{"id":189976,"date":"2021-07-26T12:02:01","date_gmt":"2021-07-26T11:02:01","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=189976"},"modified":"2021-07-24T04:29:25","modified_gmt":"2021-07-24T03:29:25","slug":"forensic-methodology-report-how-to-catch-nso-groups-pegasus","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/","title":{"rendered":"Forensic Methodology Report: How to Catch NSO Group\u2019s Pegasus"},"content":{"rendered":"<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-189977\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack-1024x435.jpg\" alt=\"\" width=\"700\" height=\"297\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack-1024x435.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack-300x127.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack-768x326.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/pegasus-trap-activism-israel-spy-surveillance-cellphone-cyberattack.jpg 1472w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>Introduction<\/strong><\/p>\n<div class=\"wysiwyg\">\n<p><em>18 Jul 2021 &#8211;<\/em> NSO Group claims that its Pegasus spyware is only used to <a href=\"https:\/\/www.nsogroup.com\/\"  target=\"_blank\" rel=\"noopener\" data-ga=\"event,Outgoing links,Click,external\">\u201cinvestigate terrorism and crime\u201d<\/a> \u00a0and <a href=\"https:\/\/www.documentcloud.org\/documents\/4599753-NSO-Pegasus.html\"  target=\"_blank\" rel=\"noopener\" data-ga=\"event,Outgoing links,Click,external\">\u201cleaves no traces whatsoever\u201d<\/a>. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project, a collaborative investigation that involves more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories with technical support of Amnesty International\u2019s Security Lab.<a target=\"_blank\" href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/#_ftn1\"  name=\"_ftnref1\">[1]<\/a><\/p>\n<p>Amnesty International\u2019s Security Lab has performed in-depth forensic analysis of numerous mobile devices from human rights defenders (HRDs) and journalists around the world. This research has uncovered widespread, persistent and ongoing unlawful surveillance and human rights abuses perpetrated using NSO Group\u2019s Pegasus spyware.<\/p>\n<p>As laid out in the UN Guiding Principles on Business and Human Rights, NSO Group should urgently take pro-active steps to ensure that it does not cause or contribute to human rights abuses within its global operations, and to respond to any human rights abuses when they do occur. In order to meet that responsibility, NSO Group must carry out adequate human rights due diligence and take steps to ensure that HRDs and journalists do not continue to become targets of unlawful surveillance.<\/p>\n<p>In this Forensic Methodology Report, Amnesty International is sharing its methodology and publishing an open-source mobile forensics tool and detailed technical indicators, in order to assist information security researchers and civil society with detecting and responding to these serious threats.<\/p>\n<p>This report documents the forensic traces left on iOS and Android devices following targeting with the Pegasus spyware. This includes forensic records linking recent Pegasus infections back to the 2016 Pegasus payload used to target the HRD Ahmed Mansoor.<\/p>\n<p>The Pegasus attacks detailed in this report and accompanying appendices are from 2014 up to as recently as July 2021. These also include so-called \u201czero-click\u201d attacks which do not require any interaction from the target. Zero-click attacks have been observed since May 2018 and continue until now. Most recently, a successful \u201czero-click\u201d attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July 2021.<\/p>\n<p>Sections 1 to 8 of this report outline the forensic traces left on mobile devices following a Pegasus infection. This evidence has been collected from the phones of HRDs and journalists in multiple countries.<\/p>\n<p>Finally, in section 9 the report documents the evolution of the Pegasus network infrastructure since 2016. NSO Group has redesigned their attack infrastructure by employing multiple layers of domains and servers. Repeated operational security mistakes have allowed the Amnesty\u00a0International Security Lab to maintain continued visibility into this infrastructure. We are publishing a set of 700 Pegasus-related domains.<\/p>\n<p>Names of several of the civil society targets in the report have been anonymized for safety and security reasons. Individuals who have been anonymized have been assigned an alphanumeric code name in this report.<\/p>\n<h2>1. Discovering Pegasus network injection attacks<\/h2>\n<p>Amnesty International\u2019s technical investigation into NSO Group\u2019s Pegasus intensified following our discovery of <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/08\/amnesty-international-among-targets-of-nso-powered-campaign\/\"  target=\"_blank\" rel=\"noopener\">the targeting of an Amnesty International staffer and a Saudi activist,<\/a> Yahya Assiri, in 2018. Amnesty International\u2019s Security Lab began refining its forensics methodology through the discovery of <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2019\/10\/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware\/\"  target=\"_blank\" rel=\"noopener\">attacks against HRDs in Morocco in 2019<\/a>, which were further corroborated by <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2020\/06\/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools\/\"  target=\"_blank\" rel=\"noopener\">attacks we discovered against a Moroccan journalist in 2020<\/a>. In this first section we detail the process which led to the discovery of these compromises.<\/p>\n<p>Numerous public reports had identified NSO Group\u2019s customers using SMS messages with Pegasus exploit domains over the years. As a result, similar messages emerged from our analysis of the phone of Moroccan activist Maati Monjib, who was one of the activists targeted as documented in Amnesty International\u2019s <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2019\/10\/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware\/\"  target=\"_blank\" rel=\"noopener\">2019 report<\/a>.<\/p>\n<p>However, on further analysis we also noticed suspicious redirects recorded in Safari\u2019s browsing history. For example, in one case we noticed a redirect to an odd-looking URL after Maati Monjib attempted to visit Yahoo:<\/p>\n<table border=\"0\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"77\"><strong>Visit ID<\/strong><\/td>\n<td width=\"107\"><strong>Date (UTC)<\/strong><\/td>\n<td width=\"203\"><strong>URL<\/strong><\/td>\n<td width=\"104\"><strong>Redirect Source<\/strong><\/td>\n<td width=\"132\"><strong>Redirect Destination<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"77\">16119<\/td>\n<td width=\"107\">2019-07-22 17:42:32.475<\/td>\n<td width=\"203\">http:\/\/yahoo.fr\/<\/td>\n<td width=\"104\">null<\/td>\n<td width=\"132\">16120<\/td>\n<\/tr>\n<tr>\n<td width=\"77\">16120<\/td>\n<td width=\"107\">2019-07-22 17:42:32.478<\/td>\n<td width=\"203\">https:\/\/bun54l2b67.get1tn0w.<strong>free247downloads[.]com<\/strong>:30495\/szev4hz<\/td>\n<td width=\"104\">16119<\/td>\n<td width=\"132\">null<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>(<strong>Please note<\/strong>: throughout this document we escaped malicious domains with the marking <em>[.]<\/em> to prevent accidental clicks and visits.)<\/p>\n<p>The URL <strong>https:\/\/bun54l2b67.get1tn0w.free247downloads[.]com:30495\/szev4hz<\/strong> immediately appeared suspicious, particularly because of the presence of a 4th level subdomain, a non-standard high port number, and a random URI similar to links contained in SMS messages previously documented in connection to NSO Group\u2019s Pegasus. As you can see in the table above, the visit to Yahoo was immediately redirected to this suspicious URL with database ID 16120.<\/p>\n<p>In our <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2019\/10\/morocco-human-rights-defenders-targeted-with-nso-groups-spyware\/\"  target=\"_blank\" rel=\"noopener\">October 2019 <\/a>report, we detail how we determined these redirections to be the result of network injection attacks performed either through tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator. When months later we analysed the iPhone of Moroccan independent journalist Omar Radi, who as documented in our 2020 report was targeted, we found similar records involving the <strong>free247downloads[.]com<\/strong> domain as well.<\/p>\n<p>In November 2019, after Amnesty International\u2019s initial report, a new domain <strong>urlpush[.]net<\/strong> was registered. We found it subsequently involved in similar redirects to the URL <strong>https:\/\/gnyjv1xltx.info8fvhgl3.urlpush[.]net:30875\/zrnv5revj.<\/strong><\/p>\n<p>Although Safari history records are typically short lived and are lost after a few months (as well as potentially intentionally purged by malware), we have been able to nevertheless find NSO Group\u2019s infection domains in other databases of Omar Radi\u2019s phone that did not appear in Safari\u2019s History. For example, we could identify visits through Safari\u2019s <strong>Favicon.db <\/strong>database, which was left intact by Pegasus:<\/p>\n<h3 style=\"text-align: center;\"><a target=\"_blank\" href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/\" >TO CONTINUE READING THE REPORT Go to Original &#8211; amnesty.org<\/a><\/h3>\n<p>___________________________________<\/p>\n<\/div>\n<div class=\"container--full-bleed\">\n<section class=\"further-reading\">\n<p class=\"further-reading__heading \"><em>Further reading:<\/em><\/p>\n<ul class=\"further-reading__links\">\n<li class=\"further-reading-links__item\"><em><a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2021\/07\/investigation-maps-human-rights-harm-of-nso-group-spyware\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"> New investigation shows global human rights harm of NSO Group\u2019s spyware <\/a><\/em><\/li>\n<li class=\"further-reading-links__item\"><em><a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/08\/amnesty-international-among-targets-of-nso-powered-campaign\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"> Amnesty International Among Targets of NSO-powered Campaign <\/a><\/em><\/li>\n<li class=\"further-reading-links__item\"><em><a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2019\/10\/morocco-human-rights-defenders-targeted-with-nso-groups-spyware\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"> Morocco: Human Rights Defenders Targeted with NSO Group\u2019s Spyware <\/a><\/em><\/li>\n<li class=\"further-reading-links__item\"><em><a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2020\/06\/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"> Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group\u2019s Tools <\/a><\/em><\/li>\n<li class=\"further-reading-links__item\"><em><a href=\"https:\/\/www.amnesty.org\/en\/documents\/doc10\/4182\/2021\/en\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"> Operating from the Shadows: Inside NSO Group&#8217;s Corporate Structure <\/a><\/em><\/li>\n<li class=\"further-reading-links__item\"><a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2021\/07\/nso-group-new-transparency-report-another-missed-opportunity\/\" class=\"further-reading-link further-reading-link--onward\"  target=\"_blank\" rel=\"noopener\"><em> NSO Group\u2019s new transparency report is \u201canother missed opportunity\u201d<\/em> <\/a><\/li>\n<\/ul>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>18 Jul 2021 &#8211; NSO Group claims that its Pegasus spyware is only used to \u201cinvestigate terrorism and crime\u201d  and \u201cleaves no traces whatsoever\u201d. This Forensic Methodology Report shows that neither of these statements is true. Amnesty International\u2019s Security Lab has performed in-depth forensic analysis of numerous mobile devices from human rights defenders and journalists around the world. This research has uncovered widespread, persistent and ongoing unlawful surveillance and human rights abuses perpetrated using NSO Group\u2019s Pegasus spyware.<\/p>\n","protected":false},"author":4,"featured_media":189977,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[910,1082,958,2607,1017,125,88,378,234,2608,2606,1220,1277,1109,911],"class_list":["post-189976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-special-feature","tag-big-brother","tag-cellphones","tag-control","tag-forbidden-stories","tag-freedom-of-information","tag-freedom-of-the-press","tag-israel","tag-journalism","tag-media","tag-nso","tag-pegasus-project","tag-privacy","tag-privacy-rights","tag-spying","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/189976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=189976"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/189976\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/189977"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=189976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=189976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=189976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}