John Scott-Railton Profile picture
Apr 18, 2022 16 tweets 15 min read Read on X
🚨MAJOR NEW INVESTIGATION: #CatalanGate state-run hacking operation.

Stunning range of #Pegasus & #Candiru infections in the EU.

Many political & civil society targets got infected. Multiple 🇪🇺 MEPs.

THREAD 1/
catalonia.citizenlab.ca
2/ A jaw dropping list of people were targeted in #CatalanGate

Let's take the 🇪🇺 European Parliament.

*Every pro-independence MEP* was targeted directly or w/relational targeting:

-@toni_comin
-@DianaRibaGiner
-@jordisolef
-@ClaraPonsati
-@KRLS
3/ Catalan civil society was extensively targeted.

From the leadership of major civic organizations like @omnium & @assemblea_int...to open source developers working on digital voting.

Mostly #Pegasus, but #Candiru spyware, too.

Link: citizenlab.ca/2022/04/catala…
4/ So many Catalan politicians were targeted with #Pegasus between 2017-2020.

Like every current/former President of Catalonia since 2010.

Catalan's Parliamentary leadership, legislators, etc. etc. #CatalanGate
5/The #Pegasus hacking was via a mix of zero-click vulnerabilities & SMS infection attempts.

Texts were *very* well informed.

Like this one: @jbaylina was sent a mobile boarding pass link...for a @FlySWISS flight he'd booked.
6/ WILD: while doing #Pegasus forensics, at the 11th hour on this project, @billmarczak actually discovered another NSO iOS Zero-Click 0day!

We call it #Homage

We think it stopped working by 13.2 so if you are updated, you're likely OK.

We notified @apple.
7/ The #Candiru targeting that we saw was via email. Again, often super personalized.

They impersonated official COVID communications from Spanish gov, notifications from biz registries, etc.

Sometimes Candiru & #Pegasus targeting themes overlapped.
8/ Craziest story? Victim working on a live #Candiru infected computer had to be persuaded to step into the hallway using a ruse so we could explain the situation away from it's microphones...

Material was shared w/@MsftSecIntel which led to 1.4 billion devices getting patched.
9/ The folks at @AmnestyTech conducted an independent validation of our forensic methods on a selection of cases.
10/ Which government is behind #CatalanGate? Well, we aren't conclusively attributing to a specific government...

But substantial circumstantial evidence suggests a nexus with the Government of Spain.
11/ Big picture: people think the problem with mercenary spyware is that it gets sold to dictators. Who abuse it. True.

Turns out that when democracies acquire it, risk of abuse is dangerously high.

It's abundantly clear that this is now a major problem in the #EU.
12/ EU MEPs have begun weighing in👇

🇪🇺 EU Parliament's new committee on Pegasus spyware has first meeting tomorrow.

Sure to be interesting.
13/ Investigations like this are group effort, huge credit to my coauthors @elies @billmarczak @insyria @sienaanstis @gozdebocu @SalSolimano & @RonDeibert

With help from Miles Kenyon @rizhouto @adamsenft
& so many others.
citizenlab.ca/2022/04/catala…
14/ Cases like this cannot come to light without the many victims & organizations that graciously consent to participating in our research, and chose to come forward & be named.

Without them, this report would not have been possible.
15/ Special acknowledgement to the team @domesticstream who helped us do the amazing graphical companion to our report.

They do great work, give them a follow!

catalonia.citizenlab.ca
16/ 16/ Nice thread by David Kaye, former UN Special Rapporteur, talking about *solutions* to the mercenary spyware problem.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Aug 20
WHOA: megapublisher @axelspringer is asking a German court to ban an ad-blocker.

Their claim that should make everyone nervous:

The HTML/ CSS code of websites are protected computer programs.

And influencing they are displayed (e.g by removing ads) violates copyright.

1/Image
2/ Preventing ad-blocking would be a huge blow to German cybersecurity and privacy.

There are critical security & privacy reasons to influence how a websites code gets displayed.

Like stripping out dangerous code & malvertising.

Or blocking unwanted trackers.

This is why most governments do it on their systems.Image
3/Defining HTML/CSS as a protected computer program will quickly lead to absurdities touching every corner of the internet.

Just think of the potential infringements:

-Screen readers for the blind
-'Dark mode' bowser extensions
-Displaying snippets of code in a university class
-Inspecting & modifying code in your own browser
-Website translators
Read 7 tweets
Jul 10
NEW: Mexico's former president under investigation for taking bribes from spyware industry.

Contracts included #Pegasus deal.

Story from @TheRecord_Media's Suzanne Smalley 1/Image
Image
Image
2/ Mexico's former president is denying everything...

But folks may recall that Pegasus was massively and systematically abused in Mexico.

Against journalists, spouses of cartel victims, lawyers, families of cartel-disappeared people, anti-corruption groups etc. etc.

There were so many cases that we eventually had EIGHT investigative reports...
therecord.media/former-mexican…Image
3/ What still gives me chills is how many cases surfaced of people killed by cartels... or their family members... getting targeted with Pegasus spyware.

The #PegasusProject found even more potential cases in Mexico. Image
Image
Image
Image
Read 5 tweets
Jun 18
🚨NEW REPORT: exposing a new hacking tactic.

🇷🇺Russian state-backed hackers used an App-Specific Password attack against prominent Russia expert @KeirGiles & others.

It's like they know what we all expect from them...and then did the opposite 1/

By us @citizenlab & @google's GTIGImage
Image
Image
2/ Let's begin: @KeirGiles gets a message purporting to be from @StateDept asking for a consultation.

The attackers send the message from a @gmail, but CC'd a bunch of email addresses @ state.gov.

Strong credibility signal to have a bunch of gov ppl on the CC line right?

Well, what the attackers were counting on is that the State Dept mailserver just accepts all email addresses without emitting a bounce.

So they seem to have just created some fake State Dept staff names and addresses.Image
3/ The attackers wait for the 2nd interaction to introduce the pivotal deception: getting @KeirGiles to 'connect to a secure platform.'

In the next days they patiently walk him through what they want him to do, even sending a very official looking (but fake) State Dept. documentImage
Image
Read 10 tweets
Jun 12
🚨NEW INVESTIGATION: We just forensically unmasked #Paragon's Apple spyware.

Zero-click targets: Journalists. In 🇪🇺Europe.

Like 🇮🇹Italian reporter @ciropellegrino.

Reopen's #Italy's spyware scandal.

Follows our @citizenlab investigation of their Android spyware. 1/ Image
2/ Back in April, @Apple sent out a threat notification to a select group of users. Some got in touch with us @citizenlab to get analyzed.

They'd been targeted with a sophisticated zero-click attack (think: no click, no attachment to open, no mistake needed...).Image
3/ While my brilliant colleague @billmarczak was working on the phone of a prominent European journalist, he made a smoking gun discovery:

Requests to server matching our P1 fingerprint for #Paragon's graphite.

Paragon's 'undetectable' Apple spyware had just been found...Image
Image
Image
Read 13 tweets
Jun 9
NEW: #Italy's spyware scandal just deepened.

Just days ago, #Italy claimed to not know who targeted Journalist @fcancellato with #Paragon spyware.

But now the spyware company is dropping heavy hints that this wasn't the full story👇
2/ Last week the #Italian government published a report acknowledging that they were responsible for certain #paragon spyware cases.

But left the politically trickiest case unanswered...
3/ Paragon frames itself as the anti-NSO... a "clean" spyware company.

But it didn't take long for them to get mired in an mess scandal in #Italy.

Now it looks like they are trying to find a way to fully wash their hands of the affair...

Read 7 tweets
Jun 6
NEW: Italy admits hacking activists with #Paragon spyware.

Blow to the reputation of a mercenary spyware company that marketed itself as an ethically clean anti-NSO.

But the official investigation doesn't answer a big mystery that's bad for #Italy & Paragon 1/..

By @omerbenjImage
2/ While Italy confirms the activist cases, they deny doing the politically explosive one:

Journalist & @fanpage editor Francesco Cancellato, whose reporting has tangled with the Prime Minister.

So who pointed Paragon against @fcancellato?

None of the answers are good... Image
3/ If we take the Italian government's claims to not know who targeted Italian journalist @fcancellato at face value...

Then it is a very bad look for #Paragon to have this case unexplained.

Who pointed their Graphite spyware at this European journalist?Image
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(