Buongiorno,

Alberto Cammozzo via nexa <nexa@server-nexa.polito.it> writes:

> <https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones>
>
>
> What is Pegasus spyware and how does it hack phones?
> Pegasus can infect a phone through ‘zero-click’ attacks, which do not require 
> any interaction from the phone’s owner to succeed.
>
> NSO Group software can record your calls, copy your messages and secretly 
> film you
> David Pegg and Sam Cutler
> Sun 18 Jul 2021 17.00 BST
>
> Last modified on Mon 19 Jul 2021 09.53 BST

Grazie mille Alberto per il riferimento.

Purtroppo, come a me pare troppo spesso accada con molti, troppi
articoli della stampa "mainstream", mancano /clamorosamente/ riferimenti
alle FONTI.  Tento di riparare a questa insopportabile leggerezza,
almeno qui.... ANCHE PERCHÉ sono _esattamente_ i "dettagli" (di come
viene raccontata la storia) a fare la differenza... oltre che la
mancanza di riferimenti ai documenti tecnici.

La "root news" dell'intero grappolo credo sia questa, pubblicata da
Forbidden Stories [1]:

https://forbiddenstories.org/about-the-pegasus-project/
«About The Pegasus Project»

--8<---------------cut here---------------start------------->8---

[...] The Forbidden Stories consortium discovered that, contrary to what
NSO Group has claimed for many years, including in a recent transparency
report, this spyware has been widely misused. The leaked data showed
that at least 180 journalists have been selected as targets in countries
like India, Mexico, Hungary, Morocco and France, among others. Potential
targets also include human rights defenders, academics, businesspeople,
lawyers, doctors, union leaders, diplomats, politicians and several
heads of states.

In a letter shared with Forbidden Stories and its partners, NSO Group
contended that the consortium’s reporting was based on “wrong
assumptions” and “uncorroborated theories.” NSO Group insisted that the
analysis of the data by journalists who were part of the Pegasus Project
relied on a “misleading interpretation of leaked data from accessible
and overt basic information, such as HLR Lookup services, which have no
bearing on the list of the customers targets of Pegasus or any other NSO
products.”

HLR refers to Home Location Register – a database that is essential to
operating cellular phone networks. A person with direct knowledge of
NSO’s systems, speaking on the condition of anonymity, told journalists
from the Pegasus Project that an HLR lookup is a key step of determining
certain characteristics of a phone, such as whether it is turned on or
in a country that allows Pegasus targeting.

[...] The consortium met with victims from all over the world whose
phone numbers appeared in the data. The forensic analyses of their
phones – conducted by Amnesty International’s Security Lab and
peer-reviewed by the Canadian organization Citizen Lab – was able to
confirm an infection or attempted infection with NSO Group’s spyware in
85% of cases, or 37 in total. Such a rate is remarkably high given the
state-of-the-art spyware is supposed to be undetectable on the device in
compromises.

[...] The project shines a harsh light on the business of NSO Group,
which, despite claiming it vets its clients based on their human rights
track records, decided to sell its product to authoritarian regimes such
as Azerbaijan, the United Arab Emirates and Saudi Arabia. Insiders
disclosed the important role played by the Israeli Ministry of Defense
when it came to picking NSO Group’s clients. Multiple sources
corroborated the fact that Israeli authorities pushed for Saudi Arabia
to be added to the list of customers despite NSO Group’s
hesitations. The company’s lawyer denied “NSO Group takes governmental
direction regarding customers.”

--8<---------------cut here---------------end--------------->8---

Credo non sfuggirà ai più smaliziati (anzi _complottisti_) di voi che il
/presunto/ coinvolgimento del ministro israeliano aprirebbe scenari
geopolitici interessanti in merito al cosiddetto terrorismo
internazionale.

Il report (che non ho ancora letto) che descrive come è stata condotta
l'analisi forense è stato pubblicato da Amnesty International ieri:

https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/

«Forensic Methodology Report: How to catch NSO Group’s Pegasus»
18 July 2021, 17:00 UTC

--8<---------------cut here---------------start------------->8---

[...] In this Forensic Methodology Report, Amnesty International is
sharing its methodology and publishing an open-source mobile forensics
tool and detailed technical indicators, in order to assist information
security researchers and civil society with detecting and responding to
these serious threats.

This report documents the forensic traces left on iOS and Android
devices following targeting with the Pegasus spyware. This includes
forensic records linking recent Pegasus infections back to the 2016
Pegasus payload used to target the HRD Ahmed Mansoor.

The Pegasus attacks detailed in this report and accompanying appendices
are from 2014 up to as recently as July 2021. These also include
so-called “zero-click” attacks which do not require any interaction from
the target. Zero-click attacks have been observed since May 2018 and
continue until now. Most recently, a successful “zero-click” attack has
been observed exploiting multiple zero-days to attack a fully patched
iPhone 12 running iOS 14.6 in July 2021.

Sections 1 to 8 of this report outline the forensic traces left on
mobile devices following a Pegasus infection.  This evidence has been
collected from the phones of HRDs and journalists in multiple countries.

Finally, in section 9 the report documents the evolution of the Pegasus
network infrastructure since 2016.  NSO Group has redesigned their
attack infrastructure by employing multiple layers of domains and
servers.  Repeated operational security mistakes have allowed the
Amnesty International Security Lab to maintain continued visibility into
this infrastructure. We are publishing a set of 700 Pegasus-related
domains. [...]

--8<---------------cut here---------------end--------------->8---

Saluti, 380°

[...]


[1] https://forbiddenstories.org/about-us/

--
380° (Giovanni Biscuolo public alter ego)

«Noi, incompetenti come siamo,
 non abbiamo alcun titolo per suggerire alcunché»

Disinformation flourishes because many people care deeply about injustice
but very few check the facts.  Ask me about <https://stallmansupport.org>.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
nexa mailing list
nexa@server-nexa.polito.it
https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa

Reply via email to