John Scott-Railton Profile picture
Jul 18, 2022 15 tweets 16 min read Read on X
🚨MAJOR INVESTIGATION: uncovering #GeckoSpy.

An espionage operation using #Pegasus spyware against #Thailand's pro-democracy movement.

THREAD on our findings 1/

Our @citizenlab collaborators: @iLawFX & @DigitalReachSEA w/validation by @AmnestyTech
citizenlab.ca/2022/07/geckos… Key Findings We discovered an extensive espionage campaign t
2/ In 2020, #Thailand's government triggered pro-democracy protests by disbanding a popular opposition party.

Protests continued into 2021, and were met with repression & violence.

Key figures were harassed, arrested & jailed.

Now, we know many were hacked, too.
3/ The #GeckoSpy investigation began in Nov 2021... when @Apple notified users likely targeted w/#NSOGroup’s FORCEDENTRY exploit.

Multiple activists in #Thailand received them.

Some got in touch with us @citizenlab & our collaborators including @iLawFX & @DigitalReachSEA
4/ Once notification recipients got in touch, forensic artifacts were consensually collected & analyzed.

The investigation then expanded to associates & other likely #Pegasus targets.

I cannot overstate the importance of @apple's notifications in focusing the initial process.
4/ The #Pegasus hacking came in waves. Some pauses were probably dictated by things outside #Thailand.

Like the #PegasusProject publication, our disclosure of #ForcedEntry & @Apple's patch... and those notifications.

Other sequences of infection have a contextual explanation...
5/ In many cases, #Pegasus infections in #Thailand matched protest & political activities.

Our collaborators @iLawFX & @DigitalReachSEA have a detailed report, including a table juxtaposing infections & protest events.

REPORT: freedom.ilaw.or.th/en/report-para…
6/ Some #Pegasus victims are well known. Like Panusaya Sithijirawattanakul.

She once wore a crop top w/“I have only one father”
written on her skin. Went w/friends the mall for ice cream.

Thai authorities interpreted this as mocking the king, & charged her with lèse-majesté.
7/ High profile activists weren't the only category of #Pegasus victims.

Famous actress @charoenpura & rapper @DechathornHK were also infected.

Both were visible supporters of the pro-democracy movement.
8/ Also infected? Individuals with little public profile, but who played an important support role in protests, or fundraising.

A picture emerges: a #Pegasus operator seeking detailed information about the protest movement... in some cases guided by non public information.
9/ Who is behind the hacking? We @citizenlab aren't making a conclusive attribution.

But it's worth nothing that we've seen #Pegasus operators with a #Thailand nexus since 2014.

And there's a lot of circumstantial evidence...
10/ When you read the @iLawFX & @DigitalReachSEA report, it's clear: the entity responsible for the hacking has a detailed & obsessive focus on voices calling for democracy and reform of the monarchy in #Thailand.
11/ My @citizenlab colleague @billmarczak explains that the #Pegasus hacking in #Thailand relied on zero-click vulnerabilities👇

Translation: *nothing* regular phone users could have done to protect themselves.
12/ This investigation only happened because victims came forward & participated.

#Pegasus can make people feel powerless about digital security, yet they acted to reclaim some agency & are now helping to shed light on the secret mechanics of repression.

It's deeply inspiring.
13/ Special thanks to the team at @AmnestyTech, which independently analyzed a sample of indicators in this case & confirmed Pegasus infections using their distinct tools and methods.
14/ This investigation was a team production, ranging from the incredible work done by our collaborators @iLawFX and @DigitalReachSEA, civil society groups that prefer to remain unnamed, and the @citizenlab team including👇

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Jun 12
🚨NEW INVESTIGATION: We just forensically unmasked #Paragon's Apple spyware.

Zero-click targets: Journalists. In 🇪🇺Europe.

Like 🇮🇹Italian reporter @ciropellegrino.

Reopen's #Italy's spyware scandal.

Follows our @citizenlab investigation of their Android spyware. 1/ Image
2/ Back in April, @Apple sent out a threat notification to a select group of users. Some got in touch with us @citizenlab to get analyzed.

They'd been targeted with a sophisticated zero-click attack (think: no click, no attachment to open, no mistake needed...).Image
3/ While my brilliant colleague @billmarczak was working on the phone of a prominent European journalist, he made a smoking gun discovery:

Requests to server matching our P1 fingerprint for #Paragon's graphite.

Paragon's 'undetectable' Apple spyware had just been found...Image
Image
Image
Read 13 tweets
Jun 9
NEW: #Italy's spyware scandal just deepened.

Just days ago, #Italy claimed to not know who targeted Journalist @fcancellato with #Paragon spyware.

But now the spyware company is dropping heavy hints that this wasn't the full story👇
2/ Last week the #Italian government published a report acknowledging that they were responsible for certain #paragon spyware cases.

But left the politically trickiest case unanswered...
3/ Paragon frames itself as the anti-NSO... a "clean" spyware company.

But it didn't take long for them to get mired in an mess scandal in #Italy.

Now it looks like they are trying to find a way to fully wash their hands of the affair...

Read 7 tweets
Jun 6
NEW: Italy admits hacking activists with #Paragon spyware.

Blow to the reputation of a mercenary spyware company that marketed itself as an ethically clean anti-NSO.

But the official investigation doesn't answer a big mystery that's bad for #Italy & Paragon 1/..

By @omerbenjImage
2/ While Italy confirms the activist cases, they deny doing the politically explosive one:

Journalist & @fanpage editor Francesco Cancellato, whose reporting has tangled with the Prime Minister.

So who pointed Paragon against @fcancellato?

None of the answers are good... Image
3/ If we take the Italian government's claims to not know who targeted Italian journalist @fcancellato at face value...

Then it is a very bad look for #Paragon to have this case unexplained.

Who pointed their Graphite spyware at this European journalist?Image
Read 6 tweets
May 20
NEW: Pegasus spyware maker NSO Group just got publicly rebuffed by the US.

They came to DC to get off the US blacklist.

It did not work out. Thanks to their own actions.

You know about the human rights issues, but let me tell you why NSO is no friend to the United States. 1/ Image
2/ First, it's important to know that NSO was shady in how they set up the meeting.

For close observers, this is no surprise.

NSO constantly thinks that they can play the United States.

Part of what got them in trouble in the first place, but let's go deeper.Image
3/ First, NSO has consistently helped foreign governments target the US government.

And hack regular US citizens.

The first cases date back a decade to when the president of Panama used it to monitor the US embassy (and his mistress).

A decade later it was still happening...Image
Read 15 tweets
May 6
BREAKING: jury awards massive $167 million in punitive damages against spyware company NSO Group.

Precedent-setting win against the notorious #Pegasus spyware maker.

Congratulations to @WhatsApp on sticking this case through since 2019. Some thoughts 1/
2/ After years of every trick & delay tactic it only took a California jury one days deliberation to the heart of the matter:

NSO makes millions hacking mostly-🇺🇸American tech companies... so that dictators can hack dissidents.

Their conduct deserved to be punished.
3/ NSO Group emerges from the trial severely damaged.

The verdict ($167,256,000 punitive, $440K+ compensatory) is big enough to make your eyes water.

The case is ALSO a huge blow to NSO's secrecy, with their business splashed all over a courtroom.

This will scare customers...
Read 14 tweets
May 1
Friends don't let friends get their eyeballs scanned to buy a coffee.

Sam Altman's Orwellian "Tools for Humanity" says this dystopia machine could help distinguish between #AI agents & humans... or verify at Point of Sale..or..?

Looks to me like a big biometric data grab 1/ Image
2/ Surely they didn't just start with the idea of invasively harvesting eyeball scans...and then look around for potential justifications.

And then add in some AI hype.

Right? Image
3/ Throwback to Tools for Humanity's previous (but non-portable, guys!) eye-scanning thing: WorldCoin.

Remember that? A global biometric data grab rife with documented exploitation in Africa & Latin America.

Still not clear what real value it delivered to the ppl who gave up their biometrics.Image
Image
Image
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(