![]() |
PEGASUS Spyware Surfacing on Cellular Devices - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: General (https://sinister.ly/Forum-General) +--- Forum: World News (https://sinister.ly/Forum-World-News) +--- Thread: PEGASUS Spyware Surfacing on Cellular Devices (/Thread-PEGASUS-Spyware-Surfacing-on-Cellular-Devices) |
PEGASUS Spyware Surfacing on Cellular Devices - ConcernedCitizen - 07-20-2021 What is Pegasus? Revealed: leak uncovers global abuse of cyber-surveillance weapon NSO Group points finger at state clients in WhatsApp spying case WhatsApp: Israeli firm 'deeply involved' in hacking our users Who does it target? That we know of, so far? Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. What is in the recent data leak? Quote:The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organization, and Amnesty International initially had access to the list and shared access with 16 media organizations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses. What does the leak indicate? Quote:The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillance. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillance tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technically impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds. What did forensic analysis reveal? Quote:Amnesty examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration. For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages. Which NSO clients were selecting numbers? Quote:While the data is organized into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO. Quote:Roula Khalaf, who became the first female editor in the newspaper’s history last year, was selected as a potential target throughout 2018. Can you imagine a leak surfacing, with your data involved, and realizing upon request to examine the device you own and use - presumably EVERY SINGLE DAY - that you were being potentially focused on by state actors and government surveillance operators (SIGINT, COMINT, NOFORN interests, etc.)?? The ramifications of this are astounding and obvious, and it affects Android and iPhone devices alike. The response from NSO and governments everything but admits guilt. RE: PEGASUS Spyware Surfacing on Cellular Devices - Lemiz_007 - 07-17-2024 i think that moroccan gov were not involved in the pegasus story RE: PEGASUS Spyware Surfacing on Cellular Devices - WhatTrue - 07-29-2024 Probablly the most scary RAT RE: PEGASUS Spyware Surfacing on Cellular Devices - xbcof34ff@mozmail.com - 08-11-2024 those zionists need to be stopped! |