• Passa alla navigazione primaria
  • Passa al contenuto principale
  • Formati
    • Serie
    • Inchieste
    • Feature
    • Editoriali
  • Speciali
    • Inchiestage
    • Fotoreportage
    • Video
    • Podcast
  • Archivi
    • Archivio generale
  • IrpiMedia
    • Membership
    • SHOP
    • Newsletter
    • IrpiLeaks
    • Editoria
    • Redazione
  • Irpi
    • APS
    • SLAPP
    • Dona
  • In English
    • Investigations
    • Donate
  • Social
    • Facebook
    • Instagram
    • LinkedIn
    • Telegram
    • YouTube
IrpiMedia

IrpiMedia

Periodico indipendente di giornalismo d'inchiesta

  • Home
  • Menu
  • MyIrpi
  • Login
irpi media

Prominent Italian businessman also among the targets of Paragon spyware

Francesco Gaetano Caltagirone received a WhatsApp message on January 31, along with 90 other users around the world. Since the end of 2024, he has been at the center of a major banking operation involving the government. He is the first name involved outside the circle of activists and journalists

09.10.25

Raffaele Angius

Argomenti correlati

After activists and journalists, the world of finance has now entered the chat. It’s the latest twist in the saga of Graphite, the spyware developed by Israeli firm Paragon Solutions and used by governments and law enforcement agencies in several countries, including Italy. According to information obtained by IrpiMedia and La Stampa, a new name has joined the list of people who, last January, received a message from WhatsApp informing them they had been targeted by the spyware.

That person is Francesco Gaetano Caltagirone — entrepreneur, publisher, and one of Italy’s richest men. It’s unclear who attempted to spy on him, but the notification that appeared on his phone, along with those of at least seven other people in the country, was unambiguous.

On the same day, WhatsApp also notified Fanpage editor-in-chief Francesco Cancellato and the two founders of the Ngo Mediterranea, Luca Casarini and Giuseppe “Beppe” Caccia. We know this because they went public with the information themselves, revealing a network of surveillance activities that stretched far beyond the initial alert.

The investigation in a nutshell

  • On January 31, WhatsApp sent a message to inform 90 users worldwide that they had been targeted by spyware. Among at least seven Italian users identified so far were the phone numbers of activists such as Luca Casarini and Beppe Caccia of the ngo Mediterranea, and journalists including Fanpage’s editor-in-chief Francesco Cancellato. IrpiMedia and La Stampa have verified that businessman Francesco Gaetano Caltagirone also received the same notification
  • Citizen Lab, the research group at the University of Toronto that investigates spyware, determined that the malware used in these attacks is Graphite, developed by the Israeli company Paragon Solutions.
  • Caltagirone, one of the richest men in Italy, has been at the center – since the end of 2024 – of a banking operation involving the government, aimed at creating the country’s third-largest banking group, based in Rome.
  • The spyware was delivered through a vulnerability in WhatsApp. Caltagirone was reportedly added, without his knowledge, to a chat in which a Pdf file containing the spyware was shared. IrpiMedia and La Stampa asked the businessman’s press office whether his phone had subsequently been analyzed, but received no response.
  • Several experts familiar with the issue agree that targeting a specific individual in such an attack costs around half a million euros. These operations are always highly targeted.
  • The Graphite case came to light after Francesco Cancellato revealed that he had been alerted to the attack by Meta, WhatsApp’s parent company. The government has consistently denied any involvement in the operation against Cancellato, while admitting to conducting intelligence activities targeting Mediterranea activists

From Father Mattia Ferrari, Mediterranea’s onboard chaplain, to Fanpage managing editor Ciro Pellegrino, the scope of the spying operation widened rapidly in the months that followed. But this is the first known case in which a businessman — far removed from the worlds of journalism or activism — has been among the targets.

Caltagirone is one of the key players in the series of operations that are reshaping the Italian financial structure. He is a shareholder in several banks – Generali, Mps, and Mediobanca – the latter of which was acquired by Mps (where the state is also a shareholder). At this point, only the authorities will be able to ascertain whether it was a foreign government that targeted Caltagirone’s smartphone, a hypothesis already aired in relation to Cancellato, or whether there is an Italian hand behind the operation. But let’s take it one step at a time.

An exclusive circle

According to sources familiar with the matter who spoke to IrpiMedia, in December 2024 the phone number used by Caltagirone was added to a WhatsApp chat made up of contacts he knew personally. Inside the chat, a Pdf file had been shared. Shortly afterwards, the chat disappeared — and the Pdf along with it.

A month later, WhatsApp informed the affected users that it had identified and fixed a vulnerability that had allowed an attacker to install spyware on a target’s device without their knowledge — and without the need to click on any link or attachment.

These are known as “zero-click attacks”: they exploit a flaw in a system or app — WhatsApp in this case — to silently install malicious software, leaving no trace and requiring no interaction from the target, unlike more common phishing or malware attempts. Caltagirone’s smartphone was among those that received this warning.

Subscribe to our monthly newsletter to stay up to date on the editorial team’s investigations surveillance

SUBSCRIBE

According to the accounts of other victims and Citizen Lab itself, this is precisely the method by which Graphite was spread among its targets. The system does not strike at random, but is programmed to install itself exclusively on the target’s phone, leaving other people in the group unscathed, whose role is merely to act as extras, to make the trap more credible.

Following WhatsApp’s security alert, the phone was reset to factory settings — a move that removed the spyware but also erased any digital evidence that could have helped trace it. Contacted by IrpiMedia and La Stampa, Caltagirone’s press office did not respond to a request for comment and did not clarify whether any forensic checks had been carried out on the device.

A wave of notifications

Casarini, Caccia and Cancellato were the first to speak out about being targeted, in the wake of the WhatsApp alerts sent on 31 January. According to WhatsApp and Citizen Lab — the University of Toronto research centre that helped uncover the threat — ninety such notifications were sent simultaneously across several countries, seven of them in Italy. What was not known at the time, and would only emerge in the following days, was that Mediterranea had already been flagged in earlier incidents of this kind.

The first dated back a full year, to February 2024, when Meta — the parent company of Facebook and WhatsApp — sent a similar warning. That alert went to Casarini once again, as well as to Father Mattia Ferrari, Mediterranea’s onboard chaplain.

Ferrari also holds the phone contract used by David Yambio, a Sudanese citizen and spokesperson for the ngo Refugees in Libya, who in turn received a notification from Apple in November 2024 warning of a possible compromise of his device. That made three.

The picture was later reconstructed by an inquiry carried out by Copasir — the Parliamentary Committee for the Security of the Republic, which oversees Italy’s intelligence agencies — in the spring of this year.

The committee’s report, unusually made public, confirmed that Caccia and Casarini had indeed been the subjects of surveillance by the Italian secret services, in operations «aimed at preventing threats to national security by individuals suspected of facilitating the entry of foreign nationals into the country.»

What happened in Cancellato’s case, however, has never been established. The government has consistently denied any role in the affair and has even suggested the involvement of a foreign intelligence service.

To explore the range of possibilities, Copasir carried out inspections at the headquarters of Aise and Aisi (the foreign and domestic secret services, respectively), requesting to see the respective servers from which they interact with Paragon. By entering the phone numbers of the targets, confirmation was found for both Caccia and Casarini. When queried with Cancellato’s number, the system responded: «Number not found.»

Things got complicated in April, when another notification—this time sent by Apple—warned a second batch of targets about the potential compromise of their devices. Among them was Ciro Pellegrino, managing editor of Fanpage. Although nothing was found on Cancellato’s device, it cannot be a coincidence that a second Graphite infection was recorded in the same publication.

Fanpage is known for its undercover investigations, including Gioventù meloniana (Melonian Youth), which, thanks to the work of a journalist who infiltrated Gioventù Nazionale (National Youth), exposes the far-right leanings and fascist nostalgia of the youth wing of the party led by Prime Minister Giorgia Meloni. Subsequent analyses of Pellegrino’s phone, carried out in the Citizen Lab laboratories in Toronto, confirmed the presence of Paragon on his device.

It was only in June that prosecutors in Rome and Naples ordered forensic examinations of the phones belonging to individuals under surveillance, authorising non-repeatable analyses of the devices. Following that move, more victims of Paragon spyware came to light: among them were Roberto D’Agostino, founder of the gossip site Dagospia, and Eva Vlaardingerbroek, a Dutch far-right influencer based in Rome.

«Governments have so many different tools to monitor a target that it’s simply unthinkable they’d all work the same way or be easy to detect,» a source who analysed several of the devices told IrpiMedia. “There are far more spyware products than those made by Paragon or Nso, and there’s also a web of quid pro quos between countries — if I can’t intercept a specific citizen, I’ll ask a neighbouring state to do it for me,” the expert said, unable to discuss concrete examples for confidentiality reasons.

Contacted by IrpiMedia, Paragon did not respond to a request for comment.

Who are Paragon’s clients

Among those in the surveillance industry, Graphite is a well-known name. Paragon Solutions, the company behind it, is an Israeli firm that develops and researches cutting-edge surveillance technologies. Its flagship product has become one of the most sought-after tools on the market — especially since rival company Nso was forced to scale back operations following a series of scandals over the misuse of its technology by numerous governments, as documented by IrpiMedia in investigations spanning from Marocco to Messico.

In the surveillance business, the value of a product lies not only in the quality of its software but in the company’s ability to bypass the security systems of smartphones, computers, and both Android and Apple devices, allowing it to operate on virtually any target or platform. That is precisely the service Paragon offers — and one that has even attracted investment from the European Union over time.

USD

900.000.000

The amount paid by US-based AE Industrial Partners to acquire Paragon Solutions in December 2024

USD

2.000.000

The value of Paragon Solutions’ most recent contract, signed with ICE, the US agency for border control and immigration

EUR

30.000.000

The estimated value of the contract signed between Paragon Solutions and the Italian government

In December 2024, about a month before the WhatsApp notifications exposed one of Paragon’s infection methods, the Us investment fund AE Industrial Partners — focused on the aerospace, defence, and cyber-surveillance sectors — acquired the company for $900 million, according to industry reports. Public sources indicate that Paragon continues to sign contracts with Us government agencies.

The most recent, worth $2 million, was with Ice, the federal agency responsible for border and immigration enforcement. Sources familiar with the contract between Paragon and Italy told IrpiMedia that the deal was «in the order of tens of millions of euros — around thirty.»

Over the years, Paragon has managed to brand itself as the “ethical” alternative to Nso: no scandals, only legitimate state clients, and only “democratic countries that have successfully passed its rigorous due diligence and vetting process,” as the company stated in a press release last June. Although Paragon’s contracts are not public, the company has claimed they explicitly prohibit the use of Graphite against journalists or activists.

Officially, this is the reason why, in early February — shortly after the wave of notifications — Paragon announced it would unilaterally terminate its contract with Italy. A softer version of events later appeared in Copasir’s report, which referred instead to a “mutually agreed termination” between the parties. In either case, the logic behind such a move remains unclear — particularly if Paragon itself believes it was not the Italian government that spied on journalists, but another of its clients.

SUPPORT US

Want to know how surveillance impacts democracy? Help us continue these investigations

Gift MyIrpi

Give someone a MyIrpi+ membership

and receive our IrpiMedia T-shirt for free.

Report

Become a source.

With IrpiLeaks, you can communicate with us securely.

After initially denying any wrongdoing, the Italian government eventually admitted to having used Graphite against Luca Casarini and Beppe Caccia — not as human rights activists, it claimed, but «in relation to their activities potentially linked to irregular immigration.» Excluding Yambio, who as noted was not targeted through Graphite, that leaves the unexplained notification received by Cancellato. 

A murky world

The cyber-surveillance market is populated by researchers who hunt for vulnerabilities in every system so those flaws can be weaponised to spy on targets. One such flaw — the WhatsApp vulnerability analysed with the help of Citizen Lab at the University of Toronto — allowed Graphite to be installed remotely without any interaction from the target. Another was an Apple vulnerability that led to alerts to Ciro Pellegrino and other journalists known to IrpiMedia who have chosen to remain anonymous.

 BLOW THE WHISTLE

Do you know something about this story? Download the App Signal and message our reporter Raffaele Angius @faffa.40

In every case the reporters turned to Citizen Lab to have their devices examined. As the organisation itself has reported, each forensic analysis uncovered signs of compromise consistent with the Israeli spyware.

According to what has been reconstructed by technicians and confirmed to IrpiMedia by independent sources, the vulnerability found on the affected iPhones is linked to iMessage, Cupertino’s instant messaging app that sorts both messages exchanged between iPhones and text messages. Again, this is a zero-click attack: Paragon found a way to break the iPhone’s security mechanisms by sending a message containing an image file.

IrpiMedia was able to view it in another case related to the story, and in this case, it was a trivial image of a profile photo silhouette, one of those preset on social networks until you decide to insert your own.  

«They are extremely expensive, technically sophisticated attacks, and there is a whole market worth billions,» a sector source who asked to remain anonymous told IrpiMedia. According to four experts consulted for this article, attacks against Android or Apple devices cost «around half a million euros per target, because the more they are used the higher the risk the vulnerable vendor will discover them,» one source explained.

The experts themselves are groping in the dark as they try to analyze the devices involved. There are numerous technical reasons why an analysis may not produce results. Time is a key factor: the longer the analysis of the device is delayed, the more difficult it will be to identify compromising elements.

This stems primarily from the way smartphones manage logs, records of some—but not all—activities that take place within the phone. Then there are anomalies, such as the fact that Caltagirone’s smartphone is also the first known case of an iPhone receiving a notification from WhatsApp, whose vulnerability was believed to be effective only on Android devices.

However, there are several plausible explanations: experts explain that one may be the presence in the past of a backup traceable to an Android device. «Attackers always work with incomplete information,» says one source, «and this means that they may make mistakes in choosing which weapon to use.»

Le inchieste e gli eventi di IrpiMedia sono anche su WhatsApp. Clicca qui per iscriverti e restare sempre aggiornat*. Ricordati di scegliere “Iscriviti” e di attivare le notifiche.

Crediti

Autori

Raffaele Angius

Editing

Lorenzo Bagnoli

Fact-checking

Lorenzo Bagnoli

Ha collaborato

Antonella Napolitano

In partnership con

La Stampa

Foto di copertina

© Brett Jordan/Unsplash

Condividi su

Potresti leggere anche

#EuArms
Inchiesta

Le armi tedesche alla Russia

29.04.22
Richter
#MediterraneoCentrale
Feature

Il centro di Al-Mabani è chiuso, ma le milizie sono ancora impunite in Libia

21.04.22
Urbina, Galvin
#SenzaSegnale
Inchiestage

Calvairate, l’isola di fronte alla marea della gentrificazione di Milano

06.02.26
Bonalumi, Del Monte
#EnergyTrap
Feature

Gli esclusi del Superbonus

12.12.25
Veresani

Logo IRPI media
Logo IRPI media

IrpiMedia è una testata registrata al Tribunale di Milano n. 13/2020.
IRPI | Investigative Reporting Project Italy | Associazione di promozione sociale | C.F. 94219220483
I contenuti di questo sito sono distribuiti con licenza Creative Commons Attribuzione – Non commerciale 4.0 Internazionale.

  • Serie
  • Inchieste
  • Feature
  • Editoriali
  • Inchiestage
  • Fotoreportage
  • Video
  • Podcast
  • Newsletter
  • IrpiLeaks
  • Irpi
  • Cookie Policy
WhatsApp Facebook X Instagram LinkedIn YouTube
Gestisci consenso Cookie
Per fornire le migliori esperienze, utilizziamo tecnologie come i cookie per memorizzare e/o accedere alle informazioni del dispositivo. Il consenso a queste tecnologie ci permetterà di elaborare dati come il comportamento di navigazione o ID unici su questo sito. Non acconsentire o ritirare il consenso può influire negativamente su alcune caratteristiche e funzioni.
Funzionale Sempre attivo
L'archiviazione tecnica o l'accesso sono strettamente necessari al fine legittimo di consentire l'uso di un servizio specifico esplicitamente richiesto dall'abbonato o dall'utente, o al solo scopo di effettuare la trasmissione di una comunicazione su una rete di comunicazione elettronica.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistiche
L'archiviazione tecnica o l'accesso che viene utilizzato esclusivamente per scopi statistici. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
L'archiviazione tecnica o l'accesso sono necessari per creare profili di utenti per inviare pubblicità, o per tracciare l'utente su un sito web o su diversi siti web per scopi di marketing simili.
Gestisci opzioni Gestisci servizi Gestisci {vendor_count} fornitori Per saperne di più su questi scopi
Preferenze
{title} {title} {title}