Einzelnen Beitrag anzeigen
Ungelesen 18.07.21, 21:00   #1
muavenet
Are YOU a people person?
 
Registriert seit: Apr 2015
Beiträge: 2.552
Bedankt: 4.337
muavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punktemuavenet leckt gerne myGully Deckel in der Kanalisation! | 880485557 Respekt Punkte
Standard Cyberwaffe "Pegasus": Regierungsgegner und Journalisten wurden offenbar ausgespäht

Zitat:
Cyberwaffe »Pegasus«

Ungarische Regierungsgegner und Journalisten wurden offenbar ausgespäht

Jamal Khashoggis Witwe, unliebsame Journalisten in Ungarn: Zahlreiche Gegner von Autokraten sind Recherchen zufolge abgehört worden – mutmaßlich mithilfe der Cyberwaffe eines israelischen Unternehmens.


18.07.2021, 20.17 Uhr


Hunderte Journalisten, Menschenrechtsaktivisten und Oppositionelle weltweit sind offenbar Opfer umfassender illegaler staatlicher Abhöraktionen geworden. Das ist das Ergebnis einer Recherche eines internationalen Journalistenkonsortiums um die französische Rechercheorganisation Forbidden Stories und die Menschenrechtsorganisation Amnesty International.

Geheimdienste und Polizeibehörden mehrerer Länder hätten demnach eine Cyberwaffe des israelischen Unternehmens NSO Group missbraucht, um damit die Mobiltelefone von Journalisten und Menschenrechtsaktivisten anzugreifen.

In Deutschland waren »SZ«, NDR, WDR und »Zeit« an den Recherchen beteiligt, 15 weitere Redaktionen aus zehn Ländern veröffentlichen die Recherchen ebenfalls. Die Journalistinnen und Journalisten konnten nach eigenen Angaben ein Datenleak mit mehr als 50.000 Telefonnummern auswerten, die mutmaßlich von NSO-Kunden als Ziele möglicher Überwachung ausgewählt worden seien.

Die geleakten Daten geben demnach jedoch keine zweifelsfreie Auskunft darüber, wer sie zu welchem konkreten Zweck erfasst hat.


»Pegasus« kann Smartphones in Echtzeit ausspähen

»Pegasus« gilt unter Fachleuten als das derzeit leistungsfähigste Spähprogramm für Handys und ist als Cyberwaffe eingestuft. Es kann infiltrierte Smartphones in Echtzeit ausspähen und die Verschlüsselung von Chatprogrammen wie WhatsApp oder Signal umgehen. NSO verkauft das Programm nur an staatliche Behörden und für den Zweck der Bekämpfung von Terrorismus und schwerer Kriminalität.

Auf der geleakten Liste finden sich den Recherchen zufolge jedoch unter anderem auch die Handynummern von mehr als 180 Journalistinnen und Journalisten, darunter Reporterinnen von Le Monde, Mediapart und Le Canard Enchainé in Frankreich, eine Reporterin des US-Fernsehsenders CNN, ungarische Investigativreporter sowie bekannte Journalistinnen aus Aserbaidschan.

Mithilfe forensischer Untersuchungen konnten den Recherchen zufolge in 37 Fällen versuchte oder erfolgreiche Angriffe mit Pegasus auf den Handys von Journalisten, Menschenrechtsaktivisten, deren Familienangehörigen sowie Geschäftsleuten nachgewiesen werden. Die Handyforensik wurde demnach im Security Lab von Amnesty International vorgenommen. Das auf die Analyse von Cyberangriffen spezialisierte Citizen Lab der kanadischen Universtität Toronto verifizierte die Methode.


Ungarische Investigativjournalisten unter den Opfern

Zu den Journalisten, auf deren Smartphones Spuren erfolgreicher Pegasus-Angriffe nachgewiesen wurden, zählen zwei Reporter des ungarischen Investigativmediums Direkt36. Die Recherche lege den beteiligten Medien zufolge den Verdacht nahe, dass diese Angriffe von staatlichen Stellen in Ungarn ausgeführt wurden. Die ungarische Regierung habe dem auf Nachfrage nicht widersprochen. Ein Sprecher des Büros von Ministerpräsident Viktor Orbán teilte mit, staatliche Stellen in Ungarn setzten »verdeckte Methoden« stets nur im gesetzlichen Rahmen ein.

In Frankreich wurde laut forensischer Untersuchung das Handy des Gründers der Rechercheplattform Mediapart, Edwy Plenel, infiziert. Ausgespäht wurde offenbar auch eine bekannte Reporterin von Le Monde. In beiden Fällen sprächen eine Analyse der Daten und weitere Recherchen dafür, dass diese Angriffe von Marokko ausgingen. Die marokkanische Regierung teilte mit, es sei nicht erwiesen, dass es eine Geschäftsbeziehung zwischen Marokko und »dem genannten israelischen Unternehmen« gebe.

Zu den Betroffenen der Handyüberwachung zählt laut den Recherchen des Journalistenkonsortiums auch Hatice Cengiz, die Verlobte des 2018 ermordeten saudi-arabischen Dissidenten Jamal Khashoggi. Ihr Handy wurde nur vier Tage nach dem Mord laut den Cyberexperten von Amnesty International mit der Schadsoftware Pegasus infiziert. NSO teilte dazu mit, die Technologie seines Unternehmens habe »in keiner Weise« mit dem Mord an Khashoggi in Verbindung gestanden.
Zur Quelle.




Bei weitem ausführlicher dazu The Guardian:

Zitat:
Revealed: leak uncovers global abuse of cyber-surveillance weapon

Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests


The Guardian | Kirchgaessner, Lewis, Pegg, Cutler et al. | Sun 18 Jul 2021 17.00 BST



Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak.

The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus, which the company insists is only intended for use against criminals and terrorists.

Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.

The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016.

Forbidden Stories, a Paris-based nonprofit media organisation, and Amnesty International initially had access to the leaked list and shared access with media partners as part of the Pegasus project, a reporting consortium.

The presence of a phone number in the data does not reveal whether a device was infected with Pegasus or subject to an attempted hack. However, the consortium believes the data is indicative of the potential targets NSO’s government clients identified in advance of possible surveillance attempts.

Forensics analysis of a small number of phones whose numbers appeared on the leaked list also showed more than half had traces of the Pegasus spyware.

The Guardian and its media partners will be revealing the identities of people whose number appeared on the list in the coming days. They include hundreds of business executives, religious figures, academics, NGO employees, union officials and government officials, including cabinet ministers, presidents and prime ministers.

The list also contains the numbers of close family members of one country’s ruler, suggesting the ruler may have instructed their intelligence agencies to explore the possibility of monitoring their own relatives.

The disclosures begin on Sunday, with the revelation that the numbers of more than 180 journalists are listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters.

The phone number of a freelance Mexican reporter, Cecilio Pineda Birto, was found in the list, apparently of interest to a Mexican client in the weeks leading up to his murder, when his killers were able to locate him at a carwash. His phone has never been found so no forensic analysis has been possible to establish whether it was infected.

NSO said that even if Pineda’s phone had been targeted, it did not mean data collected from his phone contributed in any way to his death, stressing governments could have discovered his location by other means. He was among at least 25 Mexican journalists apparently selected as candidates for surveillance over a two-year period.

Without forensic examination of mobile devices, it is impossible to say whether phones were subjected to an attempted or successful hack using Pegasus.

NSO has always maintained it “does not operate the systems that it sells to vetted government customers, and does not have access to the data of its customers’ targets”.

In statements issued through its lawyers, NSO denied “false claims” made about the activities of its clients, but said it would “continue to investigate all credible claims of misuse and take appropriate action”. It said the list could not be a list of numbers “targeted by governments using Pegasus”, and described the 50,000 figure as “exaggerated”.

The company sells only to military, law enforcement and intelligence agencies in 40 unnamed countries, and says it rigorously vets its customers’ human rights records before allowing them to use its spy tools.


NSO Group says it only sells spyware to vetted government bodies

The Israeli minister of defence closely regulates NSO, granting individual export licences before its surveillance technology can be sold to a new country.

Last month, NSO released a transparency report in which it claimed to have an industry-leading approach to human rights and published excerpts from contracts with customers stipulating they must only use its products for criminal and national security investigations.

There is nothing to suggest NSO’s customers did not also use Pegasus in terrorism and crime investigations, and the consortium also found numbers in the data belonging to suspected criminals.

However, the broad array of numbers in the list belonging to people who seemingly have no connection to criminality suggests some NSO clients are breaching their contracts with the company, spying on pro-democracy activists and journalists investigating corruption, as well as political opponents and government critics.

That thesis is supported by forensic analysis on the phones of a small sample of journalists, human rights activists and lawyers whose numbers appeared on the leaked list. The research, conducted by Amnesty’s Security Lab, a technical partner on the Pegasus project, found traces of Pegasus activity on 37 out of the 67 phones examined.

The analysis also uncovered some sequential correlations between the time and date a number was entered into the list and the onset of Pegasus activity on the device, which in some cases occurred just a few seconds later.

Amnesty shared its forensic work on four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed they showed signs of Pegasus infection. Citizen Lab also conducted a peer-review of Amnesty’s forensic methods, and found them to be sound.

The consortium’s analysis of the leaked data identified at least 10 governments believed to be NSO customers who were entering numbers into a system: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India and the United Arab Emirates (UAE).

Analysis of the data suggests the NSO client country that selected the most numbers – more than 15,000 – was Mexico, where multiple different government agencies are known to have bought Pegasus. Both Morocco and the UAE selected more than 10,000 numbers, the analysis suggested.

The phone numbers that were selected, possibly ahead of a surveillance attack, spanned more than 45 countries across four continents. There were more than 1,000 numbers in European countries that, the analysis indicated, were selected by NSO clients.

The presence of a number in the data does not mean there was an attempt to infect the phone. NSO says there were other possible purposes for numbers being recorded on the list.

Rwanda, Morocco, India and Hungary denied having used Pegasus to hack the phones of the individuals named in the list. The governments of Azerbaijan, Bahrain, Kazakhstan, Saudi Arabia, Mexico, the UAE and Dubai did not respond to invitations to comment.

The Pegasus project is likely to spur debates over government surveillance in several countries suspected of using the technology. The investigation suggests the Hungarian government of Viktor Orbán appears to have deployed NSO’s technology as part of his so-called war on the media, targeting investigative journalists in the country as well as the close circle of one of Hungary’s few independent media executives.

The leaked data and forensic analyses also suggest NSO’s spy tool was used by Saudi Arabia and its close ally, the UAE, to target the phones of close associates of the murdered Washington Post journalist Jamal Khashoggi in the months after his death. The Turkish prosecutor investigating his death was also a candidate for targeting, the data leak suggests.

Claudio Guarnieri, who runs Amnesty International’s Security Lab, said once a phone was infected with Pegasus, a client of NSO could in effect take control of a phone, enabling them to extract a person’s messages, calls, photos and emails, secretly activate cameras or microphones, and read the contents of encrypted messaging apps such as WhatsApp, Telegram and Signal.

By accessing GPS and hardware sensors in the phone, he added, NSO’s clients could also secure a log of a person’s past movements and track their location in real time with pinpoint accuracy, for example by establishing the direction and speed a car was travelling in.

The latest advances in NSO’s technology enable it to penetrate phones with “zero-click” attacks, meaning a user does not even need to click on a malicious link for their phone to be infected.

Guarnieri has identified evidence NSO has been exploiting vulnerabilities associated with iMessage, which comes installed on all iPhones, and has been able to penetrate even the most up-to-date iPhone running the latest version of iOS. His team’s forensic analysis discovered successful and attempted Pegasus infections of phones as recently as this month.

Apple said: “Security researchers agree iPhone is the safest, most secure consumer mobile device on the market.”

NSO declined to give specific details about its customers and the people they target.

However, a source familiar with the matter said the average number of annual targets per customer was 112. The source said the company had 45 customers for its Pegasus spyware.


Additional reporting: Michael Safi in Beirut, Dan Sabbagh in London, Nina Lakhani in Mexico, Shaun Walker in Budapest, Angelique Chrisafis in Paris and Martin Hodgson in New York.
Link zum Artikel mit Infografiken hier; die ganze Artikelserie ("Pegasus Project") ist (dann) hier zu finden.

Bei Übersetzungsproblemen helfen DeepL, PROMT oder Google Translate.
muavenet ist offline   Mit Zitat antworten
Die folgenden 7 Mitglieder haben sich bei muavenet bedankt:
didi53 (19.07.21), Draalz (19.07.21), gerhardal (19.07.21), L00KER (20.07.21), pauli8 (19.07.21), sydneyfan (20.07.21), Uwe Farz (18.07.21)