NSO Group's Spyware Operations: A Continuous Cycle of Exposure and Controversy

NSO Group’s Spyware Operations: A Continuous Cycle of Exposure and Controversy

On Thursday, Amnesty International released a comprehensive report highlighting attempted cyberattacks against two journalists from the Balkan Investigative Reporting Network (BIRN) in Serbia. These attacks were allegedly executed using NSO Group’s Pegasus spyware, raising significant concerns around digital security and privacy for journalists and activists worldwide.

Details of the Cyberattacks

The two journalists received suspicious text messages containing links, which were identified as phishing attempts. According to Amnesty International, their researchers safely clicked on one of these links, revealing that it directed to a domain previously linked to NSO Group’s infrastructure.

Insights from Amnesty International

Donncha Ó Cearbhaill, the head of Amnesty’s Security Lab, emphasized the organization’s extensive monitoring of NSO Group’s spyware usage against activists and journalists. He stated, “This technical research has allowed Amnesty to identify malicious websites used to deliver the Pegasus spyware, including the specific Pegasus domain used in this campaign.”

Expert Opinions on NSO Group’s Invisibility

Security researchers, including Ó Cearbhaill, have become adept at recognizing NSO’s spyware indicators. John Scott-Railton, a senior researcher at The Citizen Lab, noted that NSO Group struggles to maintain operational security, stating, “NSO has a basic problem: they are not as good at hiding as their customers think.”

The Impact of Pegasus Spyware

Evidence supports the claims made by Ó Cearbhaill and Scott-Railton. In 2016, Citizen Lab published the first technical report on a Pegasus attack against a dissident in the United Arab Emirates. Since then, researchers have documented at least 130 individuals globally who have been targeted or hacked using NSO Group’s spyware, according to ongoing research by security expert Runa Sandvik.

READ ALSO  Paragon Ends Contract with Italian Government Amid Spyware Controversy: Latest Media Insights

The Pegasus Project

The extensive number of victims can partly be attributed to the Pegasus Project, a collaborative journalistic effort investigating NSO Group’s spyware abuses based on a leaked list of over 50,000 phone numbers allegedly targeted by the company. Numerous victims have also been identified by organizations such as Amnesty, Citizen Lab, and Access Now, which independently verified cases beyond the leaked data.

Response from NSO Group

Despite multiple inquiries, an NSO Group spokesperson did not respond to requests for comments regarding the visibility of Pegasus spyware or potential concerns from their clients. Additionally, Apple has been actively notifying victims of spyware attacks, prompting them to seek assistance from organizations like Access Now, Amnesty, and Citizen Lab.

The Operational Security Dilemma

Ó Cearbhaill pointed out a critical operational security mistake made by NSO Group: “The OPSEC mistake that NSO Group is making here is continuing to sell to countries that are going to keep targeting journalists and end up exposing themselves.” This trend raises serious ethical considerations regarding the sale of surveillance technology to countries known for human rights abuses.

For those seeking more information about NSO Group or other spyware companies, please reach out to Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *