TechCrunch News 03月29日
Again and again, NSO Group’s customers keep getting their spyware operations caught
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

国际特赦组织发布报告,揭示了针对两名塞尔维亚记者的间谍软件攻击事件,矛头指向NSO Group的Pegasus。该组织长期追踪Pegasus,发现其被用于攻击记者和活动人士。尽管NSO Group试图保持隐蔽,但安全研究人员的技术进步使其难以遁形。自2016年以来,研究人员已识别出至少130人遭到Pegasus攻击。Pegasus Project的泄密事件和非营利组织的独立调查都揭露了更多受害者。苹果公司也发现了NSO Group的间谍软件,并向受害者发送了通知。NSO Group的问题在于,其客户滥用间谍软件,导致其行为暴露。

📲 国际特赦组织报告指出,两名塞尔维亚记者遭到疑似使用NSO Group的Pegasus间谍软件的黑客攻击,攻击方式包括钓鱼链接。

🔍 安全研究人员能够通过分析攻击中涉及的域名,识别出与NSO Group基础设施相关的恶意网站,表明NSO Group的隐身行动面临挑战。

🌍 自2016年以来,研究人员已确认全球范围内至少有130人成为NSO Group间谍软件的攻击目标,这部分归因于Pegasus Project的泄密事件。

🍎 苹果公司向受害者发送了关于间谍软件攻击的通知,促使受害者寻求非营利组织的帮助,进一步揭露了NSO Group的活动。

🚨 NSO Group的问题在于其客户滥用间谍软件,持续针对记者和其他社会成员,导致其行为被曝光,违反了操作安全原则。

On Thursday, Amnesty International published a new report detailing attempted hacks against two Serbian journalists, allegedly carried out with NSO Group’s spyware Pegasus. 

The two journalists, who work for the Serbia-based Balkan Investigative Reporting Network (BIRN), received suspicious text messages including a link — basically a phishing attack, according to the nonprofit. In one case, Amnesty said its researchers were able to click on the link in a safe environment and see that it led to a domain that they had previously identified as belonging to NSO Group’s infrastructure. 

“Amnesty International has spent years tracking NSO Group Pegasus spyware and how it has been used to target activists and journalists,” Donncha Ó Cearbhaill, the head of Amnesty’s Security Lab, told TechCrunch. “This technical research has allowed Amnesty to identify malicious websites used to deliver the Pegasus spyware, including the specific Pegasus domain used in this campaign.”

To his point, security researchers like Ó Cearbhaill who have been keeping tabs on NSO’s activities for years are now so good at spotting signs of the company’s spyware that sometimes all researchers have to do is quickly look at a domain involved in an attack. 

In other words, NSO Group and its customers are losing their battle to stay in the shadows.

“NSO has a basic problem: they are not as good at hiding as their customers think,” John Scott-Railton, a senior researcher at The Citizen Lab, a human rights organization that has investigated spyware abuses since 2012, told TechCrunch. 

There is hard evidence proving what Ó Cearbhaill and Scott-Railton believe. 

In 2016, Citizen Lab published the first technical report ever documenting an attack carried out with Pegasus, which was against a United Arab Emirates dissident. Since then, in less than 10 years, researchers have identified at least 130 people all over the world targeted or hacked with NSO Group’s spyware, according to a running tally by security researcher Runa Sandvik

The sheer number of victims and targets can in part be explained by the Pegasus Project, a collective journalistic initiative to investigate abuse of NSO Group’s spyware that was based on a leaked list of more than 50,000 phone numbers that was allegedly entered in an NSO Group targeting system. 

But there have also been dozens of victims identified by Amnesty, Citizen Lab, and Access Now, another nonprofit that helps protect civil society from spyware attacks, which did not rely on that leaked list of phone numbers. 

Do you have more information about NSO Grop, or other spyware companies? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

An NSO Group spokesperson did not respond to a request for comment, which included questions about Pegasus invisibility, or lack thereof, and whether NSO Group’s customers are concerned about it. 

Apart from nonprofits, NSO Group’s spyware keeps getting caught by Apple, which has been sending notifications to victims of spyware all over the world, often prompting the people who received those notifications to get help from Access Now, Amnesty, and Citizen Lab. These discoveries led to more technical reports documenting spyware attacks carried out with Pegasus, as well as spyware made by other companies.

Perhaps NSO Group’s problem rests in the fact that it sells to countries that use its spyware indiscriminately, including reporters and other members of civil society. 
“The OPSEC mistake that NSO Group is making here is continuing to sell to countries that are going to keep targeting journalists and end up exposing themselves,” Ó Cearbhaill, using the technical term for operational security.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

NSO Group Pegasus 间谍软件 黑客攻击 记者
相关文章