Both were visible supporters of the pro-democracy movement.
8/ Also infected? Individuals with little public profile, but who played an important support role in protests, or fundraising.
A picture emerges: a #Pegasus operator seeking detailed information about the protest movement... in some cases guided by non public information.
9/ Who is behind the hacking? We @citizenlab aren't making a conclusive attribution.
But it's worth nothing that we've seen #Pegasus operators with a #Thailand nexus since 2014.
And there's a lot of circumstantial evidence...
10/ When you read the @iLawFX & @DigitalReachSEA report, it's clear: the entity responsible for the hacking has a detailed & obsessive focus on voices calling for democracy and reform of the monarchy in #Thailand.
12/ This investigation only happened because victims came forward & participated.
#Pegasus can make people feel powerless about digital security, yet they acted to reclaim some agency & are now helping to shed light on the secret mechanics of repression.
It's deeply inspiring.
13/ Special thanks to the team at @AmnestyTech, which independently analyzed a sample of indicators in this case & confirmed Pegasus infections using their distinct tools and methods.
14/ This investigation was a team production, ranging from the incredible work done by our collaborators @iLawFX and @DigitalReachSEA, civil society groups that prefer to remain unnamed, and the @citizenlab team including👇
Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
2/ First, a mercenary spyware myth has just been busted.
Because the leak shows an Intellexa employee directly accessing a customer deployment.
Prior to the #PredatorFiles leak, spyware companies basically always claimed they couldn't access customer deployments & didn't know what was going on there.
They used this to avoid responsibility & claim ignorance when faced with abuses.
3/ And it gets crazier. The leak shows Intellexa casually accessing a core backbone of Predator deployment of a government customer.
Seemingly without the gov's knowledge.
Suggests that Intellexa can look over their shoulder & watch their sensitive targeting.
NEW: 🇨🇳Chinese hackers ran massive campaign by tricking Claude's agentic AI.
Vibe hacking ran 80-90% of the operation without humans.
Massive scale (1000s of reqs/sec).
Agents ran complex multi-step tasks, shepherded by a human.
Long predicted. Welcome to the new world.
Fascinating report by @AnthropicAI 1/
2/ The old cybersecurity pitch: unpatched systems are the threat.
The next generation concern might be unpatched cognition.
The attacker jailbroke the cognitive layer of @anthropic's Claude code, successfully convincing the system of false intent (that it was a security exercise)
3/ One of the key points in @AnthropicAI's report is just how limited the human time required was to run such a large automated campaign.
Obviously powerful stuff, highlighting the impact of orchestration.
And concerning for the #cybersecurity world for all sorts of reasons, ranging from attack scale, adaptability & cost reductions...