Ask these Cybersecurity firms, which are the main and leading in their field, to help to identify the hackers: was it the NSO Group, and who was behind them? - 8:40 AM 8/19/2019
Annoncement:
Persons and entities affected by the Telegramgate:
Ask these Cybersecurity firms, which are the main and leading in their field, to help to identify the hackers: was it the NSO Group, and who was behind them?
If Pegasus software was sold to Venezuela (or Cuba, its main ally), would they be able to operate it directly and independently, to produce these hacks?
What are the details, what else was involved?
__________________________________________________________________
I sent these tweets to them:
Dear Sirs: Please help to identify the hackers, and shed the light on the related issues in the case of Telegramgate, or hacking of the private conversations of Ricardo Rossello, the former Governor of Puerto Rico.
Thank you very much.
Michael Novakhov
8.19.19
____________________________________
Links
The firm wrote in the New York Times, “The company sells only to authorized governmental agencies, and fully complies with strict export control laws and regulations.”
The spokesperson said that its customers use its software lawfully. However, Bill Marczak, a researcher at Citizen Lab did not concur. He said that the targeting of activists and dissidents “is a taste of what’s to come,” adding that “what they’re facing today will be faced by ordinary users tomorrow.”
As the largest alternative investment firm in the world, Blackstone Group specializes in private equity, credit and hedge fund investment strategies. Its private equity business has been one of the largest investors in leveraged buyout transactions over the last decade.
__________________________________________________________
Wikipedia
NSO Group Technologies is an Israeli technology firm focused on cyber intelligence. It was founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio.[2][3][4] It reportedly employs around 500 people and is based in Herzliya, near Tel Aviv.[1][5][6]
Annual revenues were said to be around $40 million in 2013 and $150 million in 2015.[2][7] In June 2017, the company was put up for sale for $1 billion by Francisco Partners Management.[5] Founders Lavie and Hulio, partnering with European private equity fund Novalpina Capital, purchased a majority stake in NSO in February 2019.[8]
According to the company, NSO provides "authorized governments with technology that helps them combat terror and crime".[9] There are claims that software created by NSO Group was used in targeted attacks against human rights activists and journalists in several countries.[10]
Technologies[edit]
Pegasus[edit]
On August 25, 2016, Citizen Lab and Lookout revealed that software known as Pegasus, created by NSO, was being used to target human rights activist Ahmed Mansoor in the United Arab Emirates.[20]Mansoor informed Citizen Lab researchers Bill Marczak and John Scott-Railton that his iPhone 6 had been targeted on August 10, 2016, by means of a clickable link in an SMS text message.[9][21]
Analysis by Citizen Lab and Lookout discovered that the link downloaded software to exploit three previously unknown and unpatched zero-day vulnerabilities in iOS.[22][23] According to their analysis, the software can jailbreak an iPhone when a malicious URL is opened, a form of attack known as spear phishing. The software installs itself and collects all communications and locations of targeted iPhones, including communications sent through iMessage, Gmail, Viber, Facebook, WhatsApp, Telegram and Skype. The software can also collect Wi-Fi passwords.[9] The researchers noticed that the software's code referenced an NSO Group product called "Pegasus" in leaked marketing materials.[6] Pegasus had previously come to light in a leak of records from Hacking Team, which indicated the software had been supplied to the government of Panama in 2015.[12] The researchers claim that Mexican journalist Rafael Cabrera had also been targeted, and that the software could have been used in Israel, Turkey, Thailand, Qatar, Kenya, Uzbekistan, Mozambique, Morocco, Yemen, Hungary, Saudi Arabia, Nigeria, and Bahrain.[9]
Citizen Lab and Lookout notified Apple's security team, which patched the flaws within ten days and released an update for iOS.[24] A patch for macOS was released six days later.[25]
In 2017, Citiz
____________________________________________________________________
____________________________________________________________________
Comments
Post a Comment