On Thursday, Amnesty International Posted a new report The detailed attempt to haunt two Serbian journalists was allegedly held with Spyware of the NSO Group Pegasus.
The two journalists, who are working on the Balkan Balkan Balkan Report Network (BIRN), received suspected text messages, including a link-a basic e-fishing attack, according to the non-profit organization. In one case, Amnesty said that her researchers were able to click on the link in a safe environment and to see that it led to a domain that had previously been recognized by the NSO Group infrastructure.
“Amnesty International has spent years of monitoring the NSO Pegasus Spyware Group and how it has been used to target activists and journalists,” Donncha ó Cearbhaill, head of the Amnesty Security Laboratory, told TechCrunch. “This technical research has allowed Amnesty to identify malicious sites used for the delivery of Spyware Pegasus, including this particular Pegasus sector used in this campaign.”
At its point, security researchers such as the Cearbhaill who keep the tabs for NSO activities for years have been so good at identifying signs of the company’s spyware that sometimes all researchers should quickly do to examine a sector involved in an attack.
In other words, the NSO Group and its customers lose their battle to stay in the shadows.
“The NSO has a key problem: they are not as good as hiding as their customers think,” said John Scott-Railton, a Lab Lab researcher, a human rights organization that has expanded Spyware abuse since 2012, told Techcrunch.
There are harsh elements to prove what Cearbhaill and Scott-Rilton believe.
In 2016, the citizen workshop Published the first technical report It always documented an attack with Pegasus, which was against a dissident of the United Arab Emirates. Since then, in less than 10 years, researchers have identified at least 130 people around the world targeted or tired with the NSO Group Spyware, According to a run by Runa Sandvik Security Researcher.
The huge number of victims and goals can in part to be explained by the project PegasusA collective journalistic initiative to investigate the NSO Group’s Spyware abuse based on a leak list of more than 50,000 phone numbers allegedly introduced into an NSO group target system.
But there were also dozens of victims identified by Amnesty, the Citizen Laboratory and now access, another non -profit organization that helps protect civil society from Spyware attacks, which were not based on this list of telephone numbers.
Contact us
Do you have more information about NSO Grop or other Spyware companies? From a device and non-work network, you can contact Lorenzo Franceschi-bicchierai safely on the signal on +1 917 257 1382, or through the telegram and keybase @lorenzofb or email. You can also contact TechCrunch via securedrop.
An NSO team spokesman did not respond to a request for comments, which included questions about the invisible Pegasus or their lack and if the NSO Group customers are concerned about it.
In addition to non -profit organizations, the NSO Group’s spyware continues to be trapped by Apple, which sends alerts to spyware victims around the world, often urging people who have received these notifications to get help from access now, amnesty and citizen workshop. These discoveries have led to more technical reports that document the Spyware attacks with Pegasus, as well as the Spyware manufactured by other companies.
Perhaps the problem of the NSO group is based on the fact that it sells in countries that use its spyware inquisitively, including journalists and other members of civil society.
“The OPE’s mistake by the NSO Group here continues to sell to countries that are going to continue to target journalists and end up exposing themselves,” Cearbhaill said, using the technical term for business security.