Login Register






The issue regarding searched threads returning 404s has been fixed. My apologies. - NekoElf
Thread Rating:
  • 0 Vote(s) - 0 Average


PEGASUS Spyware Surfacing on Cellular Devices filter_list
Author
Message
PEGASUS Spyware Surfacing on Cellular Devices #1
What is Pegasus?



Revealed: leak uncovers global abuse of cyber-surveillance weapon

NSO Group points finger at state clients in WhatsApp spying case

WhatsApp: Israeli firm 'deeply involved' in hacking our users

Who does it target? That we know of, so far?

Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.

What is in the recent data leak?

Quote:The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organization, and Amnesty International initially had access to the list and shared access with 16 media organizations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses.

What does the leak indicate?

Quote:The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillance. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillance tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technically impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds.

What did forensic analysis reveal?

Quote:Amnesty examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration. For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared “backup copies” of four iPhones with Citizen Lab, a research group at the University of Toronto that specializes in studying Pegasus, which confirmed that they showed signs of Pegasus infection. Citizen Lab also conducted a peer review of Amnesty’s forensic methods, and found them to be sound.

Which NSO clients were selecting numbers?

Quote:While the data is organized into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO.

Quote:Roula Khalaf, who became the first female editor in the newspaper’s history last year, was selected as a potential target throughout 2018.

Other journalists who were selected as possible candidates for surveillance by NSO’s clients work for some of the world’s most prestigious media organizations. They include the Wall Street Journal, CNN, the New York Times, Al Jazeera, France 24, Radio Free Europe, Mediapart, El País, Associated Press, Le Monde, Bloomberg, Agence France-Presse, the Economist, Reuters and Voice of America.

It is not possible to know conclusively whether phones were successfully infected with Pegasus without analysis of devices by forensic experts. Amnesty International’s Security Lab, which can detect successful Pegasus infections, found traces of the spyware on the mobile phones of 15 journalists who had agreed to have their phones examined after discovering their number was in the leaked data.

Can you imagine a leak surfacing, with your data involved, and realizing upon request to examine the device you own and use - presumably EVERY SINGLE DAY - that you were being potentially focused on by state actors and government surveillance operators (SIGINT, COMINT, NOFORN interests, etc.)?? The ramifications of this are astounding and obvious, and it affects Android and iPhone devices alike.

The response from NSO and governments everything but admits guilt.
ed25519/0x21AB6B6A6CB2C337
C87D87466FD205945CF10A3821AB6B6A6CB2C337

Reply

RE: PEGASUS Spyware Surfacing on Cellular Devices #2
i think that moroccan gov were not involved in the pegasus story

Reply

RE: PEGASUS Spyware Surfacing on Cellular Devices #3
Probablly the most scary RAT

Reply

RE: PEGASUS Spyware Surfacing on Cellular Devices #4
those zionists need to be stopped!

Reply







Users browsing this thread: 4 Guest(s)