Thursday, Amnesty International Published a new report Details of hackers allegedly tried against two Serbian journalists NSO GroupSpyware pegs.
According to the non-profit, two journalists, who work for the Balkan Investigative Reporting Network (BIRN) based in Serbia, received suspicious text messages, including a link-a fishing attack, according to non-profit. In one case, Amnesty said its researchers were able to click the link in a safe environment and could see that it created a domain that led to the first NSO group infrastructure.
“Amnesty International has spent years in tracking about how to track workers and journalists how to track workers and journalists. “This technical research has allowed Amnesty to identify malicious websites used to supply pegs spyware, including the specific pegs domain used in the campaign.”
That is, security researchers such as Sierra Bhel, who have been tabs on NSO activities for years, are now so good in searching for company indicators. Spyware Sometimes all researchers have to do the domain involved in an attack quickly.
In other words, the NSO group and its users are losing their battle to stay in the shadow.
“The NSO has a fundamental issue: they are not so good at hiding their customers,”, a senior human rights organization, a senior researcher at the civilian lab, John Scott-Relton, who has been investigating spyware excesses since 2012, told Tech Crunch.
There is severe evidence that to prove what Sierra Bhel and Scott Relton believe.
In 2016, the Citizen Lab Published the first technical report Sometimes documenting the attack with Pegasis, which was against the United Arab Emirates. Since then, in less than 10 years, researchers have identified at least 130 people around the world who target or hack the NSO group spyware, According to the walking telecommunications By a security researcher Rally sandwick.
The sheer number of victims and goals can be partially described Pegasis ProjectA collective journalistic move to investigate abuse with NSO group spyware, based on a leak list of more than 50,000 phone numbers, was allegedly admitted to the NSO group targeting system.
But Amnesty, Citizens Lab, and Axis Nou have also identified dozens of victims, which is another non -profit that helps protect civil society from spyware attacks, which does not rely on this leak list of phone numbers.
Contact us
Do you have more information about NSO Grip, or other spyware companies? From non-work device and network, you can safely contact Lorenzo Francischi-Bacacheri on a signal at +1 917 257 1382, or by Telegram and Cabes @Lorens OFB, or E -mail. You can also contact Tech Crunch Secredrop.
A spokeswoman for the NSO group did not respond to the comments request, which included questions about Pagasis hidden, or lacking, and whether the NSO group users are worried about it.
In addition to non -profit organizations, the NSO group spyware is caught by Apple, which has been Send Notifications Spyware victims around the world often indicate people who receive these notifications Now to get help from accessGeneral apology, and urban lab. As a result of these discoveries, there were more technical reports of spyware, as well as spyware attacks, as well as spyware documenting spyware developed by other companies.
Perhaps the problem of the NSO group is based on the fact that it sells to countries that indiscriminately use its spyware, including reporters and other members of the civil society.
“The OPSEC mistake that the NSO group is making here continues to sell to countries that continue to target journalists and expose themselves.” Operational Security.