John Scott-Railton Profile picture
Sep 13, 2021 6 tweets 5 min read Read on X
🚨 UPDATE YOUR APPLE DEVICES NOW🚨

We caught a zero-click, zero day iMessage exploit used by NSO Group's #Pegasus spyware.

Target? Saudi activist.

We reported the #FORCEDENTRY exploit to @Apple, which just pushed an emergency update.

THREAD 1/
citizenlab.ca/2021/09/forced…
2/ Here's the story of the #FORCEDENTRY exploit:

Back in Mach my colleague @billmarczak was examining the phone of a Saudi activist infected w/#Pegasus spyware. Bill did a backup at the time.

A recent a re-analysis yielded something interesting: weird looking ".gif" files.
3/ Thing is, the ".gif" files...were actually Adobe PSD & PDF files...and exploited Apple’s image rendering library.

Result? Silent exploit via iMessage.

Victim sees *nothing,* meanwhile #Pegasus is silently installed & their device becomes a spy in their pocket.
4/ NSO Group says that their spyware is only for targeting criminals & terrorists.

But here we are... again: their exploits got discovered by us because they were used against an activist.

Thesis: discovery is inevitable byproduct of selling spyware to reckless despots.
5/ #FORCEDENTRY exploit bigger picture:

Popular chat apps are the soft underbelly of device security.

They are on every device, & some have a needlessly large attack surface.

Their security needs to be a *top* priority.
6/Less than a week from notification to patching #FORCEDENTRY.

@Apple can move fast. Great stuff. Herculean effort by teams there.

Company is obviously fed up with NSO & the mercenary spyware industry. Like Google, Facebook, and the rest of the legit tech industry.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Mar 19
🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy...

Known targets: Activists & journalists.

We also found deployments around the world. Including ...Canada?

And a lot more... Thread on our @citizenlab investigation 1/Image
Image
2/ So #Paragon makes zero-click spyware marketed as better than NSO's Pegasus...

Harder to find...

...And more ethical too!

This caught our attention @citizenlab & we were skeptical.

By @iblametom forbes.com/sites/thomasbr…Image
Image
Image
3/ We got a tip about a single bit of #Paragon infrastructure & my brilliant colleague @billmarczak developed a technique to fingerprint some of the mercenary spyware infrastructure (both victim-facing & customer side) globally.

So much for invisibility.

What we found startled us.

citizenlab.ca/2025/03/a-firs…Image
Image
Image
Image
Read 18 tweets
Feb 6
BREAKING: #Paragon reportedly terminates spyware contract with #Italy.

Right on heels of reported targeting of journalist & activists in Italy.

BIG DEAL: puts Italian government in the hot seat, since they denied knowing about it only hours ago.👇
Image
2/ Read this slowly.

The implication is clear: the Italian government was a #Paragon customer & had their contract terminated...

Even as @GiorgiaMeloni's office was issuing denials.

Likely to make the scandal worse.

Exceptional reporting from The Guardian
theguardian.com/technology/202…Image
Image
3/ Big picture:

#Paragon's carefully constructed image of being a clean mercenary spyware company that wasn't susceptible to abuses has been replaced by a more familiar tale of...

Abuses...

And #Italy is now saddled with an unfolding crisis around spyware abuse.
Read 7 tweets
Feb 1
NEW: @WhatsApp says Israeli mercenary spyware company #Paragon targeted scores of users around world.

The infection happened with no interaction. No link to click or attachment to open.

This is called a "zero-click" attack.

WA says targets included journalists & members of civil society.

They dismantled the attack vector & notified users.

Good.

We at @citizenlab shared some info instrumental to their investigation of the vector.

This is a BIG deal. Here's why 1/Image
Image
Image
Image
2/ For a few years the only source of information about #Paragon... has been Paragon.

They marketed themselves as the anti-NSO.

(NSO makes the notorious #Pegasus spyware)

It's easier to frame yourself as virtuous in the spyware game if nobody can look over your shoulder.

By @iblametom
forbes.com/sites/thomasbr…

By @RonanFarrow
newyorker.com/magazine/2022/…Image
Image
Image
Image
3/ Late last year, partly on the strength of their promised virtue #Paragon seemed closer than ever to landing the industrys juiciest of prices.

Market access into the USA.

This is the goal of a lot of spyware companies & their investors...

At the time, there simply were no pesky reports on Paragon that showed anything might be other than rosy.

Story @criticalvas
wired.com/story/ice-para…Image
Read 12 tweets
Jan 23
NEW: US seeks extradition of Israeli private spy over sprawling hacking against 🇺🇸American nonprofits.

Amit Forlit's alleged customer? US lobbying firm @DCIGroup... representing @exxonmobil

Extradition filings in UK give fresh peek into this wild case 1/Image
Image
Image
Image
2/ The case was triggered back in 2018, when US-based nonprofits targeted by hackers requested that @citizenlab notify the authorities.

In 2020, we went public with the investigation, alongside @jc_stubbs @razhael & @Bing_Chris 👇

3/ Fast forward to today's efforts to extradite Amit Forlit, who was arrested at Heathrow last year.

He's actually the second Israeli private investigator charged in this massive hacking scheme targeting Americans.

The first, Aviram Azari, was arrested in 2019, convicted & is serving out his sentence.

justice.gov/usao-sdny/pr/i…Image
Image
Image
Read 7 tweets
Dec 23, 2024
The volume of scam phone calls targeting elderly people in the US is insane.

Anyone that has visited an aging person knows what I'm talking about.

Ring after ring.

Several calls a day isn't out of the ordinary each of them a risk of wiping out their savings.

It's an untenable situation and will only get worse without focused government action.
Phone predators constantly target your parents.

Foreign scam call centers are running on an industrial scale.

Efforts phone companies are making are obviously not up to the task.

Just ask any retired person you know when they last got a scam call.
The constant phone scamming of elderly Americans is like an opportunistic infection.

It is a symptom showing that the US phone system's defenses against foreign abuses are diminished.

With increasingly clever AI/ deepfake voices & automation, the problem is set to get worse.
Read 4 tweets
Dec 23, 2024
VPN advertising is the most common source of security misinformation that I encounter.

By far.

So many people misplace their trust in dubious consumer VPN products.

The industry is a scourge.
VPNs don't do most of the things that podcasters imply they do.

Security:
Coffee shop attacks on unencrypted logins are a thing of a decade ago.

VPNs won't stop even the dumbest spyware & phishing.

Privacy:
Advertisers still know it's you when you turn on a VPN... they use many other identifying signals from your device, like your browser & advertising IDs. Those don't change when you turn on a VPN.
Trust:
A lot of VPN companies are shady.... and the industry is consolidating fast around some questionable players with concerning histories.

When you turn on a VPN you entrust all of your data to those companies.
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(