Fresh details emerging from the Epstein files have reopened questions about how money, influence, and technology quietly intersect behind the scenes. New FBI informant reports describe a hidden cyberworld allegedly linked to Jeffrey Epstein, involving advanced hacking tools, foreign governments, and some of the world’s most sensitive digital systems.
These claims suggest that Epstein’s network extended far beyond finance and social circles. According to the reports, he maintained close ties with an elite hacker whose work may have shaped global cyber surveillance, touching smartphones, encrypted messaging, and national security systems used by millions of people worldwide.
A personal hacker in Epstein’s inner circle
According to FBI informant statements cited in recent reporting, Jeffrey Epstein allegedly kept a highly skilled hacker on personal retainer for years. The hacker, described as an exceptionally talented Italian national, was said to specialize in finding unknown software flaws, commonly known as zero-day exploits.
Before COVID, Pandemic Simulations Were Already on the Table — Newly Released Epstein Email Shows
Zero-day exploits are among the most dangerous tools in cyberspace. They allow hackers to enter phones or computers without setting off alarms. Because the flaw is unknown to software makers, users have no way to protect themselves. These exploits can turn everyday devices into silent listening tools.
The informant claims Epstein financially supported the hacker’s work and helped him operate quietly. While Epstein was not described as writing code himself, he allegedly acted as a powerful backer, enabling the hacker to build and sell tools that could secretly access private data, messages, and calls.
These reports add a new dimension to Epstein’s profile, shifting focus from personal crimes to a broader ecosystem of power, secrecy, and technology operating largely out of public view.
Cyber weapons sold to Saudi Arabia and Hezbollah
The informant reports further allege that the hacker sold these cyber exploits to Saudi Arabia and to Hezbollah. In the case of Saudi Arabia, the hacker was reportedly involved in building the country’s cyber surveillance capabilities from the ground up. This allegedly included systems designed to monitor communications, track digital activity, and gather data on individuals.
Stanford experiment shows AI hacker ARTEMIS outperforms highly paid human cybersecurity experts
Such surveillance tools are often used by governments to monitor journalists, activists, and political opponents. If the claims are accurate, the hacker’s work may have enabled widespread digital monitoring at a national level.
The reports also state that the hacker sold tools to Hezbollah, a militant group known for its regional influence and conflict involvement. These tools were not basic hacks but advanced exploits capable of penetrating secure systems without detection.
One of the most striking allegations is that the hacker was among the first to successfully break into BlackBerry devices and Apple’s iOS platform. At the time, BlackBerry phones were trusted by governments and corporations, while iPhones were promoted as highly secure for everyday users. Cracking these systems would have opened access to emails, messages, and sensitive conversations.
For regular people, this kind of access means private lives could be exposed without any warning. For powerful actors, it represents control over information, communication, and influence.
From covert hacking to a senior role at CrowdStrike
Perhaps the most controversial part of the informant’s account is what allegedly happened later. Despite the hacker’s reported past involvement in offensive cyber operations, the reports claim he later rose to a senior director-level position at CrowdStrike, a major global cybersecurity firm.
CrowdStrike is known for defending companies and governments against cyber threats. The idea that someone with a background in selling exploits to foreign governments and militant groups could transition into a leadership role within such a company has raised concerns about transparency and vetting in the cybersecurity industry.
The informant described this career shift as something that only makes sense within the “Epstein universe,” where wealth and connections often smoothed paths that would normally face scrutiny. Moving from building surveillance tools in secret to holding a respected corporate position highlights how blurred the lines between offensive hacking and defensive cybersecurity can be.
Before the Abraham Accords, Epstein was already opening doors between Israel and the
UAE
So far, these claims remain based on informant reports reviewed by the FBI. No public criminal charges related to these specific hacking activities have been announced. However, the allegations raise serious questions about how cyber weapons are developed, who funds them, and how individuals involved in such work can later reappear in trusted institutions.
As more Epstein-related documents come to light, this account shifts attention toward the hidden digital systems that quietly influence privacy, security, and power across the world—often far from public awareness.




