Pegasus Affair
RECKLESS EXPLOITMexican Journalists, Lawyers, and a Child Targeted with NSO Spyware https://tspace.library.utoronto.ca/bitstream/1807/96731/1/Report%2393--recklessexploit.pdf
Key Findings
Over 76 messages with links to NSO Group’s exploit framework were sent to Mexican journalists, lawyers, and a minor child (NSO Group is a self-described “cyber warfare” company that sells government-exclusive spyware).›
The targets were working on a range of issues that include investigations of corruption by the Mexican President, and the participation of Mexico’s Federal authorities in human rights abuses.›
Some of the messages impersonated the Embassy of the United States of America to Mexico, others masqueraded as emergency AMBER Alerts about abducted children.›
At least one target, the minor child of a target, was sent infection attempts, including a communication impersonating the United States Government, while physically located in the United Stat
The Million Dollar Dissident NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
Group5 Syria and the Iranian Connection https://citizenlab.ca/2016/08/group5-syria/
By John Scott-Railton, Bahr Abdul Razzak, Adam Hulcoop, Matt Brooks, and Katie Kleemola
Amazon Shuts Down NSO Group Infrastructure https://www.vice.com/en/article/xgx5bw/amazon-aws-shuts-down-nso-group-infrastructure Amazon Web Services (AWS) has shut down infrastructure and accounts linked to Israeli surveillance vendor NSO Group, Amazon said in a statement.
The move comes as a group of media outlets and activist organizations published new research into NSO's malware and phone numbers potentially selected for targeting by NSO's government clients.
As part of that research, Amnesty wrote that a phone infected with NSO's Pegasus malware sent information "to a service fronted by Amazon CloudFront, suggesting NSO Group has switched to using AWS services in recent months." The Amnesty report included part of the same statement from Amazon, showing Amnesty contacted the company before publication.
Hooking Candiru Another Mercenary Spyware Vendor Comes into Focus https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/ By Bill Marczak, John Scott-Railton, Kristin Berdan, Bahr Abdul Razzak, and Ron Deibert July 15, 2021
The company known as “Candiru,” based in Tel Aviv, Israel, is a mercenary spyware firm that markets “untraceable” spyware to government customers. Their product offering includes solutions for spying on computers, mobile devices, and cloud accounts. Like many of its peers, Candiru appears to license its spyware by number of concurrent infections, which reflects the number of targets that can be under active surveillance at any one instant in time. Like NSO Group, Candiru also appears to restrict the customer to a set of approved countries.
Candiru’s apparent widespread presence, and the use of its surveillance technology against global civil society, is a potent reminder that the mercenary spyware industry contains many players and is prone to widespread abuse. This case demonstrates, yet again, that in the absence of any international safeguards or strong government export controls, spyware vendors will sell to government clients who will routinely abuse their services. Many governments that are eager to acquire sophisticated surveillance technologies lack robust safeguards over their domestic and foreign security agencies. Many are characterized by poor human rights track records. It is not surprising that, in the absence of strong legal restraints, these types of government clients will misuse spyware services to track journalists, political opposition, human rights defenders, and other members of global civil society.
Mysterious Israeli Spyware Vendor’s Windows Zero-Days Caught in the Wild https://www.vice.com/en/article/bvz5yv/israeli-spyware-vendor-candiru-zero-day-exploits-microsoft-citizen-lab The company said it detected hacking attempts on more than 100 victims including "politicians, human rights activists, journalists, academics, embassy workers, and political dissidents" in Palestine, Israel, Iran, Lebanon, Spain, UK, and other countries. Citizen Lab said it was able to identify and reach out to a victim who let its researchers analyze their computer and extract the malware.
Is the Modi government behind phone tapping? Pegasus I Modi Govt. I Phone tapping https://www.youtube.com/watch?v=F2qBHJ2JLZM
पत्रकारों और सामाजिक कार्यकर्ताओं की फोन टैपिंग क्या मोदी सरकार करवा रही थी? अगर हाँ तो किसलिए? वरिष्ठ पत्रकार प्रोनंजय गुहाठाकुरता के साथ मुकेश कुमार की बातचीत
Paranjoy Guha Thakurta: https://youtu.be/F2qBHJ2JLZM?t=228 phone tapping was normal. But Any phone tapping by law requires Home Secretary's prior permission. Relates his experiecne with the submitting his phone mar 2018 for at least three months.. when I was doing a story Dhirubhai Ambani's earlier assets in his village.. then we wrote about it in Newsclick, ( who incidently faces an ED probe.. )
Who is behind the phone tapping of powerful people of India? । PHONE TAPPING । PEGASUS https://www.youtube.com/watch?v=6EHLqAjVCBk Jul 18, 2021
क्या भारत के मंत्रियों, सुप्रीम कोर्ट के जजों, संघ के नेताओं और पत्रकारों की फोन टैपिंग हुई? अगर हुई तो किसके आदेश पर? मुकेश कुमार के साथ चर्चा में हिस्सा ले रहे हैं- अशोक वानखेड़े, शिवकांत, शीतल पी सिंह, आलोक जोशी और विजय त्रिवेदी
Were the phones of India's ministers, Supreme Court judges, union leaders and journalists being tapped? If so, on whose orders? Taking part in the discussion with Mukesh Kumar - Ashok Wankhede, Shivkant, Sheetal P Singh, Alok Joshi and Vijay Trivedi
Modi Government Can Listen To Bedroom Conversations, Says Congress https://www.youtube.com/watch?v=pNaIBzLsaX4 Jul 19, 2021
Randeep Surjewala in Congress press conferene says that the snooped include Hindu newspaper, Indina Express,HT, The wire, Mint, TV 18 inida, India today, EPW, Pioneer, News Click, Tribune, Outlook, DNA, among others.
BAnner/caption card say.. ; Rahul Gandhi targeted in Pegasus "hack:: Pralad Patel, Union Minister in Pegasus List., ex EC, Ashok Lavasa, Prashant Kishor,