Global Alerts Issued After Cyber Threat Traced to Israel–UAE Software as Espionage Activity Intensifies Amid Shifting Gulf–US Alliances
Well-informed cybersecurity and intelligence sources confirmed to Dark Box that both Google and Apple have issued urgent warnings to millions of smartphone users worldwide after detecting a coordinated cyber threat targeting smart devices through sophisticated intrusion tools. The alerts, sent within hours of each other, mark one of the most expansive global cybersecurity warnings ever triggered by the two technology giants.
According to Apple’s internal communication shared with Dark Box, the attack impacted users in more than one hundred fifty countries across multiple continents. Apple did not disclose how many individuals were targeted, nor did it identify the perpetrator behind the breach. However, the company categorised the incident as a severe threat typically associated with state-linked cyber operations, noting that only highly resourced actors possess the capabilities observed in the intrusion.
Google’s findings went further. In a public notice issued after its internal Threat Analysis Group completed its preliminary review, Google confirmed that software originating from a joint Israel–UAE technology cluster was responsible for the attack. This cluster, according to Google’s analysts, operates under a private veneer while providing cyber intrusion tools that mirror state capabilities. Google noted that victims included users in Saudi Arabia, Egypt, Tajikistan and Pakistan, as well as individuals inside the United States. Dark Box sources described the targeting pattern as “deliberate, geographically selective and designed to evade conventional detection systems”.
In an alarming development, senior officials within the US administration received a suspicious WhatsApp link containing embedded malicious code, according to Dark Box’s proprietary intelligence. The link was designed to execute a silent payload on the device upon clicking, enabling real-time surveillance, data extraction and potential access to encrypted communications. While none of the officials engaged with the link, the mere attempt indicates an escalation in the aggressiveness and reach of the actors deploying these tools.
The warnings issued this week are not isolated. Over recent months, more than eighty journalists, predominantly in the United States, received similar alerts from major tech companies warning that their devices were being targeted by advanced spyware campaigns. Investigators told Dark Box that the pattern of targeting reflected interest in journalists covering Middle Eastern politics, Gulf rivalries and cybersecurity issues, suggesting that the attackers sought to identify individuals with access to sensitive information or those capable of shaping public narratives.
Dark Box’s earlier investigations had already exposed the involvement of a UAE-based software entity in espionage activity directed at political figures, journalists and activists. The new findings expand the scope of that activity, revealing a global campaign that uses cross-border infrastructure, multi-layered proxy servers and anonymised data channels to obscure the operations’ origins.
According to the sources, these cyber activities began intensifying shortly after the United States strengthened its ties with Saudi Arabia, leaving the UAE concerned about its diminishing influence in Washington. Analysts briefed by Dark Box noted that Abu Dhabi may be expanding its cyber operations as a compensatory tool to gather intelligence, shape diplomatic leverage and monitor shifts in US policy. While the UAE maintains official cooperation with Washington in technology and cybersecurity fields, its growing reliance on private cyber-intelligence firms has raised concern within Western intelligence services.
The malicious software traced by Google is described as an advanced modular platform capable of exploiting both iOS and Android devices. It uses a combination of zero-day vulnerabilities and deceptive messaging techniques to infiltrate systems. Once inside a device, the software can access microphones, cameras, location data, cloud backups and encrypted communications. The software also includes self-erasing mechanisms designed to prevent forensic recovery. A senior cybersecurity analyst who reviewed the code confirmed to Dark Box that “the hallmark of this tool is its sophistication and its resemblance to platforms used in high-level political espionage”.
Tech companies privately acknowledge that the scale of the attack suggests coordination between multiple entities rather than a lone developer. Google’s report specifically highlights patterns associated with commercial spyware sold through intermediaries who maintain relationships with both Israeli and Emirati intelligence-adjacent firms. Several analysts pointed to existing networks developed through security cooperation agreements and technology-transfer partnerships between firms in Tel Aviv and Abu Dhabi.
The international fallout from the alerts is expected to grow. Several Arab and Asian governments have requested technical assessments from Google and Apple to evaluate whether their officials were targeted. US lawmakers have also demanded briefings from the companies to determine whether foreign cyber actors attempted to access classified or sensitive political information.
Dark Box can confirm that emergency security protocols have been activated across several governmental institutions in Washington, including device audits, encrypted-line purges and temporary restrictions on messaging platforms commonly exploited in cyber operations.
The most pressing question now facing investigators is whether this campaign represents a singular espionage wave or the beginning of a sustained global effort. If the deployment of Israel–UAE spyware marks a shift toward more aggressive and globally distributed cyber activities, tech companies and governments may face repeated waves of intrusion attempts in the months ahead.
For now, what remains clear is that the digital threat landscape is undergoing a seismic transformation. As states compete for influence in shifting geopolitical terrain, cyber operations have become a primary tool of foreign policy, capable of reaching into the pockets of ordinary citizens and the devices of powerful officials alike.



