[OPLIN 4cast] OPLIN 4Cast #760: Pegasus spyware was made to fight terrorists, but can (allegedly) pwn everyone" Wrong.
OPLIN OPLIN
support at oplin.ohio.gov
Wed Jul 21 10:30:31 EDT 2021
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
[image: OPLIN 4Cast]
OPLIN 4Cast #760: Pegasus spyware was made to fight terrorists, but can
(allegedly) pwn everyone" Wrong.
July 21st, 2021
[image: Man in dark hood with digital background] "Pegasus" is a spyware
system developed to investigate and prevent terrorism and serious crime.
Made by Israeli cybersecurity company NSO Group, it is sold only to
government intelligence and law enforcement agencies. But human rights
group Amnesty International has released detailed documentation of their
investigation finding the software on more than 50,000 phone numbers,
including activists, journalists, politicians, teachers, business leaders,
and so on. I doubt it's on my phone presently, but I don't really find that
thought at all comforting.
-
- Private Israeli spyware used to hack cellphones of journalists,
activists worldwide
<https://www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/>
[*The Washington Post*] "The targeting of the 37 smartphones would
appear to conflict with the stated purpose of NSO’s licensing of the
Pegasus spyware, which the company says is intended only for use in
surveilling terrorists and major criminals. The evidence extracted from
these smartphones, revealed here for the first time, calls into question
pledges by the Israeli company to police its clients for human rights
abuses."
- Spyware successfully broke into journalists' iPhones by sending
iMessages that didn't even need to be read
<https://www.businessinsider.com/nso-group-spyware-iphone-zero-click-imessage-attacks-2021-7>
[*Insider*] "[Amnesty International] found evidence of 'zero-click'
iMessage attacks being targeted at journalists going back to 2018, with
alarming implications for iPhone security. Zero-click attacks don't require
any interaction from the victim to break into a phone... These most recent
discoveries indicate NSO Group's customers are currently able to remotely
compromise all recent iPhone models and versions of iOS."
- Apple under pressure over iPhone security after NSO spyware claims
<https://arstechnica.com/information-technology/2021/07/apple-under-pressure-over-iphone-security-after-nso-spyware-claims/>
[*Ars Technica*] "Bill Marczak, research fellow at Citizen Lab, a
nonprofit group that has extensively documented NSO’s tactics, said
Amnesty’s findings suggested that Apple had a 'major blinking red
five-alarm-fire problem with iMessage security.' A similar kind of
zero-click Pegasus attack was identified using Facebook-owned WhatsApp
messenger in 2019."
- This tool tells you if NSO’s Pegasus spyware targeted your phone
<https://techcrunch.com/2021/07/19/toolkit-nso-pegasus-iphone-android/https://techcrunch.com/2021/07/19/toolkit-nso-pegasus-iphone-android/>
[*TechCrunch*] "The toolkit works on the command line, so it’s not a
refined and polished user experience and requires some basic knowledge of
how to navigate the terminal... As command line tools go, [it's] relatively
simple to use, though the project is open source so it won’t be long before
someone will surely build a user interface for it."
*From the Ohio Web Library <http://ohioweblibrary.org>:*
- Trew, Bel. “Who Is the NSO Group?
<http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=cmh&AN=4HGINDDMGTCHPDSTRY000053320261>
” *Independent (UK)*, 20 July 2021.
- Sandro Contenta. “Surveillance Company NSO Group Says It Doesn’t
Condone Human Rights Violations
<https://search-ebscohost-com.proxy.oplin.org/login.aspx?direct=true&db=pwh&AN=6FPTS2019121456624330&site=ehost-live>
.” *Toronto Star (Canada)*, 14 Dec. 2019.
- Brewster, Thomas. “1,400 WhatsApp Hacks In 2 Weeks - Were You A Target
Of Israeli Spyware?
<https://search-ebscohost-com.proxy.oplin.org/login.aspx?direct=true&db=buh&AN=139451692&site=ehost-live>
” *Forbes.Com*, Oct. 2019, p. 1.
------------------------------
The *OPLIN 4cast* is a weekly compilation of recent headlines, topics, and
trends that could impact public libraries. You can subscribe to it in a
variety of ways, such as:
- *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL:
http://www.oplin.org/4cast/index.php/?feed=rss2.
- *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
http://lists.oplin.org/mailman/listinfo/OPLIN4cast.
© 2021 Ohio Public Library Information Network
[image: Find us on Slideshare] <http://www.slideshare.net/oplin> [image:
Find us on Facebook] <http://www.facebook.com/oplin.org> [image: Find us
on Google+] <https://plus.google.com/107751358238995507967> [image: Find
us on Twitter] <http://www.twitter.com/oplin>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20210721/bc824fe9/attachment.htm>
More information about the OPLIN4cast
mailing list