:

100 COUNTRIES NOW HAVE CYBER INTRUSION SOFTWARE

SECURITY DESK2 MIN READ
WED, APR 22, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

The UK's GCHQ estimates approximately 100 nations have acquired sophisticated cyber intrusion tools like Pegasus, signaling that access to advanced hacking technology is becoming increasingly widespread.

According to UK intelligence officials, the proliferation of commercial spyware represents a growing security threat. Pegasus, the NSO Group's flagship surveillance tool, exemplifies the type of software now accessible to state actors across the globe. The assessment suggests that barriers to obtaining such technology have eroded significantly. What once required substantial technical expertise and resources is now available through commercial channels, lowering the threshold for nation states seeking cyber capabilities. Pegasus gained international attention following revelations about its use against journalists, human rights activists, and political figures. The software exploits mobile device vulnerabilities to extract data, capture communications, and activate device cameras and microphones. The GCHQ's estimate reflects broader concerns about the militarization of cyber tools. As more countries obtain intrusion software, the potential for coordinated attacks, espionage campaigns, and destabilization efforts increases. Intelligence agencies worldwide have flagged the concentration of such capabilities among state and non-state actors. The proliferation has prompted calls for stricter regulation of the commercial surveillance industry. Several countries have already restricted or banned the export of cyber intrusion technology, though enforcement remains inconsistent. With approximately 195 nation states in existence, GCHQ's figure indicates that roughly half have acquired such capabilities. The estimate underscores the dual-use nature of cybersecurity tools—technologies developed for defensive purposes increasingly serve offensive applications. The spread of these tools complicates international cyber governance and raises questions about attribution in cyberattacks. When intrusion software becomes widely available, determining which state actor conducted an operation becomes significantly more difficult.

■ SOURCES

Techmeme

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

A North Korean hacking group leveraged AI tools to enhance their cybercriminal operations, stealing up to $12 million in three months. The group used artificial intelligence for malware development and creating fraudulent company websites.

JUST NOWAI Desk

London's Metropolitan Police can continue deploying live facial recognition technology after surviving a legal challenge in the UK's High Court. The force reports the system has resulted in over 2,100 arrests since 2024.

JUST NOWIndustry Desk

Cosmetics retailer Rituals has confirmed a data breach affecting its customer membership database. The company, which maintains records for 41 million customers, has not disclosed the exact number of individuals impacted.

2H AGOSecurity Desk

Ofcom has launched a formal investigation into Telegram after receiving evidence that the messaging platform is failing to prevent the sharing of child sexual abuse material (CSAM). The probe follows the Online Safety Act requirements for UK communications regulators.

2H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.