UK government says 100 countries have spyware that can hack people's phones
More than half of the world’s governments have access to commercial spyware that can break into computers and phones to steal sensitive information, according to U.K. intelligence.
The U.K. National Cyber Security Centre plans to reveal its findings Wednesday, according to Politico. The report suggests that the barrier to access this type of surveillance technology has fallen, potentially making it easier for foreign governments and hackers to target U.K. citizens, companies, and critical infrastructure with spyware.
It’s also an increase in the number of countries with access to these type of hacking tools, to 100, up from the 80 countries U.K. intelligence estimated in 2023.
Commercial spyware, developed by private companies like NSO Group’s Pegasus and Paragon’s Graphite, often relies on exploiting security flaws in phone and computer software to break into the devices and steal the data within. While governments have claimed that they only use spyware against top criminal and terror suspects, security researchers and human rights defenders have long warned that governments have misused spyware to target their critics and political adversaries, including journalists.
U.K. intelligence now says that the victimology has “expanded” in recent years to include bankers and wealthy businesspeople.
Richard Horne, who runs the U.K. National Cyber Security Centre, said in a speech at the CYBERUK conference in Glasgow that British companies are “failing to grasp the reality of today’s world,” per a pre-released copy of his speech seen by TechCrunch.
Horne said that the majority of nationally significant cyberattacks targeting the United Kingdom has originated from foreign adversarial governments, rather than cybercriminal gangs.
Techcrunch event
Meet your next investor or portfolio startup at Disrupt
Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.
Meet your next investor or portfolio startup at Disrupt
Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.
San Francisco, CA
|
October 13-15, 2026
REGISTER NOW
The U.K., along with several other countries, also continues to experience China-linked intrusions aimed at stealing sensitive data, spying on high-profile individuals, and setting the groundwork for potentially disruptive hacks to stall a Western military response ahead of an anticipated Chinese invasion of Taiwan.
The spyware threat facing the U.K. is not just from governments, but also cybercriminals with access to these tools. Earlier this year, a hacking toolkit dubbed DarkSword, containing several exploits capable of hacking into modern iPhones and iPads, leaked online. The tools allowed anyone to set up websites capable of hacking Apple customers who had not yet updated to the most recent version of its mobile software.
The leak of the hacking tools showed — and not for the first time — that even tightly guarded hacking tools developed by and for governments can leak and proliferate out of control, putting potentially millions of people at risk from malicious hacks.
Topics
cybersecurity, Government & Policy, graphite, NSO Group, paragon, Pegasus, Security, Spyware, UK government, United Kingdom
When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.
Zack Whittaker
Security Editor
Zack Whittaker is the security editor at TechCrunch. He also authors the weekly cybersecurity newsletter, this week in security.
He can be reached via encrypted message at zackwhittaker.1337 on Signal. You can also contact him by email, or to verify outreach, at zack.whittaker@techcrunch.com.
View Bio
April 30
San Francisco, CA
StrictlyVC kicks off the year in SF. Get in the room for unfiltered fireside chats with industry leaders, insider VC insights, and high-value connections that actually move the needle. Tickets are limited.
REGISTER NOW
Most Popular
-
Unauthorized group has gained access to Anthropic’s exclusive cyber tool Mythos, report claims
- Lucas Ropek
-
Tim Cook stepping down as Apple CEO, John Ternus taking over
- Amanda Silberling
- Connie Loizos
-
Blue Origin’s New Glenn put a customer satellite in the wrong orbit during its third launch
- Sean O'Kane
-
Palantir posts mini-manifesto denouncing inclusivity and ‘regressive’ cultures
- Anthony Ha
-
‘Tokenmaxxing’ is making developers less productive than they think
- Tim Fernholz
-
Anthropic lau