Posts Tagged ‘spyware’

No end to NSO’s Pegasus trouble

April 5, 2022

TechCrunch of 5 April 2022 reports that Investigators say they have found evidence that a Jordanian journalist and human rights defender’s iPhone was hacked with the Pegasus spyware just weeks after Apple sued the spyware’s maker NSO Group to stop it from targeting Apple’s customers.

Award-winning journalist Suhair Jaradat’s phone was hacked with the notorious spyware as recently as December 5, 2021, according to an analysis of her phone by Front Line Defenders and Citizen Lab that was shared with TechCrunch ahead of its publication. Jaradat was sent a WhatsApp message from someone impersonating a popular anti-government critic with links to the Pegasus spyware, compromising her phone. According to the forensic analysis, Jaradat’s iPhone was hacked several times in the preceding months and as far back as February 2021.

Apple had filed a lawsuit against Israeli spyware maker NSO Group in November 2021, seeking a court-issued injunction aimed at banning NSO from using Apple’s products and services to develop and deploy hacks against its customers. See also: https://humanrightsdefenders.blog/2021/07/21/nsos-pegasus-spyware-now-really-in-the-firing-line/…But so far the case has gotten off to a slow start after the first judge assigned to the case recused herself, with no decision on the case likely to be made any time before June.

Jaradat is one of several Jordanians, including human rights defenders, lawyers and fellow journalists whose phones were compromised likely by agencies of the Jordanian government, according to Front Line Defenders and Citizen Lab’s findings out Tuesday.

Among the others targeted include Malik Abu Orabi, a human rights lawyer whose work has included defending the teachers’ union, which in 2019 led the longest public sector strike in the country’s history. Abu Orabi’s phone was targeted as early as August 2019 until June 2021. Also, the phone of Ahmed Al-Neimat, a human rights defender and anti-corruption activist, was targeted by the ForcedEntry exploit in February 2021. The researchers said the hacking of Al-Neimat’s phone is believed to be the earliest suspected use of ForcedEntry.

Another Jordanian journalist and human rights defender’s phone was targeted, according to the researchers, but who asked for her identity not to be disclosed.

Meanwhile, on 5 April 2022, AFP reported that Palestinian lawyer Salah Hamouri, who is in Israeli detention, filed a complaint in France Tuesday against surveillance firm NSO Group for having “illegally infiltrated” his mobile phone with the spyware Pegasus.

Hamouri, who also holds French citizenship, is serving a four-month term of administrative detention ordered by an Israeli military court in March on the claim he is a “threat to security”.

He is one of several Palestinian activists whose phones were hacked using the Pegasus malware made by the Israeli company NSO, according to a report in November by human rights groups. See: https://humanrightsdefenders.blog/2021/11/10/palestinian-ngos-dubbed-terrorist-were-hacked-with-pegasus-spyware/

On Tuesday, the International Federation for Human Rights (FIDH), the Human Rights League (LDH) and Hamouri filed a complaint with the Paris prosecutor.  It accused NSO of “having illegally infiltrated the telephone of rights defender Salah Hamouri,” they said in a statement sent to the AFP bureau in Jerusalem. 

Obviously, this is an operation that is part of a largely political framework given the harassment Hamouri has been subjected to for years and the attacks on human rights defenders in Israel,” attorney Patrick Baudouin, honorary president of the FIDH, told AFP.

https://www.securityweek.com/palestinian-lawyer-sues-pegasus-spyware-maker-france

https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/

“Advanced persistent threat” group targeted Indian human rights defenders for decade

February 14, 2022
. (“National Flag of India” by Sanyam Bahga is licensed under CC BY-SA 2.0)

Two years ago it was reported that an Indian “hack-for-hire group” had targeted journalists and human rights defenders [see: https://humanrightsdefenders.blog/2020/06/10/after-nso-now-indian-based-hacking-group-targets-ngos/], but on 11 February 2022 Steve Zurier in SC Magazine reported that researchers discovered an advanced persistent threat group that targeted Indian dissidents and remained undetected for a decade or more, starting with simple phishing lures some 10 years ago and then graduating to providing links to files hosted externally in the cloud for manual download and execution by the victims.

In a blog post, SentinelLabs researchers reported on ModifiedElephant, which has been operating since at least 2012. The researchers said the threat group operates through the use of commercially available remote access trojans and has ties to the commercial surveillance industry.

The threat actor uses spearphishing with malicious documents to deliver malware such as NetWire, DarkComet, and simple keyloggers with infrastructure overlaps that helped the researchers connect the dots to previously unattributed malicious activity.

ModifiedElephant’s activities have been traced to long-standing political tensions in India, which exploded on Jan. 1, 2018, when critics of the government clashed with pro-government supporters near Bhima Koregaon. Later in 2018, raids conducted by police led to several arrests and the seizure of computer systems, which revealed incriminating files that pointed to an alleged plot against Indian Prime Minister Narendra Modi.

Thanks to the public release of digital forensic investigation results by Arsenal Consulting and those detailed in SentinelLabs blog, the researchers allege that ModifiedElephant compromised the computers that were later seized, planting files that were used as evidence to justify the imprisonment of the defendants. Over a decade or more, the group targeted human rights activists, human rights defenders, academics, and lawyers across India with the objective of planting incriminating digital evidence — and they are still operating today.

The case has become part of a larger trend of private and commercial company’s copying government and nation-state methodologies, persistently looking to penetrate into politically involved individuals, said Gadi Naveh, cyber data scientist at Canonic. Naveh said although most of the tools described aren’t top grade, continuous fueling of the attack eventually gets the target and larger funding gets even better tools, as was implied by Amnesty International.

“We assume these tools and methods that move from nation-states to commercial organizations will keep answering the demand and available funds for getting data,” Naveh said. “The move of data to the cloud makes the top-tier actor act there, but as with RATs and keyloggers, we are seeing the same military-grade tools moving after the new data sources in the cloud.”

Daniel Almendros, cyber threat intelligence analyst at Digital Shadows, added that he and his team view ModifiedElephant as a fascinating, albeit dangerous actor. Almendros said ModifiedElephant has a wide range of tools in its arsenal that it uses to target a large number of victims. They use a blend of off-the- shelf tools (NetWire and DarkComet  RATs), paired with spearphishing emails related to the sensitive 2018 Bhima Koregaon affair.

“The phishing lures have improved in subtlety as well as boldness, they have shifted from fake double extension file names to commonly used Office filenames,” Almendros said. “In one instance, an assassination attempt story was added to provoke the user to click on the phishing lure. These emails were distributed to many different users. The group likely has a connection with Indian state espionage. Because most APT attention stems from China and Russia-based threats, ModifiedElephant was initially overlooked for years. In addition, the group’s specific targeting and use of commodity malware helped the group evade detection for a prolonged period.”

https://www.scmagazine.com/news/cloud/modifiedelephant-an-indian-apt-group-targeting-dissidents-operated-undetected-for-nearly-10-years

https://indianexpress.com/article/explained/explained-what-we-know-of-hacking-group-modifiedelephant-7770228/

It is not just NSO – Loujain Al-Hathloul sues Spyware Maker DarkMatter

December 17, 2021
Laptop with broken screen

As announced on 9 December 2021, the Electronic Frontier Foundation (EFF) has filed a lawsuit to on behalf of Saudi human rights defender Loujain Al Hathloul against spying software maker DarkMatter and three of its former executives for illegally hacking her iPhone to secretly track her communications and whereabouts.

AlHathloul is among the victims of an illegal spying program created and run by former U.S. intelligence operatives, including the three defendants named in the lawsuit, who worked for a U.S. company hired by United Arab Emirates (UAE) in the wake of the Arab Spring protests to identify and monitor activists, journalists, rival foreign leaders, and perceived political enemies.

Reuters broke the news about the hacking program called Project Raven in 2019, reporting that when UAE transferred the surveillance work to Emirati firm DarkMatter, the U.S. operatives, who learned spycraft working for the National Security Agency and other U.S. intelligence agencies, went along and ran DarkMatter’s hacking program, which targeted human rights activists like AlHathloul, political dissenters, and even Americans residing in the U.S.

DarkMatter executives Marc Baier, Ryan Adams, and Daniel Gericke, working for their client UAE—which was acting on behalf of the Kingdom of Saudi Arabia (KSA)—oversaw the hacking project, which exploited a vulnerability in the iMessage app to locate and monitor targets. Baier, Adams, Gericke, all former members of U.S. intelligence or military agencies, designed and operated the UAE cybersurveillance program, also known as Project DREAD (Development Research Exploitation and Analysis Department), using malicious code purchased from a U.S. company.

Baier, who resides in UAE, Adams, a resident of Oregon, and Gericke, who lives in Singapore, admitted in September to violating the Computer Fraud and Abuse Act (CFAA) and prohibitions on selling sensitive military technology under a non-prosecution agreement with the U.S. Justice Department.

Companies that peddle their surveillance software and services to oppressive governments must be held accountable for the resulting human rights abuses,” said EFF Civil Liberties Director David Greene. “The harm to Loujain AlHathloul can never be undone. But this lawsuit is a step toward accountability.

AlHathloul is a leader in the movement to advance the rights of women in Saudi Arabia [see also: https://www.trueheroesfilms.org/thedigest/laureates/1a6d84c0-b494-11ea-b00d-9db077762c6c].


DarkMatter intentionally directed the code to Apple servers in the U.S. to reach and place malicious software on AlHathloul’s iPhone, a violation of the CFAA, EFF says in a complaint filed in federal court in Oregon. The phone was initially hacked in 2017, gaining access to her texts, email messages, and real-time location data. Later, AlHathloul was driving on the highway in Abu Dhabi when she was arrested by UAE security services, and forcibly taken by plane to the KSA, where she was imprisoned twice, including at a secret prison where she was subject to electric shocks, flogging, and threats of rape and death.

“Project Raven went beyond even the behavior that we have seen from NSO Group, which has been caught repeatedly having sold software to authoritarian governments who use their tools to spy on journalists, activists, and dissidents,” said EFF Cybersecurity Director Eva Galperin. “Dark Matter didn’t merely provide the tools; they oversaw the surveillance program themselves.

While EFF has long pressed for the need to reform the CFAA, this case represents a straightforward application of the CFAA to the sort of egregious violation of users’ security that everyone agrees the law was intended to address.

“This is a clear-cut case of device hacking, where DarkMatter operatives broke into AlHathloul’s iPhone without her knowledge to insert malware, with horrific consequences,” said Mukund Rathi, EFF attorney and Stanton Fellow. “This kind of crime is what the CFAA was meant to punish.” In addition to CFAA violations, the complaint alleges that Baier, Adams, and Gericke aided and abetted in crimes against humanity because the hacking of AlHathloul’s phone was part of the UAE’s widespread and systematic attack against human rights defenders, activists, and other perceived critics of the UAE and KSA.

The law firms of Foley Hoag LLP and Boise Matthews LLP are co-counsel with EFF in this matter.

EFF also welcomed the Ninth Circuit Court of Appeals’ recent ruling that spyware vendor NSO Group, as a private company, did not have foreign sovereign immunity from WhatsApp’s lawsuit alleging hacking of the app’s users. Courts should similarly deny immunity to DarkMatter and other surveillance and hacking companies who directly harm Internet users around the world.

For the complaint:
https://www.eff.org/document/alhathloul-v-darkmatter

For more on state-sponsored malware:
https://www.eff.org/issues/state-sponsored-malware Contact: Karen Gullo

https://www.eff.org/press/releases/saudi-human-rights-activist-represented-eff-sues-spyware-maker-darkmatter-violating

https://www.eff.org/deeplinks/2021/12/eff-court-deny-foreign-sovereign-immunity-darkmatter-hacking-journalist

NGOs demand EU to impose sanctions on NSO Group

December 7, 2021

Dozens of rights groups are urging the European Union to impose sanctions on the Israeli NSO Group to ban the company’s Pegasus surveillance technology. The letter sent to the EU was signed by 86 rights groups and independent experts, including Reporters Without Borders, Amnesty International, Human Rights Watch, the Electronic Frontier Foundation and Privacy International, among others. A consortium of media revealed that this powerful spyware was used extensively by several governments to spy on lawyers, journalists, political opponents and human rights activists.

Several victims of illegal surveillance have been identified in Hungary, where the government initially denied being a client of NSO Group, before admitting to having purchased the software. See also: https://humanrightsdefenders.blog/2021/11/10/palestinian-ngos-dubbed-terrorist-were-hacked-with-pegasus-spyware/

A good resource is here: https://www.haaretz.com/israel-news/MAGAZINE-nso-pegasus-spyware-file-complete-list-of-individuals-targeted-1.10549510

Several victims of illegal surveillance have been identified in Hungary, where the government initially denied being a client of NSO Group, before admitting to having purchased the software. See also:

There is overwhelming evidence that Pegasus spyware has been repeatedly used by abusive governments to clamp down on peaceful human rights defenders, activists and perceived critics,” Deborah Brown, senior digital rights researcher and advocate at Human Rights Watch, said in a statement. “The EU should immediately sanction NSO Group and ban any use of its technologies.”

The EU’s global human rights sanctions would allow the EU to adopt “ “targeted sanctions against entities deemed responsible for violations or abuses that are “of serious concern as regards the objectives of the common foreign and security policy”, including violations or abuses of freedom of peaceful assembly and of association, or of freedom of opinion and expression,” the letter read.

According to Human Rights Watch, these rights have been “repeatedly violated using NSO technology,” and, as highlighted by the UN Special Rapporteur on freedom of opinion and expression, “the use of spyware by abusive governments can also facilitate extrajudicial, summary or arbitrary executions and killings, or enforced disappearance of persons.” See also: https://humanrightsdefenders.blog/2021/10/04/big-coalition-urges-un-to-denounce-abuses-facilitated-by-spyware-technologies/

NSO Group was blacklisted by the US State Department at the beginning of November, and slapped with a sanction that drastically limited the business relationships the US company had with US customers or suppliers, according to the French newspaper Le Monde. “The EU should unequivocally close its doors to business with NSO Group,” Brown said.

“Targeted sanctions are necessary to that end, and to add to growing international pressure against the company and the out-of-control spyware industry.”

In Europe, several investigations are ongoing, but no sanctions have been formally imposed on the company. In addition to Hungary, several other countries are, or have been, customers of NSO Group – although this does not mean that all these countries have made illegal use of Pegasus.

In addition to Germany, several EU countries have purchased access to the software, according to Le Monde.

See also: https://www.haaretz.com/israel-news/tech-news/.premium.HIGHLIGHT.MAGAZINE-citizen-lab-vs-nso-the-institute-taking-down-israel-s-mercenary-spyware-firms-1.10536773

https://slate.com/technology/2021/12/apple-lawsuit-nso-group-q-cyber-pegasus.html

https://www.euronews.com/next/2021/12/03/pegasus-spyware-ngos-urge-the-eu-to-sanction-israeli-group-nso

And the latest: https://marketresearchtelecast.com/spyware-sale-at-nso-group-the-end-of-pegasus/226205/

as well as

https://www.irishtimes.com/news/ireland/irish-news/concern-activist-s-phone-infected-with-spyware-during-dublin-conference-1.4778962

in 2022 the following items can be added:

https://www.hrw.org/news/2022/01/26/human-rights-watch-among-pegasus-spyware-targets

https://thewire.in/tech/nso-chairman-quits-says-departure-unrelated-to-recent-scandals

US Court says Facebook can pursue lawsuit against NSO Group

November 10, 2021

On 8 November 2021 media (here Reuters) reported that a U.S. appeals court said Facebook can pursue a lawsuit accusing Israel’s NSO Group of exploiting a bug in its WhatsApp messaging app to install malware allowing the surveillance of 1,400 people, including journalists, human rights activists and dissidents. In a 3-0 decision on Monday, the 9th U.S. Circuit Court of Appeals in San Francisco rejected privately owned NSO’s claim it was immune from being sued because it had acted as a foreign government agent. See also: https://humanrightsdefenders.blog/2021/10/04/big-coalition-urges-un-to-denounce-abuses-facilitated-by-spyware-technologies/

Facebook, now known as Meta Platforms Inc, sued NSO for an injunction and damages in October 2019, accusing it of accessing WhatsApp servers without permission six months earlier to install its Pegasus malware on victims’ mobile devices. NSO has argued that Pegasus helps law enforcement and intelligence agencies fight crime and protect national security.

It was appealing a trial judge’s July 2020 refusal to award it “conduct-based immunity,” a common law doctrine protecting foreign officials acting in their official capacity. Upholding that ruling, Circuit Judge Danielle Forrest said it was an “easy case” because NSO’s mere licensing of Pegasus and offering technical support did not shield it from liability under federal law, which took precedence over common law.

Whatever NSO’s government customers do with its technology and services does not render NSO an ‘agency or instrumentality of a foreign state,'” Forrest wrote. “Thus, NSO is not entitled to the protection of foreign sovereign immunity.”

The case will return to U.S. District Judge Phyllis Hamilton in Oakland, California.

Asked for comment on the decision, NSO said in an email that its technology helps defend the public against serious crime and terrorism, and that it “stands undeterred in its mission.”

WhatsApp spokesman Joshua Breckman in an email called the decision “an important step in holding NSO accountable for its attacks against journalists, human rights defenders and government leaders.”

Facebook’s case drew support from Microsoft Corp (MSFT.O), Alphabet Inc’s (GOOGL.O) Google and Cisco Systems Corp (CSCO.O), which in a court filing called surveillance technology such as Pegasus “powerful, and dangerous.”

On Nov. 3, the U.S. government blacklisted NSO and Israel’s Candiru for allegedly providing spyware to governments that used it to “maliciously target” journalists, activists and others. See also: https://humanrightsdefenders.blog/2021/11/10/palestinian-ngos-dubbed-terrorist-were-hacked-with-pegasus-spyware/.

https://www.reuters.com/technology/facebook-can-pursue-malware-lawsuit-against-israels-nso-group-us-appeals-court-2021-11-08/

https://gadgets.ndtv.com/apps/news/facebook-meta-pegasus-nso-group-lawsuit-whatsapp-hack-spyware-us-appeals-court-2604175

Palestinian NGOs dubbed terrorist were hacked with Pegasus spyware

November 10, 2021

Investigation by Front Line Defenders finds NGO employees’ phones were infiltrated months before Israel designated them as ‘terrorist organisations’

Phones of Palestinians working for human rights organisations recently designated by Israel as “terrorist organisations” [see: https://humanrightsdefenders.blog/2021/10/23/assault-by-israel-on-palestinian-human-rights-ngos/] were hacked using the Israeli-made spyware at the heart of a global surveillance scandal. [see: https://humanrightsdefenders.blog/2021/07/21/nsos-pegasus-spyware-now-really-in-the-firing-line/]

Dublin-based Front Line Defenders (FDL) examined 75 phones belonging to Palestinian human rights workers and detected that six were infected with Pegasus spyware between July 2020 and April 202. Four out of the six phones belong to staff members at NGOs that were blacklisted last month for alleged ties to a group labelled by some states as a “terrorist organisation”, a move that has sparked international condemnation.

Those alleged to have been hacked include US citizen Ubai al-Aboudi, who heads the Bisan Center for Research and Development, and French national Salah Hammouri, a researcher at Addameer. 

At a press conference in Ramallah on Monday, representatives of the six organisations called for the international community to take action. “We call on the United Nations to launch an investigation to disclose the party that stood behind using this programme on the phones of human rights activists, a move that put their lives at risk,” Tahseen Elayyan, a legal researcher with Al-Haq, told Reuters.

FDL’s findings, which were reviewed and confirmed by Citizen Lab and Amnesty International Security Lab, will raise further concerns about Pegasus, the controversial spyware alleged to have been used to hack heads of state, journalists and activists in a series of explosive stories published this summer.

NSO Group, the Israeli-based tech firm behind Pegasus, only licences the product to sovereign states or the law enforcement or intelligence agencies of those states.

Haaretz reported on Monday that the export licence issued by the Israeli defence ministry to NSO Group only permits Israeli security services to monitor Israeli phone numbers.

An FDL spokesperson told Middle East Eye on Monday that the organisation does not know which state was behind the hacking it uncovered, but believes that the timeline of events over the past month may be critical in answering that question.

On 16 October, three days before the organisations were designated, Al-Haq approached FDL, suspecting that a staff member’s phone had been hacked. The same day, an FDL investigator found initial traces of Pegasus on the phone.

The following day, on 17 October, FDL said it held a meeting with all six organisations to inform them of the initial findings and see if others would want their phones investigated. NSO Group: US blacklists Israeli firms for harming ‘national security interests’.

On 18 October, Israel’s interior ministry notified Hammouri of its decision to revoke his permanent residency in Jerusalem and deport him on the basis of his alleged “breach of allegiance to the State of Israel”.

Then on 19 October, Israeli Defence Minister Benny Gantz designated all six organisations which had gathered with FDL as “terrorist organisations.”

At this point, the organisations were reportedly only considered “terrorist” groups in Israel. But on 3 November – just ahead of the release of FDL’s findings –  Israel’s commander-in-chief of the Central Command issued an order to outlaw the organisations in the West Bank.

“It seems to us that [Israeli officials] were slow to react to what was transpiring and they were unprepared,” FDL spokesperson Adam Shapiro told MEE. “It suggests we caught them doing something they didn’t want us to.”

However, Shapiro emphasised that FDL could not say definitively what state was behind the hacking, a comment echoed by Addameer’s director, Sahar Francis.

“We don’t have evidence. We can’t accuse a certain party since we don’t have yet enough information about who carried out that action,” she told Reuters, calling on the UN to launch an investigation.

Israeli officials have not made a public statement yet about FDL’s findings. NSO Group told Reuters the company “does not operate the products itself … and we are not privy to the details of individuals monitored”.

The US government last week blacklisted the NSO Group and a second Israeli spyware firm, Candiru, saying their activities are contrary to US foreign policy and national security interests.

https://www.middleeasteye.net/news/israel-spyware-pegasus-used-hack-palestinian-rights-activists-phones

https://www.theguardian.com/world/2021/nov/08/hacking-activists-latest-long-line-cyber-attacks-palestinians-nso-group-pegasus-spyware

https://www.occrp.org/en/daily/15450-experts-pegasus-spyware-found-in-phones-of-palestinian-activists

https://www.timesofisrael.com/report-palestinian-activists-phones-hacked-with-controversial-nso-group-tech/

Big Coalition urges UN to denounce abuses facilitated by spyware technologies

October 4, 2021

During the 28th U.N. Human Rights Council (HRC) Access Now joined 94 other civil society organizations and independent experts in urging member states to denounce abuses facilitated by spyware technologies.

The Pegasus Project revealed a long list of journalists, activists, human rights defenders, lawyers, world leaders, and civil society actors that were a target of NSO Group’s Pegasus Spyware. The U.N. HRC should mandate comprehensive measures to investigate and prevent further violations linked to the sale, export, and use of Pegasus spyware and cases of targeted surveillance. For earlier post on this hot topic, see: https://humanrightsdefenders.blog/tag/pegasus/

Member States must urgently act to address the perpetual human rights abuses by States facilitated by NSO Group’s Pegasus spyware,” said Laura O’Brien, UN Advocacy Officer at Access Now. “The clandestine surveillance industry must be held accountable.

The recent revelations showcased the unprecedented scale of human rights violations by States facilitated by the use of Pegasus with Budapest-based photojournalist Dániel Németh being the latest victim targeted by the spyware.

In the Middle East and North Africa (MENA), governments continue to use digital surveillance tools to target journalists and activists. In 2016, a Citizen Lab investigation revealed that the UAE spied on human rights defender Ahmed Mansoor, who is now serving 10 years in prison under inhumane conditions. The Pegasus Project revealed that friends and family of slain Saudi journalist, Jamal Khashoggi, were also targets of Pegasus spyware with the iPhone of Khashoggi’s Turkish fiancée, Hatice Cengiz, targeted and successfully infected. Last June, Access Now and the Gulf Centre for Human Rights launched the MENA Surveillance Coalition, convening civil society organizations working to defend freedom of expression, privacy, and fundamental rights, to call for an end to the sales of digital surveillance tools to repressive governments in the region.

“Invasive surveillance invades and corrodes the lives and work of human rights defenders, journalists, and activists across the globe,” said Kassem Mnejja, MENA Campaigner at Access Now. “Companies like NSO have been given free rein to proliferate the market with the dangerous Pegasus spyware used to facilitate these dehumanising and unsafe actions — this must end now.”

Despite the mounting evidence of its human rights abuses, the NSO Group continues to repeat its false claim that its spyware is only used for legitimate purposes like investigating crime and terror. This cannot continue.

U.N. human rights experts and civil society groups have previously called on governments to immediately implement a global moratorium on the sale, export, transfer, and use of private surveillance technology. Supporting this call, civil society organizations and independent experts are today requesting member states of the U.N. HRC to urgently denounce and mandate independent investigations into the human rights violations facilitated by this technology.

Read the full letter.

https://www.scoop.co.nz/stories/WO2110/S00016/act-now-against-spyware-coalition-tells-un-human-rights-council.htm

NSO’s Pegasus spyware now really in the firing line

July 21, 2021

Frank Andrews in the Middle East Eye of 20 July 2021 tracks the history of the unhealthy story to which also thsi blog has regularly paid attention: see https://humanrightsdefenders.blog/tag/nso-group/

Claims made this week that the Israeli company’s Pegasus spyware technology has been used to surveil 50,000 phones – belonging to heads of state, journalists, human rights defenders, political opponents and more – may be the highest-profile accusations against the firm, but they are not the first.

Pegasus, which infects phones with spyware through various means, has proven to be a boon to digital authoritarians wanting to track anyone perceived as critical of their rule. It has also been the subject of numerous lawsuits and legal complaints.

It begun in August 2016, when the United Arab Emirates was found to be tracking the iPhone of Emirati human rights activist Ahmed Mansoor using Pegasus spyware, according to a report by Citizen Lab and Lookout Security. [see also: https://humanrightsdefenders.blog/2016/08/29/apple-tackles-iphone-one-tap-spyware-flaws-after-mea-laureate-discovers-hacking-attempt/]

Geneva experts on cybersecurity and digital governance tell Geneva Solutions what citizens must do to stem the erosion of our right to privacy.

U.N. High Commissioner for Human Rights Michelle Bachelet, in a statement, said that the revelations “are extremely alarming, and seem to confirm some of the worst fears about the potential misuse of surveillance technology to illegally undermine people’s human rights.” See statement by @UNHumanRights Chief @mbachelet: https://ohchr.org/EN/NewsEvents/

https://www.middleeasteye.net/news/israel-pegasus-spyware-nso-group-history-accusations-denials

https://www.rawstory.com/as-un-human-rights-chief-urges-stricter-rules-snowden-calls-for-end-to-spyware-trade/https://www.rawstory.com/as-un-human-rights-chief-urges-stricter-rules-snowden-calls-for-end-to-spyware-trade/

https://indianexpress.com/article/explained/the-making-of-pegasus-from-startup-to-spy-tech-leader-israel-invasive-spyware-7414370/

New investigation shows global reach of NSO Group’s spyware

July 5, 2021

On 3 July 2021, a new interactive online platform by Forensic Architecture, supported by Amnesty International and the Citizen Lab, maps for the first time the global spread of the notorious spyware Pegasus, made by cyber-surveillance company NSO Group.

‘Digital Violence: How the NSO Group Enables State Terror’ documents digital attacks against human rights defenders around the world, and shows the connections between the ‘digital violence’ of Pegasus spyware and the real-world harms lawyers, activists, and other civil society figures face.   NSO Group is the worst of the worst in selling digital burglary tools to players who they are fully aware actively and aggressively violate the human rights of dissidents, opposition figures, and journalists. Edward Snowden, President of Freedom of the Press Foundation.

NSO Group is a major player in the shadowy surveillance industry. The company’s Pegasus spyware has been used in some of the most insidious digital attacks on human rights defenders. When Pegasus is surreptitiously installed on a person’s phone, an attacker has complete access to a phone’s messages, emails, media, microphone, camera, calls and contacts. For my earlier posts on NSO see: https://humanrightsdefenders.blog/tag/nso-group/

“The investigation reveals the extent to which the digital domain we inhabit has become the new frontier of human rights violations, a site of state surveillance and intimidation that enables physical violations in real space,” said Shourideh C. Molavi, Forensic Architecture’s Researcher-in-Charge. 

Edward Snowden narrates an accompanying video series which tell the stories of human rights activists and journalists targeted by Pegasus. The interactive platform also includes sound design by composer Brian Eno. A film about the project by award-winning director Laura Poitras will premiere at the 2021 Cannes Film Festival later this month.

The online platform is one of the most comprehensive databases on NSO-related activities, with information about export licenses, alleged purchases, digital infections, and the physical targeting of activists after being targeted with spyware, including intimidation, harassment, and detention. The platform also sheds light on the complex corporate structure of NSO Group, based on new research by Amnesty International and partners.

For years, NSO Group has shrouded its operations in secrecy and profited from working in the shadows. This platform brings to light the important connections between the use of its spyware and the devastating human rights abuses inflicted upon activists and civil society,” said Danna Ingleton, Deputy Director of Amnesty Tech.

Amnesty International’s Security Lab and Citizen Lab have repeatedly exposed the use of NSO Group’s Pegasus spyware to target hundreds of human rights defenders across the globe. Amnesty International is calling on NSO Group to urgently take steps to ensure that it does not cause or contribute to human rights abuses, and to respond when they do occur. The cyber-surveillance must carry out adequate human rights due diligence and take steps to ensure that human rights defenders and journalists do not continue to become targets of unlawful surveillance.

In October 2019, Amnesty International revealed that Moroccan academic and activist, Maati Monjib’s phone had been infected with Pegasus spyware. He continues to face harassment by the Moroccan authorities for his human rights work. In December 2020, Maati Monjib was arbitrarily detained before being released on parole on 23 March 2021.

Maati Monjib, tells his story in one of the short films, and spoke of the personal toll following the surveillance, “The authorities knew everything I said. I was in danger. Surveillance is very harming for the psychological wellbeing of the victim. My life has changed a lot because of all these pressures.”

Amnesty International is calling for all charges against Maati to be dropped, and the harassment against him and his family by the Moroccan authorities to end.

To find out more visit digitalviolence.org

https://www.amnesty.org/en/latest/news/2021/07/investigation-maps-human-rights-harm-of-nso-group-spyware/

https://www.techradar.com/news/spyware-toolkit-used-by-governments-hackers-to-break-into-windows-machines

Vietnamese Human Rights Defenders Targeted with Ocean Lotus Spyware

February 25, 2021

On 24 February 2021 a new Amnesty International investigation has identified a campaign of spyware attacks targeting Vietnamese human rights defenders (HRDs) from February 2018 to November 2020. Amnesty International’s Security Lab attributes these attacks to an attack group known as Ocean Lotus. The group has been active since at least 2014, targeting the private sector and HRDs. The spyware attacks investigated and identified by the Security Lab are the latest evidence of a crackdown on freedom of expression in Viet Nam and against Vietnamese activists outside the country.

Viet Nam’s history of Online Repression: Human rights are increasingly under attack both offline and online in Viet Nam. Over the past 15 years, repression linked to online activity has intensified, leading to a wave of harassment, intimidation, physical assault, and prosecution. Amnesty International has documented multiple cases of the arrest and prosecution of HRDs in Viet Nam in retaliation for their online expression since 2006. That year, former prisoner of conscience Truong Quoc Huy was arrested at an internet café in Ho Chi Minh City. Many activists and bloggers have been convicted for “conducting propaganda against the state.” Human rights blogger Nguyen Ngoc Nhu Quynh (Mother Mushroom) was sentenced to 10 years in prison in June 2017 on such charges. Activists and bloggers also face frequent physical assaults by officials or government-connected thugs. [see: https://www.trueheroesfilms.org/thedigest/laureates/70F07728-1E21-4D33-F0BE-460D5A188B9D] Police place activists under house arrest or briefly detain them to prevent them from participating in public events. The government also uses travel bans to prevent activists and HRDs from going abroad and engaging with the international community. In December 2020, Amnesty International published “Let Us Breathe”, a report documenting the widespread criminalization, online harassment and physical attacks faced by activists and bloggers and the rising numbers of individuals detained for peacefully expressing themselves online. [see: https://humanrightsdefenders.blog/2020/12/01/facebook-and-youtube-are-allowing-themselves-to-become-tools-of-the-vietnamese-authorities-censorship-and-harassment/ ]

What is Ocean Lotus?

The cyber-security industry, comprised of individual and company-based researchers, routinely researches and publishes information about attack groups targeting companies and governments. The industry often gives informal names to groups they continuously track based on each group’s unique tactics and tools. Ocean Lotus (also commonly called APT32 or APT-C-00) is one of these groups. The first known Ocean Lotus attack happened in 2014. It targeted US-based NGO Electronic Frontier Foundation (EFF), the Associated Press international news organization and two Vietnamese activists. This group was named Ocean Lotus in a report from the Chinese company Qihoo 360 in May 2015. In 2017, the American cyber-security company FireEye published a report linking the 2014 EFF and other attacks to this same Ocean Lotus. Over the years, Ocean Lotus has developed a sophisticated spyware toolkit comprised of several variants of Mac OS spyware, Android spyware and Windows spyware. They also strategically compromise websites in order to identify visitors and conduct further targeting. More recently, Ocean Lotus was found creating fake media websites based on content automatically gathered online. A significant part of the group’s activities is the targeting of HRDs and civil society. In 2017, the cyber-security company Volexity revealed that over 100 websites were compromised, including many belonging to human rights organizations from Viet Nam, in an attack campaign that they attributed to Ocean Lotus. Numerous other spyware attacks linked to Ocean Lotus against human rights organizations have also been reported, such as the targeting of the Cambodian human rights organization, LICADHO, in 2018. The cyber-security company FireEye describes Ocean Lotus’ operations as “aligned with Vietnamese state interests” based on the list of targeted companies and civil society groups they identified. In December 2020, Facebook published a threat report linking Ocean Lotus’ activities with a Vietnamese company named CyberOne Group. Although Amnesty International was unable to independently verify any direct connection between Ocean Lotus and Cyber One or with the Vietnamese authorities, the attacks described in this investigation confirm a pattern of targeting Vietnamese individuals and organizations.

Attacks against HRDs.

The investigation conducted by Amnesty International’s Security Lab revealed that two HRDs and a non-profit human rights organization from Viet Nam have been targeted by a coordinated spyware campaign. This spyware allows to fully monitor a compromised system, including reading and writing files, or launching other malicious programs. Bui Thanh Hieu is a blogger and pro-democracy activist who goes by the name “Nguoi Buon Gio” (The Wind Trader). He writes about social and economic justice and human rights. He is also critical of the Vietnamese government’s policies and actions regarding its relations with China, including the dispute over sovereignty in the South China Sea. Due to his writing and activism, the licence for an Internet Café he owned in Ha Noi has been revoked and he has been repeatedly subjected to reprisals. He was arrested along with activists Pham Doan Trang [see https://www.trueheroesfilms.org/thedigest/laureates/fe8bf320-1d78-11e8-aacf-35c4dd34b7ba] and Nguyen Ngoc Nhu Quynh in 2009 and was kept in police custody for 10 days for“abusing democratic freedoms to infringe upon the interests of the State.” In January 2013, Bui Thanh Hieu reported on the trial of 14 dissidents in Viet Nam and was arrested and released a few days later. He has since left Viet Nam and has lived in exile in Germany since 2013. Vietnamese Overseas Initiative for Conscience Empowerment (VOICE) is a non-profit organization supporting Vietnamese refugees and promoting human rights in Viet Nam. It was established in 1997 in the Filipino capital of Manila as a legal aid office, before formally registering in the United States in 2007. The organization continues to operate out of Manila and has helped 3,000 Vietnamese refugees resettle in third countries. Since 2011, VOICE has operated an internship programme to equip Vietnamese people with knowledge, skills, and tools to become effective activists. The organization has faced reprisals from Vietnamese authorities several times. Staff at VOICE told Amnesty International that employees and interns have been harassed, banned from travelling, and have had their passports confiscated when they have returned to Viet Nam. Furthermore, state-owned media has run an unsubstantiated smear campaign against VOICE, claiming that the organization is a terrorist group. A blogger residing in Viet Nam has also been confirmed as an Ocean Lotus target by the Security Lab, but due to security concerns their name has been omitted. They are known to have spoken out publicly about the Dong Tam incident on 9 January 2020, when approximately 3,000 security officers from Ha Noi raided Dong Tam village and killed the 84-year-old village leader Le Dinh Kinh. Three police officers were also killed. The Dong Tam incident sparked a national outcry in Viet Nam. Activists and bloggers were at the forefront of the public debate online, prompting a nationwide crackdown on on-line expression by the government. VOICE and the two bloggers all received emails containing spyware between February 2018 and November 2020. These emails pretended to share an important document. They either contained spyware as an attachment or as a link. Once downloaded and launched on the victim’s computer, the spyware would then open a decoy document in line with what the email pretended to share to trick the victim in believing the file was benign. Screenshot of the email sent to VOICE in April 2020The spyware identified by the Security Lab were either for Mac OS or Windows systems. The Windows spyware was a variant of a malware family called Kerrdown and used exclusively by the Ocean Lotus group. Kerrdown is a downloader that installs additional spyware from a server on the victim’s system and opens a decoy document. In this case, it downloaded Cobalt Strike, a commercial spyware toolkit developed by the American company Strategy Cyber and routinely used to lawfully audit the security of organizations through simulated attacks. It allows an attacker full access to the compromised system including executing scripts, taking screenshots or logging keystrokes. Unlicensed versions of Cobalt Strikes have been increasingly used by attack groups, including Ocean Lotus, over the past three years.Example of Windows Spyware Infection Chain from one of the emails received The Mac OS Spyware was a variant of a malware family for Mac OS developed and used exclusively by Ocean Lotus, analysed by Trend Micro in April 2018 and November 2020. It allows the perpetrator to access system information, download, upload or execute files and execute commands.