CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 26, 2026

Intermediaries Driving Global Spyware Market Expansion

Dark Reading Archived Mar 26, 2026 ✓ Full text saved

Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBER RISK CYBERSECURITY OPERATIONS THREAT INTELLIGENCE VULNERABILITIES & THREATS NEWS Intermediaries Driving Global Spyware Market Expansion Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds. Robert Lemos,Contributing Writer March 26, 2026 5 Min Read SOURCE: ANDRII YALANSKYI VIA SHUTTERSTOCK Efforts to shine a light on the activities of spyware vendors has grown more difficult because of the proliferation of intermediaries — the spyware resellers, exploit brokers, contractors, and partners that allow government and private entities to circumvent transparency laws and spyware restrictions, experts say. These intermediaries, which often can be governments in permissive states, have fueled the spread of spyware across the globe, according to a report from policy think tank Atlantic Council published on March 18. Atlantic Council researchers cited several examples, including a South African intermediary acting as a representative for Memento Labs to sell its Dante spyware to the local market, and a third-party firm reportedly helping Israeli firm Passitora sell its spyware product to Bangladesh, despite the two countries having no diplomatic relations and Bangladesh having banned imports from Israel. Related:At RSAC, the EU Leads While US Officials Are Sidelined The spread of intermediaries has in part driven the proliferation of spyware and have certainly made developments in the market harder to track and analyze, says Jen Roberts, associate director of the Cyber Statecraft Initiative at Atlantic Council and one of the authors of the report. "Intermediaries can drive down transparency efforts in the marketplace for offensive cyber capabilities like spyware by muddying supply chains and creating confusion for end buyers as to where a capability or component of a capability has come from," she says. "Intermediaries drive sales to countries regardless of size, but it is often countries that do not have robust technical capabilities in-house that seek them on the open market." Fueled by demand from governments for law enforcement investigations, espionage, and, in many cases, surveillance of political opponents and dissenters, the spyware ecosystem continues to grow. In 2025, for the first time, more zero-day exploits were attributed to commercial surveillance vendors than traditional state-sponsored groups, according to a March analysis by Google's Threat Intelligence Group.  Additionally, the US government made several moves in recent months, such as reactivating canceled contracts and removing sanctions, that appear have to smoothed the way for surveillance-tech vendors. Meanwhile, human rights activists, digital rights advocates, and security researchers continue to try to untangle the shadowy ecosystem. The Atlantic Council's latest report, part of its "Mythical Beasts" series on this ecosystem, found that intermediaries play a significant role in the proliferation of spyware while making the hacking tools more costly and the software supply chain more opaque. Related:Blame Game: Why Public Cyber Attribution Carries Risks Embracing the Shadows Commercial spyware allows nations that lack the ability to develop their own spyware to use the gray market software. By purchasing these hacking tools through hard-to-track intermediaries, sanctioned nations can get around export controls and sell or acquire the surveillance technology. In fact, third parties such as brokers and resellers "are the spyware market's operational backbone," says Collin Hogue-Spears, senior director of solution management at Black Duck, an application-security firm. "Their corporate structures exist specifically to make export controls irrelevant," he says. "The spyware market stopped being a vendor-to-government pipeline years ago. It has evolved into a modular supply chain where intermediaries fill every gap the buyer cannot fill alone: exploit engineering, operational training, deployment infrastructure, and most importantly, a legal paper trail that hides the origin."   Resellers, exploit brokers, and other firms act as intermediaries in the spyware supply chain. Source: Atlantic Council Julian-Ferdinand Vögele, a principal threat researcher at threat-intelligence firm Recorded Future, agrees. Intermediaries lower barriers to entry by easing procurement across borders and bundling tools with training and support, he says. Related:Why a 'Near-Miss' Database Is Key to Improving Information Sharing "Commercial spyware operates in the shadows by design," Vögele says. "Brokers and resellers enable its spread by connecting vendors and buyers, bundling tools with support or training, and expanding into new markets, while adding opacity, obscuring relationships, and leveraging jurisdictions." Intermediaries rely on personal connections and networking to generate business and conceal their dealings, says Roberts. "It's difficult to say which has the greatest impact on spyware today, as there remains a lot we cannot observe," she says. "That being said, resellers concern me a lot, because we've observed them bypass policy regulations set forth to regulate this market, like export controls and trade bans." Limits on Spyware Mostly Ineffectual In February 2024, the United Kingdom and France launched the Pall Mall Process, a multilateral diplomatic process for addressing the burgeoning market for spyware and hacking tools, and the irresponsible use of those tools. The effort brought together governments, private industry partners, and civil policy experts, after a growing number of cases of spyware being used against journalists, diplomats, politicians and activists. Some spyware makers have attempted to repair their public images as government pressure has mounted. For example, the notorious NSO Group said it established a "human rights compliance program," but critics are dubious of such claims. The Pall Mall Process is still an ongoing effort, says Atlantic Council's Roberts. Currently, the participants are hashing out an industry code of practice, so it may be a while longer before the results of the process can be evaluated, she says. For now, the Atlantic Council's report recommended that countries adhere to Know Your Vendor requirements, require certification for brokers and resellers, and improve the registries of brokers and resellers. The most important near-term requirement is that governments and the public gain some visibility into the spyware market, especially the role of intermediaries, Roberts says. "Transparency initiatives are key to regulating intermediaries and also the spyware industry more broadly," she says. "It is difficult to ultimately regulate what one cannot observe." About the Author Robert Lemos Contributing Writer Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like CYBER RISK How Can CISOs Respond to Ransomware Getting More Violent? by James Doggett JAN 28, 2026 CYBER RISK Switching to Offense: US Makes Cyber Strategy Changes by Robert Lemos, Contributing Writer NOV 21, 2025 CYBER RISK Zambia's Updated Cyber Laws Prompt Surveillance Warnings by Robert Lemos, Contributing Writer APR 23, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Mar 26, 2026
    Archived
    Mar 26, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗