Over and over again, NSO Group customers continue to have their spies

On Thursday, Amnesty International has published a new report in detailing the attempt to penetrate against two Serbian journalists, claiming to have been implemented with spyware in the NSO Group Pegasus Group.
The two journalists, who are working in the Birn-based BirN, received suspicious text messages including the link-mainly the hunting attack, according to non-profit organizations. In one case, Amnesty said that the researchers managed to click on the link in a safe environment and believe that it led to a field that was previously identified as belonging to the NSO infrastructure.
“Amnesty International has spent years tracking the NSO Group Pegasus Spyware and how it was used to target activists and journalists,” Donncha ó Cearbhaill, head of Aman Amnesty Laboratory, told Techcrunch. “This technical research allowed the amnesty organization to determine the harmful web sites used to provide Pegasus Spyware programs, including the specific Pegasus field used in this campaign.”
To his point of view, security researchers such as Cearbhaill who were keeping tabs on NSO activities have now become good years in discovering signs of spyware for the company so that all researchers sometimes have to do them quickly to an area involved in the attack.
In other words, NSO Group and its customers lose their battle to stay in the shade.
“NSO has an essential problem: it is not good in hiding as their customers think,” said John Scott Rilton, the first researcher at the Citizen Lab, a human rights organization that has been achieved in the violations of spyware since 2012.
There is difficult evidence to prove what CEARBHALL and Square Reilton believe.
In 2016, Citizen Lab published the first technical report ever documenting an attack with Pegasus, which was against the dissident of the United Arab Emirates. Since then, in less than 10 years, the researchers have identified at least 130 people all over the world targeting or hacked using NSO Group spyware, according to the security researcher Runa Sandvik.
The PEGASUS project can explain the huge number of victims and goals partially, a group press initiative to investigate the abuse of the NSO spyware, which was based on a leak list of more than 50,000 phones entered into the NSO group targeting group.
But there were also dozens of victims identified by Amnesty International and the citizens’ laboratory and arrival now, which is other than the profitable help to protect civil society from spyware attacks, which did not rely on the list of leaked phone numbers.
Contact us
Do you have more information about NSO GROP, or other spyware companies? From a non-work device and network, you can connect to Lorenzo Franceschi-bicchierai safely on a signal on +1 917 257 1382, or via Telegram and Keybasarezofb, or email. You can also contact Techcrunch via Securedrop.
A NSO spokesperson has not answered the suspension request, which included questions about the invisible PEGASUS, or its absence, and whether NSO Group customers are concerned about it.
Regardless of non -profit organizations, NSO Group continues to be arrested by Apple, which sends notifications to the victims of spyware around the world, and often pays people who have received these notifications for help from arrival now, pardon, and citizen laboratory. These discoveries led to more technical reports that document the spyware attacks that were carried out with PEGASUS, as well as spyware made by other companies.
The NSO Group problem may be on the fact that it sells to countries that use spyware randomly, including reporters and other members of civil society.
Using the technical term for operational security, ó Cearbhaill said: “The OPSEC error committed by NSO Group here continues to sell to countries that will continue to target journalists and end up exposing themselves,” using the technical term for operational security.