Daily Trust

What is Pegasus spyware and how does it hack phones?

NSO Group software can record your calls, copy your messages and secretly film you

- Culled from The Guardian, UK

It is the name for perhaps the most powerful piece of spyware ever developed – certainly by a private company. Once it has wormed its way on to your phone, without you noticing, it can turn it into a 24-hour surveillan­ce device. It can copy messages you send or receive, harvest your photos and record your calls. It might secretly film you through your phone’s camera, or activate the microphone to record your conversati­ons. It can potentiall­y pinpoint where you are, where you’ve been, and who you’ve met.

Pegasus is the hacking software – or spyware – that is developed, marketed and licensed to government­s around the world by the Israeli company NSO Group. It has the capability to infect billions of phones running either iOS or Android operating systems.

The earliest version of Pegasus discovered which was captured by researcher­s in 2016, infected phones through what is called spearphish­ing – text messages or emails that trick a target into clicking on a malicious link.

What is in the Pegasus project data?

What is in the data leak?

The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillan­ce software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organisati­on, and Amnesty Internatio­nal initially had access to the list and shared access with 16 media organisati­ons including the Guardian. More than 80 journalist­s have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses. What does the leak indicate? The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillan­ce. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillan­ce tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technicall­y impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinatio­ns of a small sample of mobile phones with numbers on the list found tight correlatio­ns between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds.

What did forensic analysis reveal?

Amnesty examined 67 smartphone­s where attacks were suspected. Of those, 23 were successful­ly infected and 14 showed signs of attempted penetratio­n. For the remaining 30, the tests were inconclusi­ve, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of informatio­n required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared “backup copies” of four iPhones with Citizen Lab, a research group at the University of Toronto that specialise­s in studying Pegasus, which confirmed that they showed signs of Pegasus infection. Citizen Lab also conducted a peer review of Amnesty’s forensic methods, and found them to be sound.

Which NSO clients selecting numbers?

While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsibl­e for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 government­s believed to be responsibl­e for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO.

What does NSO Group say?

The company has always said it

were does not have access to the data of its customers’ targets. Through its lawyers, NSO said the consortium had made “incorrect assumption­s” about which clients use the company’s technology. It said the 50,000 number was “exaggerate­d” and that the list could not be a list of numbers “targeted by government­s using Pegasus”. The lawyers said NSO had reason to believe the list accessed by the consortium “is not a list of numbers targeted by government­s using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes”. They said it was a list of numbers that anyone could search on an open source system. After further questions, the lawyers said the consortium was basing its findings “on misleading interpreta­tion of leaked data from accessible and overt basic informatio­n, such as HLR Lookup services, which have no bearing on the list of the customers’ targets of Pegasus or any other NSO products ... we still do not see any correlatio­n of these lists to anything related to use of NSO Group technologi­es”. Following publicatio­n, they explained that they considered a “target” to be a phone that was the subject of a successful or attempted (but failed) infection by Pegasus, and reiterated that the list of 50,000 phones was too large for it to represent “targets” of Pegasus. They said that the fact that a number appeared on the list was in no way indicative of whether it had been selected for surveillan­ce using Pegasus.

What is HLR lookup data?

The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks. Such registers keep records on the networks of phone users and their general locations, along with other identifyin­g informatio­n that is used routinely in routing calls and texts. Telecoms and surveillan­ce experts say HLR data can sometimes be used in the early phase of a surveillan­ce attempt, when identifyin­g whether it is possible to connect to a phone. The consortium understand­s NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries. It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons – unrelated to Pegasus – for conducting HLR lookups via an NSO system.

Since then, however, NSO’s attack capabiliti­es have become more advanced. Pegasus infections can be achieved through so-called “zero-click” attacks, which do not require any interactio­n from the phone’s owner in order to succeed. These will often exploit “zero-day” vulnerabil­ities, which are flaws or bugs in an operating system that the mobile phone’s manufactur­er does not yet know about and so has not been able to fix.

In 2019 WhatsApp revealed that NSO’s software had been used to send malware to more than 1,400 phones by exploiting zero-day vulnerabil­ity. Simply by placing a WhatsApp call to a target device, malicious Pegasus code could be installed on the phone, even if the target never answered the call. More recently NSO has begun exploiting vulnerabil­ities in Apple’s iMessage software, giving it backdoor access to hundreds of millions of iPhones. Apple says it is continuall­y updating its software to prevent such attacks.

Technical understand­ing of Pegasus, and how to find the evidential breadcrumb­s it leaves on a phone after a successful infection, has been improved by research conducted by Claudio Guarnieri, who runs Amnesty Internatio­nal’s Berlin-based Security Lab.

“Things are becoming a lot more complicate­d for the targets to notice,” said Guarnieri, who explained that NSO clients had largely abandoned suspicious SMS messages for more subtle zero-click attacks.

For companies such as NSO, exploiting software that is either installed on devices by default, such as iMessage, or is very widely used, such as WhatsApp, is especially attractive, because it dramatical­ly increases the number of mobile phones Pegasus can successful­ly attack.

As the technical partner of the Pegasus project, an internatio­nal consortium of media organisati­ons including the Guardian, Amnesty’s lab has discovered traces of successful attacks by Pegasus customers on iPhones running upto-date versions of Apple’s iOS. The attacks were carried out as recently as July 2021.

Forensic analysis of the phones of victims has also identified evidence suggesting NSO’s constant search for weaknesses may have expanded to other commonplac­e apps. In some of the cases analysed by Guarnieri and his team, peculiar network traffic relating to Apple’s Photos and Music apps can be seen at the times of the infections, suggesting NSO may have begun leveraging new vulnerabil­ities.

Where neither spear-phishing nor zero-click attacks succeed, Pegasus can also be installed over a wireless transceive­r located near a target, or, according to an NSO brochure, simply manually installed if an agent can steal the target’s phone.

Once installed on a phone, Pegasus can harvest more or less any informatio­n or extract any file. SMS messages, address books, call history, calendars, emails and internet browsing histories can all be exfiltrate­d.

“When an iPhone is compromise­d, it’s done in such a way that allows the attacker to obtain so-called root privileges, or administra­tive privileges, on the device,” said Guarnieri. “Pegasus can do more than what the owner of the device can do.”

Lawyers for NSO claimed that Amnesty Internatio­nal’s technical report was conjecture, describing it as “a compilatio­n of speculativ­e and baseless assumption­s”. However, they did not dispute any of its specific findings or conclusion­s.

NSO has invested substantia­l effort in making its software difficult to detect and Pegasus infections are now very hard to identify. Security researcher­s suspect more recent versions of Pegasus only ever inhabit the phone’s temporary memory, rather than its hard drive, meaning that once the phone is powered down virtually all trace of the software vanishes.

One of the most significan­t challenges that Pegasus presents to journalist­s and human rights defenders is the fact that the software exploits undiscover­ed vulnerabil­ities, meaning even the most security-conscious mobile phone user cannot prevent an attack.

“This is a question that gets asked to me pretty much every time we do forensics with somebody: ‘What can I do to stop this happening again?’” said Guarnieri. “The real honest answer is nothing.”

 ??  ??

Newspapers in English

Newspapers from Nigeria