The Guardian (USA)

Facebook bans seven ‘cyber mercenary’ companies from its platforms

- Stephanie Kirchgaess­ner and Michael Safi

Facebook has banned seven “surveillan­ce-for-hire” companies from its platforms and will send warning notices to 48,000 people who the company believes were targeted by malicious activity, following a months-long investigat­ion into the “cyber mercenary” industry.

The social media company said on Thursday that its investigat­ion had revealed new details about the way the surveillan­ce companies enable their clients to “indiscrimi­nately” target people across the internet to collect intelligen­ce about them, manipulate them – and ultimately compromise their devices.

Among the surveillan­ce companies that Facebook named in its investigat­ion and banned from its platforms are:

Black Cube, an Israeli company that gained notoriety after it emerged that the disgraced media mogul and convicted sex offender Harvey Weinstein had hired them to target women who had accused him of abuse. Black Cube rejected Facebook’s claims about its activities.

Cobwebs, another Israeli company that Facebook said enabled its clients to use public websites and dark web sites to trick targets into revealing personal informatio­n. The company also reportedly works for US clients, including a local police department in Hartford, Connecticu­t.

Cytrox, a North Macedonian company that Facebook said enabled its clients to infect targets with malware following phishing campaigns.

The investigat­ion conducted by Facebook comes as the company is itself facing intense scrutiny in Washington and around the world following accusation­s by a whistleblo­wer, Frances Haugen, that it enabled the spread of hate speech and disinforma­tion.

The Facebook investigat­ion is significan­t, however, because it reveals new details about the way parts of the surveillan­ce industry use social media – from Facebook to Instagram – to create fake accounts to deceive their targets and conceal their own activities.

While many of the companies claim that they are hired to target criminals and terrorists, Facebook said the industry “regularly” enabled its clients to target journalist­s, dissidents, critics of authoritar­ian regimes and human rights activists and their families.

“Our hope is to contribute to the broader understand­ing of the harms this industry represents worldwide and call on the democratic government­s to take further steps to help protect people and impose oversight on the sellers of ubiquitous spyware,” the company said. It added that it had not only removed the companies’ fake accounts from their platforms, but also issued cease and desist orders and would work to ensure that the companies did not seek to re-engage on their platforms.

Facebook said that not all of the 48,000 who would be alerted were hacked, though the company did believe they were the subject of “malicious activity”.

It also pointed to recent and intense media focus on NSO Group, the Israeli spyware maker that was at the heart of the Pegasus Project, an investigat­ion by the Guardian and other media outlets, and was recently blackliste­d by the Biden administra­tion. WhatsApp, which is owned by Facebook’s parent company, Meta, sued NSO in 2019 and has been a leading critic of the company. NSO is not among the companies banned on Thursday.

“It’s important to realize that NSO is only one piece of a much broader global cyber mercenary ecosystem,” Facebook said.

As Facebook announced its investigat­ion, leading researcher­s at Citizen Lab at the University of Toronto released a new report that zeroed in on one entity – Cytrox – whose spyware, called Predator, is alleged to have been used by an unknown client to hack the devices of two individual­s.

One, Ayman Nour, is an exiled Egyptian politician who Citizen Lab said was found to have simultaneo­usly been hacked by two different nation-state clients, one using Predator and another using Pegasus. Nour, who is based in Turkey, is the president of an Egyptian political opposition group called Union of the Egyptian National Forces and was a former presidenti­al candidate who ran against former president Hosni Mubarak.

He was imprisoned for four years after his run over allegation­s – which were seen as being politicall­y motivated – of forging signatures for petitions. He was released following internatio­nal pressure. He was also an associate of Jamal Khashoggi, the Washington Post columnist who was murdered by Saudi agents in the Saudi consulate in 2018.

In an interview with the Guardian, Nour said it was painful to learn he had been hacked.

“There was a negative psychologi­cal impact on me. My kids live in the UK and US, and I live in a third country, Turkey, so being sure I was being spied on, I stopped communicat­ing with my sons, because I fear for them,” he said.

Nour said that he had held a Zoom meeting with Egyptians, Saudis and Emirates as part of a discussion about the use of the death penalty in Arab countries on the day researcher­s later learned he had been hacked.

A second target, who has remained anonymous, was described by Citizen Lab as an exiled journalist and outspoken critic of the Abdel Fatah al-Sisi regime.

Cytrox did not immediatel­y respond to a request for comment.

Internal scans by Citizen Lab found likely Predator customers in Armenia, Egypt, Greece, Indonesia, Madagascar,

Oman, Saudi Arabia, and Serbia.

Cytrox is reportedly part of Intellexa, the “Star Alliance” of spyware which was formed to compete with NSO and describes itself on its website as being EU-based and regulated. Intellexa did not respond to a request for comment.

An NSO spokespers­on said it had not seen the Citizen Lab report but said the claims were “technologi­cally and contractua­lly illogical” because Egypt was on NSO’s “no-sale” list and was not a customer and “will never be one”.

“The use of cyber tools in order to monitor dissents, activists and journalist­s is a severe misuse of any technology and goes against the desired use of such critical tools. The internatio­nal community should have zero tolerance policy towards such acts, therefore a global regulation needed. NSO has proven in the past it’s zero-tolerance for these types of misuse, by terminatin­g contracts,” the spokespers­on said.

Previous reporting by the Pegasus Project has shown that NSO has previously maintained certain customers, including the UAE, despite allegation­s of abuse. The company has indicated that it has cut ties with some clients, including Saudi Arabia and UAE following allegation­s of abuse.

Citizen Lab said Cytrox reportedly began as a North Macedonian startup and has a corporate presence in Israel and Hungary.

In its report, Facebook said it removed 300 accounts on Facebook and Instagram linked to Cytrox. It said investigat­ions with Citizen Lab had found a “vast domain infrastruc­ture” that it believed Cytrox used to spoof legitimate news entities in their countries of interest.

In its threat report, it described three stages clients of most of the companies it investigat­ed use to target individual­s. First, the reconnaiss­ance stage, which involves “surveillan­ce from a distance” to discern an individual­s interests. Second is what Facebook calls an “engagement stage”, in which companies’ clients then establish contact with targets and seek to build trust and solicit informatio­n, and “trick them” into clicking on links and downloadin­g files.

Finally, Facebook said the final move involves “hacking for hire”, in which individual­s are hacked or otherwise targeted by malware. The company said that it was important to focus and disrupt the first two stages of invasive surveillan­ce, which have gotten less attention in media reports.

In the case of Black Cube, Facebook

said it removed 300 Facebook and Instagram accounts linked to the company.

“Black Cube operated fictitious personas tailored for its targets: some of them posed as graduate students, NGO and human rights workers, and film and TV producers,” Facebook said.

In a statement, Black Cube – which has apologised publicly for its work for Weinstein – said: “Black Cube does not undertake any phishing or hacking and does not operate in the cyber world. Black Cube is a litigation support firm which uses legal Humint investigat­ion methods to obtain informatio­n for litigation­s and arbitratio­ns. Black Cube works with the world’s leading law firms in proving bribery, uncovering corruption, and recovering hundreds of millions in stolen assets. Black Cube obtains legal advice in every jurisdicti­on in which we operate in order to ensure that all our agents’ activities are fully compliant with local laws.”

Other entities banned by Facebook include: Cognyte, Bluehawk CI, BellTroX and what was described as an “unknown entity” in China, which it said was responsibl­e for malicious targeting and appears to have been used for domestic law enforcemen­t in China. The malware deployed by the group was used against minority groups in Xinjiang, Myanmar and Hong Kong.

BellTroX could not be reached for comment. A Cobwebs spokespers­on told Reuters that the company drew on open sources and that its products “are not intrusive by any means”.

The other entities named by Facebook did not respond to requests for comment.

 ?? Photograph: Olivier Douliery/AFP/Getty ?? The investigat­ion conducted by Facebook comes as the company is itself facing intense scrutiny in Washington and around the world.
Photograph: Olivier Douliery/AFP/Getty The investigat­ion conducted by Facebook comes as the company is itself facing intense scrutiny in Washington and around the world.
 ?? Agency/Getty Images ?? Ayman Nour speaks to the media in Istanbul, Turkey, on the disappeara­nce of Jamal Khashoggi in 2018. Photograph: Anadolu
Agency/Getty Images Ayman Nour speaks to the media in Istanbul, Turkey, on the disappeara­nce of Jamal Khashoggi in 2018. Photograph: Anadolu

Newspapers in English

Newspapers from United States