Understanding the Warning
If you've received a notification indicating you were targeted by government hackers, the first and most crucial step is to take it seriously. These companies possess extensive telemetry data regarding user activity, device behavior, and online accounts. Their security teams have years of experience hunting, studying, and analyzing malicious activity. If they believe you've been targeted, their assessment is likely accurate. It's important to differentiate between types of notifications. For Apple and WhatsApp users, receiving an alert doesn't necessarily mean your device was successfully hacked; it could indicate a failed attempt. However, it unequivocally confirms that someone tried. Google's alerts, on the other hand, often mean the company has already blocked the attack. In such cases, Google advises users to enhance their account security by enabling multi-factor authentication (ideally with a physical security key or passkey) and activating its Advanced Protection Program, which adds further layers of security to your Google account. Essentially, Google provides guidance on strengthening your future defenses. Within the Apple ecosystem, activating Lockdown Mode is highly recommended. This feature enables a suite of security measures designed to make it significantly harder for hackers to compromise your Apple devices. Apple has previously stated that it has not observed a successful hack against a user with Lockdown Mode enabled, though no system is entirely foolproof. Mohammed Al-Maskati, director of Access Now's Digital Security Helpline—a global 24/7 team of experts investigating spyware cases against civil society members—offers comprehensive advice. This includes keeping device operating systems and apps up-to-date, enabling Apple's Lockdown Mode, and Google's Advanced Protection for both accounts and Android devices. Additionally, users should exercise caution with suspicious links and attachments, regularly restart their phones, and monitor for any unusual changes in device functionality.Reaching Out for Help
The next steps largely depend on your identity and resources. For those with some technical expertise, open-source tools are available to detect suspected spyware attacks. The Mobile Verification Toolkit (MVT) allows users to search for forensic traces of an attack on their own devices, serving as a potential first step before seeking professional assistance. If you prefer not to use MVT or lack the technical knowledge, direct professional help is available. For journalists, dissidents, academics, or human rights activists, several organizations specialize in these cases:- Access Now and its Digital Security Helpline: A dedicated resource for digital security assistance.
- Amnesty International: Their security lab has extensive experience and a specialized team of investigators.
- The Citizen Lab: A digital rights group at the University of Toronto, renowned for nearly 15 years of investigating spyware abuses.
- Reporters Without Borders: Offers a digital security lab specifically for journalists facing hacking and surveillance.
- iVerify: Offers an app for Android and iOS that includes an option for in-depth forensic investigations.
- Safety Sync Group: A startup founded by Matt Mitchell, a respected security expert known for helping vulnerable populations.
- Hexordia: Led by forensic investigator Jessica Hyde, this startup offers suspected hack investigations.
- Lookout: A mobile cybersecurity company with extensive experience analyzing government spyware globally. They provide an online form for reporting cyberattacks, which can lead to involvement from their threat intelligence and forensics teams.
- TLPBLACK: Headed by Costin Raiu, a former leader of Kaspersky's Global Research and Analysis Group (GReAT), this small team of security researchers has discovered sophisticated cyberattacks from elite government hacking teams worldwide. Raiu can be contacted directly via email.








