Search Results for: nso group

OpenNet Initiative Releases New Report on Faith-Based Censorship

The OpenNet Initiative (ONI) is pleased to release In the Name of God: Faith Based Internet Censorship in Majority Muslim Countries. This occasional paper analyzes the Internet censorship policies and practices of majority Muslim countries and finds that in many of these countries online information controls are primarily based on the Islamic faith and interpretations of its instructions

Pegasus Infection of Galina Timchenko, exiled Russian Journalist and Publisher

In an investigative collaboration with Access Now, the Citizen Lab has analyzed forensic artifacts from the iPhone of award-winning exiled Russian investigative journalist Galina Timchenko and found with high confidence that on or around February 10th, 2023 it was infected with NSO Group’s Pegasus spyware. 

Peace through Pegasus: Jordanian Human Rights Defenders and Journalists Hacked with Pegasus Spyware

Phones belonging to four Jordanian human rights defenders, lawyers, and journalists were hacked with NSO Group’s Pegasus spyware between August 2019 and December 2021. We assess that at least two of the four targets were hacked by Pegasus operators primarily focused on Jordan, based on SMS messages containing Pegasus links that map to a cluster of domain names focusing on Jordanian themes.

The Washington Post: A UAE agency put Pegasus spyware on phone of Jamal Khashoggi’s wife months before his murder, new forensics show

Citizen Lab researchers were able to identify over a thousand web addresses used to deliver Pegasus spyware to the phones of targets in 45 countries. Pegasus, developed by Israel’s NSO Group, claims it is used against terrorists and criminals, but an analysis by Bill Marczak found evidence of Pegasus spyware on a phone belonging Jamal Khashoggi’s inner circle.

Pegasus vs. Predator: Dissident’s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware

Two Egyptians—exiled politician Ayman Nour and the host of a popular news program (who wishes to remain anonymous)—were hacked with Predator spyware, built and sold by the previously little-known mercenary spyware developer Cytrox. The phone of Ayman Nour was simultaneously infected with both Cytrox’s Predator and NSO Group’s Pegasus spyware, operated by two different government clients.