t is clear that you have visited the site. This was after Dubai airport security personnel seized her Elatr’s phone. Further analysis by Citizen Labs showed that the site is managed by her NSO group on behalf of the UAE client, the report said. NSO has denied that its spyware was used to target Khashoggi or his associates, including Hanan Elatr, but Citizen Lab’s analysis makes that claim implausible.
A new forensic analysis shows that UAE government officials installed Pegasus spyware on the phone of Hanan Elatr, the wife of murdered journalist Jamal Khashoggi, just months before her husband was killed. increase. The analysis was conducted by Toronto-based privacy and security research institute Citizen Labs on behalf of The Washington Post, which reported its findings on Tuesday. That a forensic investigation of Elatr’s two of her Android smartphones revealed that an unknown individual used one of her smartphones to upload Pegasus spyware to her web site. I
The list included hundreds of other senior government officials, as well as a total of 180 journalists from news outlets such as Bloomberg, Le Monde and El Pais. The list included the phone numbers of French President Emmanuel Macron, South African President Cyril Ramaphosa and Pakistani Prime Minister Imran Khan. The sophistication of NSO’s surveillance exploits was recently revealed in a blog post by Project Zero, Google’s security research group.
The phone number of Elatr and Khashoggi’s Turkish fiancé Hatice Cengiz was also found on a list of 50,000 numbers, revealing a potential target for Pegasus spyware, but only confirming the target number was compromised It will not be. The leak was part of a larger investigation by a coalition of news outlets around the world. Dubbed The Pegasus Project, the investigation uncovered widespread attacks on journalists, activists and politicians, including heads of state.
The US government is beginning to take action against Israeli companies. NSO was recently blacklisted by the US Department of Commerce. This will prevent US companies from providing goods and services to his NSO.
This post details a “zero-click” iMessage exploit that allows you to compromise a target’s cell phone simply by sending an SMS message containing a link, without the target ever opening or reading the message.
As a spyware company, NSO’s activities have long been kept secret. But amid mounting evidence that the company is seeking to support repressive and authoritarian regimes around the world.