Functioning of Pegasus and equivalent surveillance spyware (10 May 2022)Functioning of Pegasus and equivalent surveillance spyware (10 May 2022)Functioning of Pegasus and equivalent surveillance spyware (10 May 2022)Functioning of Pegasus and equivalent surveillance spyware (10 May 2022)
  • Startseite
  • zur Person
  • Meine Themen
    • Asyl/ Migration
    • Pegasus/Datenschutz
    • Energie
    • Gleichstellung
    • Iran
    • Roma
  • Material
    • Artikel
    • Videos
    • Pressefotos
    • Broschüren und Flyer
    • Presseinfos
  • Kontakt
    • Kontakt

Functioning of Pegasus and equivalent surveillance spyware (10 May 2022)

10. Mai 2022
Kategorien
  • Artikel
  • Startseite
Tags
  • Daten
  • Pegasus
  • Pegasus/Datenschutz

In the meeting, the Committee of Inquiry to investigate the use of Pegasus and equivalent surveillance spyware elected Raphaël Glucksmann as a fourth Vice-Chair.

Constanze Kurz (netzpolitik.org, Germany)

Adam Haertlé (ZaufanaTrzecia Strona, Poland)

Bill Marczak (Citizen Lab, Canada)

As Adam Haertlé explained, with Pegasus, an attacker becomes an omnipotent administrator of the taken over device.The operator steals the identity of the victims. Authentication cookies can be used to break into social network accounts held on a phone.

This is also confirmed by Bill Marczak, whose Citizen Lab has already analyzed numerous cases of Pegasus operations. In the case of encrypted messengers such as WhatsApp or Signal, this can be used to bypass what is actually a tap-proof connection. Attribution of the infections is challenging, but possible, he said. It is done by analyzing clusters of attacks that give clues about the possible same operator. Technically, however, it is almost impossible to track whether the attacker is actually a government. NSO also set up proxy servers for its customer, through which Pegasus forwarded data from the spied-out phones. Together with information from leaked NSO contracts, a picture emerges. Do these proxy servers possibly have other functions? Police agencies and intelligence services in almost all EU countries are NSO customers, he said. After the insolvency of the German state Trojan manufacturer FinFisher, the Israeli company enjoyed a virtual monopoly in the EU states.

It is possible to manipulate the entire phone, added Kurz. In the meantime, a lucrative market has emerged for the trade in security vulnerabilities, which manufacturers like NSO exploit. In addition to iPhones, Android phones are similarly affected, she said. Parliamentarians should also look at relevant companies about which less is known. It is also better to focus on niche products to defend against such attacks, he said.

At Apple, 90 percent of the market for iPhones is accounted for by only about 15 devices, Haertlé explained. That’s why it’s easier for companies like NSO to develop attack weapons for them, he said. With Android, he said, there are many more different devices and operating system versions to tailor mercenary spyware to. He himself has not yet seen a Pegasus variant for the Android operating system. However, the latest, expensive models from Samsung are mentioned in NSO advertising brochures as being infectable. Maintenance and quality assurance are also necessary, which leaves traces. Fingerprints can be found, for example, which can be traced back to command & control servers rented from cloud providers. The software is especially interesting for countries that don’t have the resources to build their own, he said. Officially, NSO sells its Pegasus licenses only to governments, Haertlé said. In Mexico, however, they could have ended up in the hands of mafia groups. The NSO Group knows more about this. Tapped data could also run through the company’s servers, even if the company denies this.

See here the Stream of today‘s hearing. [Stream]

Ähnliche Beiträge

22. Juni 2022

Past and upcoming Pegasus hearings and meetings


Weiterlesen
21. Juni 2022

Exchange of Views | Stocktaking of EU spyware providers (21 June 2022)


Weiterlesen
14. Juni 2022

Big tech and Spyware (14 June 2022)


Weiterlesen
Transparenz

Schlagwörter

Abgeordnete Asyl/ Migration Beschäftigungspolitik Demokratie DIE LINKE Energie Energie- und Klimapolitik Estrela-Bericht EU Euro-Krise Europa Europaparlament Flucht Fluggastdaten Freizügigkeit Frieden Frontex Geheimdienste Geschlechtergleichstellung Gleichstellung Griechenland Grundrechte Haushalt Industrie/ Wirtschaft Iran Klima Menschenrechte NSA Pegasus/Datenschutz Rechtsextremismus Regionalpolitik Roma Sachsen Schengen Sicherheit Struktur- und Kohäsionspolitik SWIFT TTIP Türkei Ukraine Umwelt Ungarn Videos Wahlen Überwachung

Fördermittel

Sie suchen EU Fördermittel für die Arbeit mit Flüchtlingen? Sie informieren sich zu möglichen Geldern für einen grenzüberschreitenden Jugendaustausch? Sie wollen ein lokales Kulturprojekt durchführen und benötigen finanzielle Unterstützung? Sie möchten ein europäisches Bildungsprojekt initiieren mit EU-Mitteln? Sie forschen im Bereich Umwelt und wollen sich europäisch vernetzen? Sie haben innovative Projektideen? Sie haben bereits online recherchiert und haben sich im Informationsdschungel verloren?

Dann sind Sie hier genau richtig!

Kontakt

Dr. Cornelia Ernst

Großenhainer Straße 93
01127 Dresden
Tel.: +49 (0)351 309 429 72
europa @ cornelia-ernst.de

Kontakt
Datenschutz
Impressum

Suchen

Cornelia-Ernst.eu