John Scott-Railton Profile picture
Apr 18, 2022 16 tweets 15 min read Read on X
🚨MAJOR NEW INVESTIGATION: #CatalanGate state-run hacking operation.

Stunning range of #Pegasus & #Candiru infections in the EU.

Many political & civil society targets got infected. Multiple 🇪🇺 MEPs.

THREAD 1/
catalonia.citizenlab.ca
2/ A jaw dropping list of people were targeted in #CatalanGate

Let's take the 🇪🇺 European Parliament.

*Every pro-independence MEP* was targeted directly or w/relational targeting:

-@toni_comin
-@DianaRibaGiner
-@jordisolef
-@ClaraPonsati
-@KRLS
3/ Catalan civil society was extensively targeted.

From the leadership of major civic organizations like @omnium & @assemblea_int...to open source developers working on digital voting.

Mostly #Pegasus, but #Candiru spyware, too.

Link: citizenlab.ca/2022/04/catala…
4/ So many Catalan politicians were targeted with #Pegasus between 2017-2020.

Like every current/former President of Catalonia since 2010.

Catalan's Parliamentary leadership, legislators, etc. etc. #CatalanGate
5/The #Pegasus hacking was via a mix of zero-click vulnerabilities & SMS infection attempts.

Texts were *very* well informed.

Like this one: @jbaylina was sent a mobile boarding pass link...for a @FlySWISS flight he'd booked.
6/ WILD: while doing #Pegasus forensics, at the 11th hour on this project, @billmarczak actually discovered another NSO iOS Zero-Click 0day!

We call it #Homage

We think it stopped working by 13.2 so if you are updated, you're likely OK.

We notified @apple.
7/ The #Candiru targeting that we saw was via email. Again, often super personalized.

They impersonated official COVID communications from Spanish gov, notifications from biz registries, etc.

Sometimes Candiru & #Pegasus targeting themes overlapped.
8/ Craziest story? Victim working on a live #Candiru infected computer had to be persuaded to step into the hallway using a ruse so we could explain the situation away from it's microphones...

Material was shared w/@MsftSecIntel which led to 1.4 billion devices getting patched.
9/ The folks at @AmnestyTech conducted an independent validation of our forensic methods on a selection of cases.
10/ Which government is behind #CatalanGate? Well, we aren't conclusively attributing to a specific government...

But substantial circumstantial evidence suggests a nexus with the Government of Spain.
11/ Big picture: people think the problem with mercenary spyware is that it gets sold to dictators. Who abuse it. True.

Turns out that when democracies acquire it, risk of abuse is dangerously high.

It's abundantly clear that this is now a major problem in the #EU.
12/ EU MEPs have begun weighing in👇

🇪🇺 EU Parliament's new committee on Pegasus spyware has first meeting tomorrow.

Sure to be interesting.
13/ Investigations like this are group effort, huge credit to my coauthors @elies @billmarczak @insyria @sienaanstis @gozdebocu @SalSolimano & @RonDeibert

With help from Miles Kenyon @rizhouto @adamsenft
& so many others.
citizenlab.ca/2022/04/catala…
14/ Cases like this cannot come to light without the many victims & organizations that graciously consent to participating in our research, and chose to come forward & be named.

Without them, this report would not have been possible.
15/ Special acknowledgement to the team @domesticstream who helped us do the amazing graphical companion to our report.

They do great work, give them a follow!

catalonia.citizenlab.ca
16/ 16/ Nice thread by David Kaye, former UN Special Rapporteur, talking about *solutions* to the mercenary spyware problem.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Jun 6
NEW: Italy admits hacking activists with #Paragon spyware.

Blow to the reputation of a mercenary spyware company that marketed itself as an ethically clean anti-NSO.

But the official investigation doesn't answer a big mystery that's bad for #Italy & Paragon 1/..

By @omerbenjImage
2/ While Italy confirms the activist cases, they deny doing the politically explosive one:

Journalist & @fanpage editor Francesco Cancellato, whose reporting has tangled with the Prime Minister.

So who pointed Paragon against @fcancellato?

None of the answers are good... Image
3/ If we take the Italian government's claims to not know who targeted Italian journalist @fcancellato at face value...

Then it is a very bad look for #Paragon to have this case unexplained.

Who pointed their Graphite spyware at this European journalist?Image
Read 6 tweets
May 20
NEW: Pegasus spyware maker NSO Group just got publicly rebuffed by the US.

They came to DC to get off the US blacklist.

It did not work out. Thanks to their own actions.

You know about the human rights issues, but let me tell you why NSO is no friend to the United States. 1/ Image
2/ First, it's important to know that NSO was shady in how they set up the meeting.

For close observers, this is no surprise.

NSO constantly thinks that they can play the United States.

Part of what got them in trouble in the first place, but let's go deeper.Image
3/ First, NSO has consistently helped foreign governments target the US government.

And hack regular US citizens.

The first cases date back a decade to when the president of Panama used it to monitor the US embassy (and his mistress).

A decade later it was still happening...Image
Read 15 tweets
May 6
BREAKING: jury awards massive $167 million in punitive damages against spyware company NSO Group.

Precedent-setting win against the notorious #Pegasus spyware maker.

Congratulations to @WhatsApp on sticking this case through since 2019. Some thoughts 1/
2/ After years of every trick & delay tactic it only took a California jury one days deliberation to the heart of the matter:

NSO makes millions hacking mostly-🇺🇸American tech companies... so that dictators can hack dissidents.

Their conduct deserved to be punished.
3/ NSO Group emerges from the trial severely damaged.

The verdict ($167,256,000 punitive, $440K+ compensatory) is big enough to make your eyes water.

The case is ALSO a huge blow to NSO's secrecy, with their business splashed all over a courtroom.

This will scare customers...
Read 14 tweets
May 1
Friends don't let friends get their eyeballs scanned to buy a coffee.

Sam Altman's Orwellian "Tools for Humanity" says this dystopia machine could help distinguish between #AI agents & humans... or verify at Point of Sale..or..?

Looks to me like a big biometric data grab 1/ Image
2/ Surely they didn't just start with the idea of invasively harvesting eyeball scans...and then look around for potential justifications.

And then add in some AI hype.

Right? Image
3/ Throwback to Tools for Humanity's previous (but non-portable, guys!) eye-scanning thing: WorldCoin.

Remember that? A global biometric data grab rife with documented exploitation in Africa & Latin America.

Still not clear what real value it delivered to the ppl who gave up their biometrics.Image
Image
Image
Read 4 tweets
Apr 28
Fear is dictatorship glue.

You can't imprison everyone with a dissenting thought.

Or inconvenient factual observation.

But fear teaches self censorship. It's a scalable system of control.

The autocrat's challenge is to keep the fear going. 1/ A detention center’s interrogation rooms — Untersuchungshaftanstalt Hohenschönhausen, Vernehmungstrakt (2004) (© Daniel & Geo Fuchs) Image source: https://hyperallergic.com/151019/mundane-horror-in-abandoned-stasi-spaces/
2/ In the 20th century, keeping fear alive required massive human investment.

Informants... archives...exemplary punishments... information control.

Looked like a linear scale.

A post-cold war school of thought said: once everyone is connected, these systems won't work. Hohenschönhausen investigation prison: monitoring room Daniel & Geo Fuchs  Via https://www.ibtimes.co.uk/stasi-secret-rooms-communist-east-germanys-eerie-interrogation-cells-haunted-prisons-1467734
BStU Zentralarchiv Berlin archives (2004) (© Daniel & Geo Fuchs)  URL: https://hyperallergic.com/151019/mundane-horror-in-abandoned-stasi-spaces/
"There are several images of staged Stasi arrests carried out for training purposes. Dissidents, in some case already serving long prison terms, were sometimes made to re-enact their own arrest for the camera.  " Simon Menner BSTU Source: https://www.bbc.com/news/world-europe-23986385
3/ But tech isn't, by nature, a dictatorship antidote.

It can be an expedient.

Just ask China.

In 20 years the CCP empirically developed technologies & private sector partnerships for scaling fear and self censorship to >1.4 billion ppl.

Log scale. A display shows surveillance technology capable of analyzing body motion for specific actions like fighting, theft or fall during Security China 2018 in Beijing, China, Tuesday, Oct. 23, 2018.  Photo/Ng Han Guan
Surveillance cameras are mounted on a post at Tiananmen Square as snow falls in Beijing, China, on Thursday, Feb. 14, 2019. Qilai Shen  https://www.cnbc.com/2021/01/15/huawei-ai-firms-filed-to-patent-tech-that-could-identify-uighurs-report-says.html
Read 6 tweets
Mar 19
🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy...

Known targets: Activists & journalists.

We also found deployments around the world. Including ...Canada?

And a lot more... Thread on our @citizenlab investigation 1/Image
Image
2/ So #Paragon makes zero-click spyware marketed as better than NSO's Pegasus...

Harder to find...

...And more ethical too!

This caught our attention @citizenlab & we were skeptical.

By @iblametom forbes.com/sites/thomasbr…Image
Image
Image
3/ We got a tip about a single bit of #Paragon infrastructure & my brilliant colleague @billmarczak developed a technique to fingerprint some of the mercenary spyware infrastructure (both victim-facing & customer side) globally.

So much for invisibility.

What we found startled us.

citizenlab.ca/2025/03/a-firs…Image
Image
Image
Image
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(