A recently released Department of Justice document shows that a confidential informant told the FBI in 2017 that Jeffrey Epstein had a personal hacker in his employ who was highly skilled at finding zero-day software vulnerabilities and developing offensive cyber tools; according to the informant’s claims, the unnamed hacker was Italian, specialized in exploiting systems like iOS, BlackBerry, and Firefox, and allegedly sold exploits and tools to multiple governments and groups — including unnamed Western allies and, contentiously, Hezbollah — though the informant’s assertions are unverified and do not reflect official FBI findings.
Sources
https://techcrunch.com/2026/01/30/informant-told-fbi-that-jeffrey-epstein-had-a-personal-hacker/
https://securityaffairs.com/187515/laws-and-regulations/doj-release-details-alleged-talented-hacker-working-for-jeffrey-epstein.html
https://meidha.net/eng/bukvy/fbi-documents-reveal-jeffrey-epsteins-personal-hacker-and-cyber-exploits/amp/
Key Takeaways
- A Justice Department document released in early 2026 includes an allegation from a confidential informant that Jeffrey Epstein employed an expert hacker to find software vulnerabilities and build cyber tools.
- The informant described the hacker as Italian and claimed he sold zero-day exploits to Western governments and even groups like Hezbollah, though these claims are unverified and based only on the informant’s statements, not official FBI confirmation.
- Details about the hacker, including his name, are redacted, and there has been no public confirmation from the DOJ or FBI validating the informant’s account.
In-Depth
In early 2026 the U.S. Department of Justice released a large tranche of files related to the long-running Jeffrey Epstein investigation, including some documents that contained unusual and uncorroborated claims. Among those materials is a 2017 communication from a confidential informant asserting that Epstein maintained a personal hacker, a claim that has drawn attention beyond traditional discussions about Epstein’s criminal network. According to the informant, this hacker was exceptionally proficient at identifying and exploiting zero-day vulnerabilities — flaws in widely used software that are unknown to the vendor and unpatched. The hacker was said to specialize in platforms such as Apple’s iOS, BlackBerry operating systems, and the Firefox browser, creating tools that could be used to penetrate devices and networks.
The informant’s description paints the hacker as an Italian-born individual who was deeply embedded in the cyber scene, cultivated connections with seasoned European hackers, and allegedly generated revenue by selling his zero-day discoveries and offensive tools not only to Western governments but also to controversial actors. Notably, the informant claimed that one such exploit was sold to Hezbollah in exchange for what was described as a trunk full of cash — a detail that, if untrue, underscores the need to treat the account with skepticism. The information does not come from an official FBI conclusion but rather the informant’s report to the agency, and crucial identifying details remain redacted, leaving the account unverified and ambiguous.
When approached, neither the FBI nor the DOJ has publicly authenticated the allegations or expanded on the matter. The hacker’s identity remains obscured, though some open-source discussions suggest that details in the document — such as his Italian origin and career trajectory, including selling his company to a major cybersecurity firm and becoming a vice president there — could theoretically narrow the field of likely candidates. For conservatives tracking Epstein-related disclosures, this development offers another layer of complexity to an already convoluted investigation: it broadens the focus from Epstein’s notorious abuses and social network to questions about his potential involvement with cybersecurity expertise and, possibly, international cyber operations.
Critics and observers alike caution that without additional evidence, the informant’s statements should not be taken as factual. Still, the mere presence of such claims in DOJ-held documents fuels ongoing debates about what Epstein’s network entailed and why so much of the file remains heavily redacted. Whether the personal hacker was genuinely acting on Epstein’s behalf or whether the informant was embellishing remains to be seen, but the claim has added a new dimension to public discussions about the breadth and scope of Epstein’s operations beyond the well-documented criminal conduct that led to his conviction and eventual death.

