Thursday, Amnesty International Publish a new report Details of an attempt to penetrate against two Serbian journalists, alleged it NSO collectionPEGASUS spyware.
The two journalists, who are working in the Birn-based BirN, received suspicious text messages including the link-mainly the hunting attack, according to non-profit organizations. In one case, Amnesty said that the researchers managed to click on the link in a safe environment and believe that it led to a field that was previously identified as belonging to the NSO infrastructure.
“Amnesty International has spent years tracking the NSO Group Pegasus Spyware and how it was used to target activists and journalists,” Donncha ó Cearbhaill, head of Aman Amnesty Laboratory, told Techcrunch. “This technical research allowed the amnesty organization to determine the harmful web sites used to provide Pegasus Spyware programs, including the specific Pegasus field used in this campaign.”
To his point of view, security researchers such as ó Cearbhaill who were keeping tabs on NSO activities for years now are very good in discovering the company’s signs Spy programs Sometimes, all researchers should do this quickly to a field involved in the attack.
In other words, NSO Group and its customers lose their battle to stay in the shade.
“NSO has an essential problem: it is not good in hiding as their customers think,” said John Scott Rilton, the first researcher at the Citizen Lab, a human rights organization that has been achieved in the violations of spyware since 2012.
There is difficult evidence to prove what CEARBHALL and Square Reilton believe.
In 2016, Citizen Laboratory Publish the first technical report Documenting an attack carried out with Begasos, who was against the dissident of the United Arab Emirates. Since then, in less than 10 years, the researchers have identified at least 130 people all over the world targeting or hacked using NSO spyware, According to the proceeds of running By the security researcher Rona Sandfik.
The huge number of victims and goals can be explained in part Pegasus projectA group press initiative to investigate the abuse of the NSO spyware, which was based on a leak list of more than 50,000 phones that were entered into the NSO group targeting system.
But there were also dozens of victims identified by Amnesty International and the citizens’ laboratory and arrival now, which is other than the profitable help to protect civil society from spyware attacks, which did not rely on the list of leaked phone numbers.
Contact us
Do you have more information about NSO GROP, or other spyware companies? From a non-work device and network, you can connect to Lorenzo Franceschi-bicchierai safe Email. You can also call the techcrunch via Securedrop.
A NSO spokesperson has not answered the suspension request, which included questions about the invisible PEGASUS, or its absence, and whether NSO Group customers are concerned about it.
Regardless of non -profit organizations, NSO GROP spyware continues to be arrested by Apple, which was send Notifications For victims of spyware around the world, and often pays people who have received these notifications To get the help of arrival nowPardon, and the citizen laboratory. These discoveries led to more technical reports that document the spyware attacks that were carried out with PEGASUS, as well as spyware made by other companies.
The NSO Group problem may be on the fact that it sells to countries that use spyware randomly, including reporters and other members of civil society.
“The OPSEC error by NSO Group here continues to sell to countries that will continue to target journalists and end up exposing themselves.” Operating security.
https://techcrunch.com/wp-content/uploads/2025/03/nso-group-office-logo.jpg?resize=1200,800
Source link