & Android devices, used for zero-click exploits.
- 🕵️♂️ Used by: Governments (for counterterrorism... and allegedly for spying on journalists, dissidents, etc.)
- ⚠️ Fallout: Blacklisted by the U.S.; lawsuits from Apple and WhatsApp.
---
### 2. [[Hacking Team (Italy)]] _(now rebranded as Memento Labs)_
- 🔧 **Product**: Remote Control System (RCS) spyware
- 🧪 Capable of: Full device takeover—mic, camera, messages, etc.
- 💣 Breached in 2015, exposing deals with authoritarian regimes and the full source code of its spyware.
---
### 3. [[Gamma Group]] (UK/ Germany)
- 🔧 **Product**: FinFisher / FinSpy
- 🎯 Targets: Activists, opposition leaders
- 🧩 Features: Keystroke logging, webcam/mic access, data exfiltration.
- 💥 Exposed by WikiLeaks, The Citizen Lab, and German activists.
---
### 4. [[Candiru]] (Israel)
- 🔧 **Specialty**: Exploits for Windows, browsers, and zero-day vulnerabilities.
- 🔥 Known to use multiple **zero-click** infection vectors.
- 🧬 Targets include: Civil society, NGOs, journalists.
---
## 🏢 **Large Defense Contractors with Offensive Cyber Divisions**
These firms don’t advertise “malware” products, but they are known to **develop offensive cyber capabilities** for government use.
### 5. [[Raytheon ]](US)
- 💼 Role: Defense & cybersecurity powerhouse.
- 🛠 Linked to developing **zero-day exploits** and **cyber weapons** for US military and intelligence.
- 🧠 Acquired companies with niche hacking capabilities.
---
### 6. [[Northrop Grumman]] (US)
- 💻 Known for: Building cyber operations platforms.
- 🕶 Works with NSA & Cyber Command.
- ⚔️ Offensive and defensive cyber capabilities, though details are highly classified.
---
### 7. [[Lockheed Martin]] (US)
- 🚨 Focus: Cybersecurity, electronic warfare, signals intelligence (SIGINT).
- 🧰 Known to be involved in **nation-state level cyber offense/defense projects**.
---
### 8. [[Booz Allen Hamilton]] (US)
- 🕵️♂️ Edward Snowden’s former employer.
- 💼 Does sensitive intelligence work for NSA, DoD.
- ⚙️ Believed to help architect and implement cyber espionage campaigns.
---
## 🧥 **Dark Contracts and Ghost Operators**
### 9. [[CyberPoint International]] (US)
- 🛠 Involved in UAE’s **Project Raven**: surveillance of activists, diplomats, and journalists.
- 📢 Exposed by Reuters: former NSA staff helped UAE build spyware platforms.
---
### 10. [[DarkMatter Group]] (UAE)
- 🧩 Created from former intelligence operatives (incl. NSA veterans).
- ⚔️ Built advanced spyware tools for surveillance in the Gulf region.
- 🔥 Under U.S. scrutiny for misuse of surveillance tech and exfiltration of sensitive data.
---
## 🤖 **Emerging Players & Shell Companies**
The cyber arms space is filled with **front companies**, **contractors-for-hire**, and **quiet specialists** who:
- Sell exploits on private markets
- Develop malware for nation-state actors
- Disguise malware as “lawful intercept tools” for law enforcement
Many of these are **gray market entities**, popping up and vanishing after selling a handful of high-value exploits.
---
## 🧩 What Kind of Malware Are We Talking About?
- **Zero-click spyware** (e.g. Pegasus)
- **Remote Access Trojans (RATs)**
- **Rootkits and bootkits**
- **Custom implants for specific targets**
- **Network intrusion platforms**
- **Watering hole & supply chain attack tools**
---
## 🎯 Why It Matters
- These contractors operate in a legal gray zone: what’s legal in one country can be a human rights violation in another.
- Their tools often **leak**, get reused by criminals, or end up in the hands of authoritarian regimes.
- Cyberwarfare is now a **lucrative private industry**, not just a government game.
---