🚨BIG @citizenlab report on an NSO Group hacking bonanza. In late 2019 and in July 2020, NSO Group clients appear to have used an invisible 0-click exploit in iMessage to break into the latest, up-to-date iPhones. Some of the first target were journalists citizenlab.ca/2020/12/the-gr…
At least 36 personal phones belonging to journalists, producers, executives, and presenters at Al Jazeera, and one journalist at Al Araby, were hacked in July by four operators, two of which we attribute to the UAE and Saudi. One journalist hacked was @AJArabic's @TamerMisshal.
Tamer's hard-hitting investigative programs have focused on possible UAE Gov linked financial corruption (), the Khashoggi killing (), and Bahrain's alleged hiring of Al Qaeda to kill opposition members ().
So how did the hackers get into Tamer's phone? The first stage appears to have involved an exploit transmitted through Apple's servers. Then, his phone connected to an "Installation server" to download the spyware, and finally sent his personal data back to the spyware operators
London-based journalist Rania Dridi at @AlarabyTV was hacked using the same method, and was hacked at least *SIX TIMES* since October 2019. She's one of the anchors of the "شبابيك" program on Al Araby that sometimes discusses controversial issues.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
We've got a neat new @citizenlab report out, looking at NSO Group affiliate company Circles, the we-spy-without-hacking-your-phone guys, who reportedly exploit flaws in mobile phone networks themselves. We ID'd a bunch of likely customers! citizenlab.ca/2020/12/runnin…
The essence of the report is simple. The firewalls of Circles systems are configured using a management server with the domain name "tracksystem[.]info." Thanks to some leaked documents filed in a lawsuit in Israel, we can see that this domain name is used by Circles for email
There's some dodgy customers, including spyware abuser UAE (apparently UAE Supreme Council for National Security, Sh. Tahnoon's Royal Group, and Dubai Police). The Royal group case is interesting, because there also seems to be a nexus with Mohammed Dahlan.
Uh oh. It looks like the US state of Nevada has partnered with a UAE intelligence-linked company (Group 42) on COVID19 testing. It seems that Group 42 will get access to test data from US Citizens, which they will use for an "innovative genomic study." nvc19.org/united-arab-em…
A little background on Group 42: they were the ones behind the ToTok chat app. ToTok was banned from both the Apple Store and the Google Play Store after US intelligence sources told the New York Times that ToTok was a front for UAE intelligence. nytimes.com/2019/12/22/us/…
Also, ToTok (formerly "Group 42 IM") is linked to Sheikh Tahnoon bin Zayed al-Nahyan, a senior UAE intelligence official. Sheikh Tahnoon's adopted son and PR manager were both apparently directors & investors of holding companies linked to ToTok medium.com/@billmarczak/h…