NextFin News - In a significant expansion of the ongoing investigation into the late financier Jeffrey Epstein, newly released Department of Justice (DOJ) documents have revealed that the Federal Bureau of Investigation (FBI) was informed as early as 2017 that Epstein employed a "personal hacker." According to TechCrunch, the disclosure came on Friday, January 30, 2026, as part of a court-mandated release of approximately 3.5 million pages of investigative materials. The informant described a highly skilled operative who specialized in identifying and exploiting critical vulnerabilities in mobile operating systems and web browsers, effectively providing Epstein with a private intelligence apparatus that operated outside the purview of traditional law enforcement.
The informant’s report, which was filed years before Epstein’s 2019 arrest and subsequent death, identifies the hacker as an Italian national from the Calabria region. This individual was reportedly an expert in "zero-day" exploits—software vulnerabilities unknown to the developers—specifically targeting Apple’s iOS, BlackBerry devices, and the Firefox browser. The hacker did not merely serve Epstein’s personal interests; the documents suggest he operated a lucrative side business selling these malicious tools to a diverse array of clients, including the United Kingdom, the United States, an unnamed Central African government, and even the militant group Hezbollah, which allegedly paid for the exploits with "a trunk of cash."
The timing of this revelation is particularly poignant as U.S. President Trump’s administration continues to navigate the complex legal and political fallout of the Epstein case. While the FBI has declined to comment on the veracity of the informant’s claims, the sheer volume of the data dump—which includes over 2,000 videos and 180,000 images—suggests that the digital dimension of Epstein’s operations was far more sophisticated than previously understood. The existence of a personal hacker suggests that Epstein’s leverage over high-profile figures may have been reinforced by unauthorized access to their private communications, a tactic that aligns with the broader patterns of blackmail and coercion long associated with his network.
From a cybersecurity perspective, the involvement of a specialist in zero-day exploits elevates the Epstein case from a domestic criminal matter to a national security concern. Zero-day vulnerabilities are the most prized assets in the cyber-arms market, often fetching millions of dollars from state actors. If Epstein indeed had a direct line to such technology, it would explain his ability to maintain a global network of influence despite his 2008 conviction. The fact that this hacker was allegedly selling tools to both Western intelligence agencies and designated terrorist organizations like Hezbollah highlights the lawless nature of the private surveillance industry during the mid-2010s.
The technical focus on BlackBerry and iOS vulnerabilities is also telling. During the period mentioned by the informant, BlackBerry was still the standard for secure government and corporate communication, while iOS was rapidly becoming the dominant platform for the global elite. By controlling exploits for these systems, Epstein’s operative could have theoretically bypassed the encryption that world leaders and business titans relied upon. This creates a disturbing possibility: that the "kompromat" Epstein allegedly collected was not just physical, but digital, harvested through remote intrusions rather than just hidden cameras in his various residences.
Furthermore, the mention of the hacker selling exploits to the U.S. and U.K. governments suggests a complex web of "gray market" transactions. According to the informant, this individual was "very good at finding vulnerabilities," a skill set that often leads hackers into the world of private intelligence firms like NSO Group or Hacking Team. If Epstein was acting as a middleman or a patron for such an individual, he was essentially running a boutique intelligence agency. This adds a layer of complexity to the "intelligence asset" theory that has long surrounded Epstein, suggesting that his value to various states may have been his access to cutting-edge cyber-offensive capabilities.
Looking forward, the release of these documents is likely to trigger a new wave of digital forensics. As the DOJ continues to process the 3.5 million pages, investigators will be looking for links between this Italian hacker and specific data breaches or surveillance operations that occurred between 2010 and 2017. The impact on the cybersecurity industry could be significant, as it may force a re-evaluation of how zero-day exploits are tracked and regulated. If a private citizen like Epstein could harbor such talent, the barrier to entry for high-level cyber-espionage is lower than previously assumed by state actors.
Ultimately, the revelation of a "personal hacker" transforms the narrative of the Epstein case from one of social predation to one of technological warfare. It suggests that the true extent of Epstein’s power lay in his ability to weaponize information in the digital age. As U.S. President Trump’s DOJ moves forward with these disclosures, the focus will inevitably shift toward identifying the Italian operative and determining exactly whose devices were compromised. The intersection of sexual blackmail and high-end hacking represents a new frontier in organized crime, one where the traditional tools of the private investigator have been replaced by the invisible, borderless reach of the zero-day exploit.
Explore more exclusive insights at nextfin.ai.

