Search
  • Adam Adler

The NSO Group Spyware "Pegasus" by Adam Adler Cyber Warfare Advisor



DEFEND YOUR DIGITAL PRIVACY:

https://www.digitalbankvault.com/order-the-digitalbank-vault



Adam Adler (Miami, Florida): NSO develops and sells governments access to its Pegasus spyware, allowing its nation-state customers to target and stealthily hack into the devices of its targets. Spyware like Pegasus can track a victim’s location, read their messages, and listen to their calls, steal their photos and files and siphon off private information from their device. The spyware is often installed by tricking a target into opening a malicious link, or sometimes by exploiting never-before-seen vulnerabilities in apps or phones to silently infect the victims with the spyware. The company has drawn ire for selling to authoritarian regimes, like Saudi Arabia, Ethiopia, and the United Arab Emirates.


Pegasus is a mobile phone-surveillance solution that enables customers to remotely exploit and monitor devices. NSO Group has long maintained that its mobile spyware is meant to be a tool for governments to use in fighting crime and terror and that it’s not complicit in any government’s misuse of it. Critics however say that repressive governments use it for more nefarious purposes to track dissidents, journalists, and other members of civil society — and that NSO Group assists them.


The latest version of the Pegasus implant has a number of capabilities, according to Citizen Lab, including Recording audio from the microphone including both ambient “hot mic” recording and audio of encrypted phone calls; taking pictures; tracking device location; and accessing passwords and stored credentials.


Citizen Lab’s analysis of the latest attacks found that the attackers found a footing on the phones from which to install Pegasus by exploiting a zero-day in Apple’s iMessage feature for iPhone.


“The phones were compromised using an exploit chain, which appears to involve an invisible zero-click exploit in iMessage,” researchers said.


How it's working? NSO Group delivered malicious SMS messages with links that delivered the payload; in this case, it’s a zero-click process that may involve the attacker merely sending an iMessage to the target — no user interaction required, according to Citizen Lab. The data exfiltration began swiftly: Just 16 seconds after the last connection is made to the Pegasus installation server.


The phones are hacked via four distinct clusters of servers, which could be attributable to up to four NSO Group operators, according to Citizen Labs.


In October 2019, Facebook filed a lawsuit against NSO Group, claiming that it had taken advantage of vulnerabilities in WhatsApp messaging software to propagate spyware.


WATCH ONLINE FULL DOCUMENTARY ABOUT THE NSO GROUP: CLICK HERE


The Pegasus solution utilizes cutting-edge technology specially developed by veterans of

intelligence and law enforcement agencies. It offers a rich set of advanced features and

sophisticated intelligence collection capabilities not available in the standard interception

solutions:

Penetrates Android, BlackBerry, iOS, and Symbian based devices

Accesses password-protected devices

Totally transparent to the target

Leaves no trace on the device

Minimal battery, memory, and data consumption

Self-destruct mechanism in case of exposure risk

Retrieves any file from the device for deeper analysis

Extracts contacts, messages, emails, photos, files, locations, passwords, processes list and more


The Pegasus system is designed in layers. Each layer has its own responsibility forming

together a comprehensive cyber intelligence collection and analysis solution.

The main layers and building blocks of the systems are:


Installations: The Installation layer is in charge of issuing new agent installations,

upgrading and uninstalling existing agents.


Data Collection: The Data Collection layer is in charge of collecting the data from the

installed device. Pegasus offers comprehensive and complete intelligence by employing

four collection methods:

– Data Extraction: Extraction of the entire data that exists on the device upon

agent installation

– Passive Monitoring: Monitor new arrival data to the device

– Active Collection: Activate the camera, microphone, GPS and other elements to

collect real-time data

– Event-based Collection: Define scenarios that automatically triggers specific

data collection


Data Transmission: The Data Transmission layer is in charge of transmitting the

collected data back to the command and control servers, using the most efficient and

safe way.


Presentation & Analysis: The Presentation & Analysis component is a User Interface

that is in charge of presenting the collected data to the operators and analysts, turning

the data into actionable intelligence. This is done using the following modules:

– Real-Time Monitoring: Presents real-time collected data from specific or multiple

targets. This module is highly important when dealing with sensitive targets or during

operational activities, where each piece of information that arrives is crucial for

decision making.

– Offline Analysis: Advanced queries mechanism that allows the analysts to query

and retrieve any piece of information that was collected. The advanced mechanism

provides tools to find hidden connections and information.

– Geo-based Analysis: Presents the collected data on a map and conduct

geo-based queries.

– Rules & Alerts: Define rules that trigger alerts based on specific data that arrives or

the event that occurred.


Administration: The administration component is in charge of managing the entire

system permission, security, and health:

Extracts contacts, messages, emails, photos, files, locations, passwords, processes

list and more

– Permission: The permissions mechanism allows the system administrator to

manage the different users of the system. Provide each one of them the right

access level only to the data they are allowed to. This allows defining groups in the

the organization that handle only one or more topics and other groups which handles

different topics.

– Security: The security module monitors the system security level, making sure

the collected data is inserted into the system database clean and safe for future

review.

– Health: The health component of the Pegasus solution monitor the status of all

components making sure everything is working smoothly. It monitors the

communication between the different parts, the system performance, the storage

availability, and alerts if something is a malfunction.



ORDER TODAY THE DIGITBANK VAULT ENCRYPTION SYSTEM: CLICK HERE


Agent Installation

In order to start collecting data from your target’s smartphone, a software-based component

("Agent") must be remotely and covertly installed on their device.


Agent Purpose

The “Agent”, a software-based component, resides on the endpoint devices of the monitored

targets and its purpose is to collect the data it was configured to. The agent is supported on

the most popular operating systems: BlackBerry, Android, iOS (iPhone), and Symbian based

devices.


Each agent is independent and is configured to collect different information from the device

and to transmit it via specific channels in defined timeframes. The data is sent back to the

Pegasus servers in a hidden, compressed, and encrypted manner.

The agent continuously collects the information from the device and will transmit it once-reliable internet connection becomes available.

Communications encryption, the use of many applications, and other communications

concealing methods are no longer relevant when an agent is installed on the device.


Agent Installation Vectors

Injecting and installing an agent on the device is the most sensitive and important phase of

an intelligence operation conducted on the target device. Each installation has to be carefully

planned to ensure it is successful. The Pegasus system supports various installation

methods. The installation methods variety answers the different operational scenarios which

are unique to each customer, resulting in the most comprehensive and flexible solution.

Following are the supported installation vectors:


Remote Installation (range free):

Over-the-Air (OTA): A push message is remotely and covertly sent to the mobile

device. This message triggers the device to download and install the agent on the

device. During the entire installation process no cooperation or engagement of the target

is required (e.g., clicking a link, opening a message) and no indication appears on the

device. The installation is totally silent and invisible and cannot be prevented by the

target. This is NSO uniqueness, which significantly differentiates the Pegasus solution

from any other solution available in the market.

Enhanced Social Engineering Message (ESEM): In cases where the OTA installation

method is inapplicable1, the system operator can choose to send a regular text message

(SMS) or an email, luring the target to open it. Single-click, either planned or

unintentional, on the link will result in hidden agent installation. The installation is entirely

concealed and although the target clicked the link they will not be aware that software is

being installed on their device.


Data Collection

Upon successful agent installation, a wide range of data is monitored and collected from the

device:

Textual: Textual information includes text messages (SMS), Emails, calendar

records, call history, instant messaging, contacts list, browsing history, and more.

Textual information is usually structured and small in size, therefore easier to

transmit and analyze.

Audio: Audio information includes intercepted calls, environmental sounds

(microphone recording) and other audio recorded files.

Visual: Visual information includes camera snapshots, photos retrieval, and screen

capture.

Files: Each mobile device contains hundreds of files, some bear invaluable

intelligence, such as databases, documents, videos, and more.

Location: On-going monitoring of the device location (Cell-ID and GPS).



Initial Data Extraction

Once the agent is successfully injected and installed on the device, the following data that

resides and exists on the device can be extracted and sent to the command and control

center:

SMS records

Contacts details

Call history (call log)

Calendar records

Emails

Instant Messaging

Browsing history

As opposed to other intelligence collection solutions which provide only future monitoring of

partial communications, Pegasus allows the extraction of all existing data on the device. As a

a result of the organization benefits from accessing historical data about the target, which assists in building a comprehensive and accurate intelligence picture.


Passive Monitoring

From the point the agent was successfully installed it keeps monitoring the device and

retrieves any new record that becomes available in real-time (or at specific condition if

configured differently). Below is the full list of data that is monitored by the agent:

SMS records

Contacts details

Call history (call log)

Calendar records

Emails

Instant Messaging

Browsing history

Location tracking (Cell-ID based)


Active Collection

In addition to passive monitoring, upon successful agent installation a wide set of active

collection features become available. Active collection refers to active requests sent by the

operator to collect specific information from the installed device. This set of features are

called active, as they carry their collection upon explicit request of the operator. Active

the collection allows the operator to perform real-time actions on the target device, retrieving

unique information from the device and from the surrounding area of the target, including:

Location tracking (GPS based)

Voice calls interception

File retrieval

Environmental sound recording (microphone recording)

Photo taking

Screen capturing


Active collection differentiates Pegasus from any other intelligence collection solution, as the

operator controls the information that is collected. Instead of just waiting for information to

arrive, hoping this is the information you were looking for, the operator actively retrieves

important information from the device, getting the exact information he was looking for.


Data Transmission

By default, the collected data (initial data extraction, passive monitoring, and active collection)

is sent back to the command and control center in real-time. The data is sent via data

channels, where Wi-Fi is the preferred connection to use when it is available. In other cases,

data is transmitted via cellular data channels (GPRS, 3G,4G and LTE). Extra thought was put

into compression methods and focusing on textual content transmission whenever possible.

The data footprints are very small and usually take only a few hundred bytes. This is to make

sure that the collected data is easily transmitted, ensuring minimal impact on the device and

on the target cellular data plan.


If data channels are not available, the agent will collect the information from the device and

store it in a dedicated buffer, as explained in the Data Collection section.

Data transmission is automatically ceased in the following scenarios:

Low battery: When the device battery level is below the defined threshold (5%) all

data transmission processes are immediately ceased until the device is recharged.

Roaming device: When the device is roaming, cellular data channels become pricy,

thus data transmission is done only via Wi-Fi. If Wi-Fi does not exist, the transmission will

be ceased.


When no data channels are available, and no indication for communication is coming back

from the device, the user can request the device will communicate and/or send some crucial

data using text messages (SMS).


The communication between the agent and the central servers is indirect (through

the anonymizing network), so trace back to the origin is non-feasible.

DigitalBank Vault Limited

Irish Square, Upper Denbigh Road, 

St Asaph Denbighshire LL17 0RN, UK

Company number 11988551

(Limited Liability Registered in England & Wales)

International Calls & Whatsapp : 

+372 5734 7873

 

info@DigitalBankVault.com

©2021  by DigitalBank Vault Limited.