{"id":18050,"date":"2022-02-02T10:47:48","date_gmt":"2022-02-02T18:47:48","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11783\/"},"modified":"2022-02-02T10:47:48","modified_gmt":"2022-02-02T18:47:48","slug":"news-11783","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11783\/","title":{"rendered":"NSO Group Spyware Targeted Dozens of Reporters in El Salvador"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61df7250e365ac4c375307ab\/master\/pass\/Security-NSO-El-Salvador-966235602.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 13 Jan 2022 02:00:18 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">The Israeli spyware<\/span> developer <a href=\"https:\/\/www.wired.com\/story\/nso-group-forcedentry-pegasus-spyware-analysis\/\">NSO Group<\/a> has long claimed plausible deniability when it comes to misuse of its powerful targeted surveillance tools. Yet despite its protestations\u2014and increased scrutiny from tech companies and regulators alike\u2014the abuses continue. The latest revelation comes from El Salvador, where NSO&#x27;s Pegasus malware was found on 37 devices belonging to 35 journalists and activists as recently as November of last year.\u00a0<\/p>\n<p class=\"paywall\">Those findings, <a data-offer-url=\"https:\/\/www.accessnow.org\/pegasus-el-salvador-spyware-targets-journalists-statement\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.accessnow.org\/pegasus-el-salvador-spyware-targets-journalists-statement\/&quot;}\" href=\"https:\/\/www.accessnow.org\/pegasus-el-salvador-spyware-targets-journalists-statement\/\" rel=\"nofollow noopener\" target=\"_blank\">jointly<\/a> <a data-offer-url=\"https:\/\/citizenlab.ca\/2022\/01\/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/citizenlab.ca\/2022\/01\/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware\/&quot;}\" href=\"https:\/\/citizenlab.ca\/2022\/01\/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">published<\/a> <a data-offer-url=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2022\/01\/el-salvador-pegasus-spyware-surveillance-journalists\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.amnesty.org\/en\/latest\/news\/2022\/01\/el-salvador-pegasus-spyware-surveillance-journalists\/&quot;}\" href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2022\/01\/el-salvador-pegasus-spyware-surveillance-journalists\/\" rel=\"nofollow noopener\" target=\"_blank\">by<\/a> a consortium of digital rights organizations, show that despite NSO Group&#x27;s insistence that its products are used to track criminals and terrorists, governments continue to deploy them against innocent targets\u2014and that NSO has done little to rein in its clients.\u00a0<\/p>\n<p class=\"paywall\">Twenty-three of the infected devices belong to journalists connected to the Salvadoran news site El Faro. Three other compromised devices belong to people associated with the publication <em>Gato Encerrado<\/em>. Both have published reporting critical of El Salvador&#x27;s government and have faced retaliation, like being barred from various government press conferences and, El Faro has said, being subjected to invasive financial audits and accusations of tax evasion. Salvadoran president Nayib Bukele and his administration have been broadly hostile to the media; in early 2021, the Inter-American Commission on Human Rights <a data-offer-url=\"https:\/\/www.oas.org\/en\/IACHR\/jsForm\/?File=\/en\/iachr\/media_center\/PReleases\/2021\/023.asp\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.oas.org\/en\/IACHR\/jsForm\/?File=\/en\/iachr\/media_center\/PReleases\/2021\/023.asp&quot;}\" href=\"https:\/\/www.oas.org\/en\/IACHR\/jsForm\/?File=\/en\/iachr\/media_center\/PReleases\/2021\/023.asp\" rel=\"nofollow noopener\" target=\"_blank\">granted precautionary measures<\/a> for 34 El Faro journalists thought to be at risk of human rights violations as a result of their work.<\/p>\n<p class=\"paywall\">Other confirmed targets of the Pegasus hacking spree include devices connected to Salvadoran publications <em>La Prensa Gra\u0301fica<\/em>, <em>Revista Digital Disruptiva<\/em>, <em>El Diario de Hoy<\/em>, and <em>El Diario El Mundo<\/em>, plus those of two independent reporters. The campaign also hit devices linked to local nongovernmental organizations, including Cristosal, Fundacio\u0301n Democracia, and Transparencia y Justicia. Notably, the researchers found that some devices were infected with Pegasus more than 40 times. El Faro <a data-offer-url=\"https:\/\/elfaro.net\/es\/202111\/el_salvador\/25861\/Apple-env%C3%ADa-alerta-de-espionaje-patrocinado-por-el-Estado-a-12-miembros-de-El-Faro.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/elfaro.net\/es\/202111\/el_salvador\/25861\/Apple-env%C3%ADa-alerta-de-espionaje-patrocinado-por-el-Estado-a-12-miembros-de-El-Faro.htm&quot;}\" href=\"https:\/\/elfaro.net\/es\/202111\/el_salvador\/25861\/Apple-env%C3%ADa-alerta-de-espionaje-patrocinado-por-el-Estado-a-12-miembros-de-El-Faro.htm\" rel=\"nofollow noopener\" target=\"_blank\">said<\/a> on November 23 that Apple had alerted 12 of its journalists to the possibility that their devices had been targeted with Pegasus spyware. The Association of Journalists of El Salvador announced a day later that a total of 23 journalists from different newsrooms received the same information. Others who received Apple&#x27;s Pegasus targeting notifications include parliamentarian Jhonny Wright Sol and He\u0301ctor Silva, a San Salvador local councilor.<\/p>\n<p class=\"paywall\">\u201cIt was quite shocking, to be honest, given the scale and the persistence of the infections in terms of one person being targeted multiple times,\u201d says Natalia Krapiva, tech legal counsel at Access Now, one of the organizations that investigated the campaign. \u201cThe technology gives access to everything you\u2019re doing on your phone, and we&#x27;ve heard NSO say many times that they would take action to implement human rights policies. Governments are also not being transparent about the purchase and use of this spyware. They should be accountable. Surveillance of civil societies with these tools shouldn\u2019t be the norm.\u201d<\/p>\n<p class=\"paywall\">Pegasus, which NSO has developed for both Apple&#x27;s iOS mobile operating system and Google&#x27;s Android OS, can be used to track a victim device&#x27;s location, exfiltrate data like text messages and emails, activate the microphone and camera, and more.<\/p>\n<p class=\"paywall\">\u201cNSO is a software provider, the company does not operate the technology or is privy to the collected data,\u201d NSO Group said in a statement. \u201cThe company does not and cannot know who the targets of its customers are, yet implements measures to ensure that these systems are used solely for the authorized uses. NSO\u2019s firm stance on these issues is that the use of cyber tools in order to monitor dissidents, activists and journalists is a severe misuse of any technology and goes against the desired use of such critical tools.\u201d<\/p>\n<p class=\"paywall\">The company added, \u201cThere is no active system in El Salvador.\u201d<\/p>\n<p class=\"paywall\">The consortium of organizations that conducted the research also includes Front Line Defenders, University of Toronto&#x27;s Citizen Lab, Amnesty International, Fundacio\u0301n Acceso, and SocialTIC. This is the first time Pegasus use has been confirmed in El Salvador, and it is one of the first examples in South and Central America in general. International investigators <a data-offer-url=\"https:\/\/www.nytimes.com\/2017\/07\/10\/world\/americas\/mexico-missing-students-pegasus-spyware.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2017\/07\/10\/world\/americas\/mexico-missing-students-pegasus-spyware.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2017\/07\/10\/world\/americas\/mexico-missing-students-pegasus-spyware.html\" rel=\"nofollow noopener\" target=\"_blank\">found in 2017<\/a> that the Mexican government was using Pegasus. The group does not attribute the Salvadoran hacking to a specific actor, but notes that NSO Group claims its customers are governments and their law enforcement agencies. Researchers at Citizen Lab found evidence that the campaign operator is focused solely on domestic targets in El Salvador.<\/p>\n<p class=\"paywall\">\u201cIf Mexico was dramatic, this one is jaw-dropping,\u201d says John Scott-Railton, senior researcher at Citizen Lab, \u201cbecause what we found was this incredibly extensive, pervasive, and aggressive targeting of media in El Salvador. And that targeting is very much paired with other threats against media there.\u201d\u00a0<\/p>\n<p class=\"paywall\">AccessNow&#x27;s Krapiva points out that the timing of the campaign in El Salvador underscores how hollow NSO Group&#x27;s defense of its products has been. In July, for example, Amnesty International and other organizations published extensive findings known as the Pegasus Project, detailing <a data-offer-url=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.amnesty.org\/en\/latest\/research\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/&quot;}\" href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2021\/07\/forensic-methodology-report-how-to-catch-nso-groups-pegasus\/\" rel=\"nofollow noopener\" target=\"_blank\">forensic evidence<\/a> that NSO spyware was being abused by governments worldwide and that Hungary, India, Mexico, Morocco, Saudi Arabia, and the United Arab Emirates among others might be NSO customers. The findings prompted numerous condemnations of the use of Pegasus or other invasive spyware and calls for a moratorium on the use of NSO tools. At the beginning of November when the Salvadoran targeting was still ongoing, the United States Treasury put NSO Group <a data-offer-url=\"https:\/\/www.commerce.gov\/news\/press-releases\/2021\/11\/commerce-adds-nso-group-and-other-foreign-companies-entity-list\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.commerce.gov\/news\/press-releases\/2021\/11\/commerce-adds-nso-group-and-other-foreign-companies-entity-list&quot;}\" href=\"https:\/\/www.commerce.gov\/news\/press-releases\/2021\/11\/commerce-adds-nso-group-and-other-foreign-companies-entity-list\" rel=\"nofollow noopener\" target=\"_blank\">on its entity list<\/a>.<\/p>\n<p class=\"paywall\">NSO has faced significant other pushback as well, including lawsuits by Apple and the <a href=\"https:\/\/www.wired.com\/story\/whatsapp-nso-group-lawsuit\/\">Meta-owned secure messaging platform WhatsApp<\/a>.<\/p>\n<p class=\"paywall\">\u201cNSO says it\u2019s like the car dealer, it just sells the car,\u201d Citizen Lab&#x27;s Scott-Railton says. \u201cBut in the case of El Salvador, if indeed this was the El Salvador government, you have a pretty good idea of who you&#x27;re dealing with. And in general this shows that if you thought that this kind of thing only happened in a dictatorship, Pegasus is the gas on the authoritarian fire.\u201d<\/p>\n<p class=\"paywall\">NSO Group has reportedly faltered in recent months as the backlash against it grows, but the researchers emphasize that the company is <a href=\"https:\/\/www.wired.com\/story\/meta-facebook-whatsapp-surveillance-for-hire\/\">far from<\/a> the only commodity spyware maker serving rogue clientele.\u00a0<\/p>\n<p class=\"paywall\">\u201cThis is important,&quot; AccessNow&#x27;s Krapiva says. \u201cThere needs to be accountability and consequences for the companies that are providing these technologies and the governments that are using them.\u201d<\/p>\n<p class=\"paywall\"><em>Updated January 13, 2022 at 12:45pm ET to include comment from NSO Group.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/nso-group-pegasus-el-salvador\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61df7250e365ac4c375307ab\/master\/pass\/Security-NSO-El-Salvador-966235602.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 13 Jan 2022 02:00:18 +0000<\/strong><\/p>\n<p>The newly disclosed campaign shows how little the company has done to curb abuses of its powerful surveillance tools.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18050","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18050"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18050\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18050"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}