-
[Translated by {Iikka}{Yli-Kuivila}
(ITKST56 course assignment at JYU.FI)]
-
Herald: Good morning from C-Base, the
space station beyond or under Berlin,
-
welcomes you to day 2 of the RC3
streaming, we are starting in a few
-
seconds with the "Catching the NSO Group's
Pegasus spyware". This is something that
-
has caught attention among the security
and hacker communities over the world in
-
the last, I would guess, two years or so.
There have been some spectacular cases of
-
murder, kidnappings, journalists being
threatened, other things. The infamous
-
software doing this is called Pegasus,
it's marketed by a company known by the
-
three-letter acronym NSO, whatever this
stands for. And actually, Amnesty
-
International and its I.T. department, so
to say, has invested quite some effort
-
into detecting whether a device has been
infected by Pegasus or not. NSO marketed
-
this, among other things, as so-called
"undetectable", well undetectable as in
-
software on a device, as we will see, and
our speaker today, Donncha, Donncha O'Cearbhaill
-
from Ireland and from Amnesty
International, will be presenting how they
-
developed detection tools for this nasty
piece of spyware that has become so
-
popular among secret actors, state actors
and others around the world. OK, enough
-
for the introduction, Donncha, the scene
and the stream is yours. Good morning
-
Donncha: Good morning, and thank you for
that introduction. So as the intro said,
-
today I'd like to talk to you about NSO
group's Pegasus spyware, in particular I'd
-
like to explain a little bit about how we
at Amnesty have investigated Pegasus over
-
the past few years and I'll also explain and
demonstrate some of the tools we have
-
developed and published, that others also
investigate and detect Pegasus spyware
-
potentially on their devices and the
devices of other people in civil society.
-
So my name is Donncha O'Cearbhaill and I
am a technologist based at the Amnesty
-
International Security Lab in Berlin with
a small team who focuses on investigating
-
targeted digital threats such as spyware,
phishing and other kinds of surveillance
-
that's directed against civil society and
human rights defenders around the world.
-
So as the intro said, Pegasus has got a
lot of attention in the past few months.
-
So you may have seen the Pegasus Project
revelations that were published in July
-
during the summer. The Pegasus Project was
a global investigation into abuses linked
-
to NSO group's Pegasus spyware. This
investigation was based on a leaked
-
dataset of 50,000 potential Pegasus
targets, which Amnesty International and
-
Forbidden Stories had access to, and so
this global media investigation was
-
coordinated by Forbidden Stories, with the
participation of about 80 journalists from
-
17 different media organisations around
the world. During the Pegasus Project,
-
Amnesty International took the role of a
technical partner, and the focus for
-
Amnesty International was to perform
detailed innovative forensic analysis on
-
the devices of potential targets, and
through this kind of forensic analysis and
-
this technical work we were able to
identify traces of Pegasus, either
-
targeting or infecting online devices. So
over a multi-month project Amnesty
-
Security Lab analyzed about 67 devices,
and from these 67 devices of potential
-
targets at least 37 showed clear traces of
Pegasus targeting or infection. So this is
-
really quite quite a high number of
infected devices, and these devices
-
included journalists, activists,
opposition political figures, all kinds of
-
people who were being unlawfully
surveilled using Pegasus. Overall, of the
-
phones we have checked, which were iPhones
and which hadn't been replaced, which took
-
data of the targeting, more than 80
percent of the phones that were on this
-
list of potential targets showed traces of
Pegasus. So in July these stories came out
-
and they highlighted cases of of civil
society being targeted, such as
-
journalists in Hungary, activists in
Morocco, activist Saudi Arabian
-
dissidents, also family members of Jamal
Khashoggi, which the investigation showed
-
had been targeted with Pegasus spyware
both before and after his his brutal
-
murder. So, yeah, you can. You can go and
read many of these stories online. Today
-
I'd like to focus on and get to how we got
there, how we developed these, these
-
tools, how we developed this methodology
for finding Pegasus. And also to explain
-
about how you can also go and do this kind
of searching for - for Pegasus and for
-
other mobile spyware. So let's take a step
back for a second and ask, so what exactly
-
is Pegasus? Its name is well known, but
what exactly is the software and how does
-
it work? OK, so first thing to remember is
that actually, while Pegasus have been
-
gotten more well known in the last two
years, it's not actually a new - a new
-
tool or a new product. So we know Pegasus
has been around and then developed by NSO
-
Group since at least 2010. And on the left
hand side here, the diagram, you can see a
-
Pegasus brochure from 2010 where it
describes how Pegasus can be installed on
-
a BlackBerry devices. And we believe the
original version of Pegasus was focused on
-
BlackBerry because back in 2010,
smartphones were less prevalent than they
-
are now. BlackBerry is kind of a key
target for some of the - the security
-
agencies who may want to buy this kind of
spyware. So it developed over time here on
-
the right hand side, we can see some
diagrams that were from a leaked Pegasus
-
brochure that was published in 2014. In
the first diagram, here it talks about how
-
Pegasus is installed on a phone. In this
example, it's showing how a Pegasus kind
-
of infection link can be sent over SMS to
the target device. And then if opened how
-
the data can be collected and passed back
to the - the operator of the Pegasus
-
software. That's just one example of -
from their own diagrams. Here in the
-
circle below, you'll see a little bit of
what Pegasus claims to be able to monitor.
-
And if you look at it, you can see it's
basically everything on the device. So
-
it's talking about collecting email
addresses, collecting SMS messages,
-
tracking location data, even reading the
calendar, turning on the microphone of the
-
phone. And so bear in mind while this
diagram is quite old, it's like six or
-
seven years old, you get an idea of what
kind of data the Pegasus software will try
-
to collect from the phone. It's basically,
it collected every kind of data on the
-
phone that might be of interest to
somebody who is carrying out the
-
surveillance. One important thing to
remember is that the Pegasus spyware is
-
able to get very kind of deep access to
the phone, so it's fundamentally able to
-
access everything on the phone that the
user is able to access and more. So even
-
if you're using a messaging app such as
Signal or Telegram, which may be
-
encrypted, the Pegasus software is able to
access that data and those messages before
-
they're encrypted on the device. So even
once their spyware running on the phone
-
itself, none of these encrypted messaging
apps will help because it has such low
-
level access to the device. So it's a
little bit about what exactly Pegasus
-
tries to collect and what it - what it -
what people can do with it using the
-
Pegasus software. So where exactly did the
investigations into Pegasus start? So we
-
go back as far as 2016 was when Pegasus
was first kind of identified in the wild,
-
being a being used to target an activist.
So in this case, in 2016, Pegasus was
-
first found by Citizen Lab. Citizen lab
is a group of researchers based in the
-
University of Toronto in Canada, who also
works on investigating spyware targeting
-
civil society. So in this case, a UAE
based human rights defender named Ahmed
-
Mansoor began to receive suspicious
messages over SMS. So you can see some
-
screenshots of the messages on the right.
So Ahmed Mansoor was cautious about these
-
because in the past he had previously been
targeted with other kinds of spyware
-
tools, including - including Finfisher.
So when he began to receive these
-
messages, he - he was cautious about them
and he shared them with Citizen Lab, who
-
then began to investigate them. So what
Citizen Lab realized is that these looked
-
to be an attack message, and they opened
these attack links on their own testing
-
phone. When they did this they're able to
capture the exploit that was being
-
delivered over these links and also
able to capture a copy of the Pegasus
-
payload. So what happens when these links
are opened is that the link is opened in a
-
web browser such as Safari. When the link
is opened, the Pegasus server would return
-
to some JavaScript, some code that would
exploit an unknown flaw in the Safari web
-
browser and by kind of manipulating the
Safari web browser and exploit this
-
unknown flaw - they could then get their
own code to start running inside this web
-
browser. And eventually, with the help of
some additional flaws, they could then get
-
more privileged access on the iPhone and
eventually install the full Pegasus
-
payload. So, yes, Citizen Lab first found
it in 2016, it was it was a very important
-
discovery and it showed just how how
serious some of the threats facing civil
-
society were. That there were people
willing to use these kinds of very
-
expensive exploits to start targeting
human rights defenders who are just doing
-
their human rights work. Unfortunately,
after this, Ahmed Mansoor continued to get
-
harassed, and he was sentenced to prison,
and he's currently still in prison from
-
since 2017. So for about four years now.
So when did we at Amnesty start
-
investigating this. So our team has been
investigating these kinds of threats for a
-
while, but really we started focusing on
NSO and investigating NSO in 2018 after an
-
Amnesty colleague of ours started to
receive some suspicious messages. So this
-
- this colleague received in May 2018
received this message you can see here on
-
the left. The message is written in
Arabic. But it this it claims that there
-
is going to be a protest happening shortly
outside the Saudi Arabian Embassy. And
-
they asked the Amnesty staff member, to to
support the protest and then to click on
-
this link for for more information. So
fortunately, our Amnesty colleague, when
-
they received this message, they got quite
suspicious. They were like, this is just
-
weird, I don't know this person. And so
they shared a screenshot of this message
-
with us at the Amnesty Security Lab, and
we began to investigate. So quite quickly
-
when we started looking at this domain
name and the server, and we agreed it
-
looked kind of suspicious. And we also
managed to identify some additional
-
domains and servers that were related to
this original akhbar-arabia domain. And
-
quite quickly, it started to appear to us
that this was indeed something suspicious,
-
and maybe it was some kind of an attack
message. So at the time, we didn't know it
-
was necessarily NSO Group. By looking at
the original and initial servers here. We
-
managed to create kind of a fingerprint,
so some way of identifying the particular
-
configuration of the domain name and the
server sent inside of this message. With
-
the aid of this fingerprint, we then began
to do what's called an internet scan. So
-
we connect it to every single server on
the Internet, send a particular request
-
and then find any other server on the
Internet that matched this particular
-
fingerprint, this particular configuration
from this server. So by doing this
-
internet scanning, what we found was 600
different domains all across the Internet
-
that matched this fingerprint and that
appeared to be related to the same kinds
-
of attacks. So what was really was really
key is that we found that these these
-
domains were actually related to Pegasus
because NSO Group had made one kind of key
-
mistake or key flow when they were setting
up this infrastructure. So what happened
-
is that as described earlier Citizen Lab
had previously identified servers being
-
used by NSO Group in 2016 after the
expose in 2016 NSO shut down all of
-
these domains and infrastructure. And then
began to set up new kind of infrastructure
-
that would not be related to NSO or not
linkable to NSO. Fortunately they made a
-
mistake because they had reused one domain
name from the previous set of
-
infrastructure and also being used in this
new infrastructure. So by finding this one
-
domain out of 600 that had previously been
in - in use by NSO, we're able to show
-
that these 600 domains were also related
to Pegasus. And so we're able to show that
-
this message that was sent to our Amnesty
International colleague was indeed related
-
to Pegasus and was an attempt to to
compromise their device. So we published
-
these findings in August 2018, and at that
time we also identified that another set
-
Saudi-Arabian activists had similarly been
targeted, with a Pegasus exploit message
-
over WhatsApp. Following this, Amnesty
International also supported a legal
-
action in Israel, which asked the Israeli
Ministry of Defense to revoke NSO's export
-
licenses. To prevent this Pegasus software
being sold to countries that would abuse
-
it to target Amnesty and also target other
human rights activists. Unfortunately
-
later the Israeli court rejected the legal
complaint and said that the Israeli
-
Ministry of Defense had adequate
safeguards in place to prevent NSO's
-
exports being sold to countries who would
abuse it. Here in the bottom on the left,
-
you can see that. You can see a chart
which shows the number of Pegasus servers
-
online at the time. I mean, see here that
when we published this report NSO acted
-
quite quickly to shut down all 500 or 600
servers that were being used to deliver
-
Pegasus. So this just shows that, you
know, NSO is kind of reading these
-
researches and paying attention to it. It
is trying to avoid getting their
-
infrastructure and servers discovered by
by researchers who are investigating these
-
kinds of abuses. So this is back in in
2018, so after discovering this attack
-
against an Amnesty staff member we at
Amnesty continued trying to investigate
-
Pegasus to try to find more cases of
abuse. We next found Pegasus targeting
-
happening in Morocco in 2019. So you can
see here on the right. This time, we found
-
that a Moroccan human rights defender
named Maati Monjib was being targeted
-
repeatedly with Pegasus. When we checked
his phone, we found that he had some
-
suspicious messages there, saying that the
messages claimed that there is some, some
-
scandal or some news story, and they're
asking the target to click on these links
-
to find out more information. So when we
looked at these these links, we knew
-
immediately that they were Pegasus links,
because we had previously identified these
-
domains as one of the 600 domains, that
were being used in 2018. So for example,
-
you can see that in the second message on
the right, we see the domain
-
videosdownload.co. We knew it was Pegasus
because we'd previously identified and
-
published this domain in 2018. So this
time we knew Maati was being targeted with
-
Pegasus, but we realized we needed to do
some more investigation to see if his
-
phone was indeed compromised that we could
collect more information from his device.
-
So when we did this, we actually found
something quite interesting on Maati's
-
phone because we found what we believed
was evidence of a new type of a targeting
-
on his phone. Instead of relying on the
target being tricked into clicking on a
-
link which is maybe not reliable, or maybe
the target can - can see something is
-
suspicious. We instead saw them using an
what's called a network injection attack.
-
So how are network injection attack works
is like this: So network injection
-
involves having some kind of equipment or
software running on the what access to the
-
internet connection of the mobile device.
So this can either be at the mobile phone
-
network or potentially having some - some
software or hardware running on the same
-
Wi-Fi network as the target. And what it
does is when the target is browsing the
-
web on their phone, eventually, the target
browses and clicks on link that goes to a
-
regular http website. So without https. So
when this regular http request is made,
-
the software that's running on the
upstream network can see this http
-
request. And when the http request
happens, it can instead, instead of
-
returning the correct response to correct
content, instead it returns a http
-
redirect. And the http redirect will then
send the browser of the phone to a
-
malicious exploit site, which can then
hack the phone. So in the case of Maati,
-
we found that he had tried to go and check
his email and typed in Yahoo.fr on his
-
browser when he typed in Yahoo.fr - the
software running on the on the upstream
-
network saw this cleartext connection and
then redirected his phone to this exploit
-
link we see above. So you see the domain
is quite suspicious:
-
"get1tn0w.free247downloads.com". And
again, it has some random characters at
-
the end, which looks like a kind of an
exploit link. So at the time, we suspected
-
that this was was Pegasus, and it was a
new way of delivering Pegasus without
-
tricking the user into clicking on a link.
But we weren't certain that it was
-
Pegasus, potentially it was some other
kind of spyware. Fortunately for us NSO
-
helped to confirm that this really was
Pegasus, because before we published this
-
report, Amnesty wrote to NSO Group sharing
our findings and interestingly one day
-
after we shared the findings with NSO this
spyware server got shut down and went
-
offline. And this is already a week before
the report was made publicly available. So
-
that kind of confirmed to us that NSO
really was controlling this infrastructure
-
and were able to get it shutdown even when
we'd only privately shared this
-
information with with NSO. A bit later, we
found some more information about how this
-
attack may have been done - NSO at a trade
fair was demonstrating some new type of
-
hardware they had developed, which you can
see here on the photo on the right. And we
-
believe this this photo is of some kind of
IMSI catcher or fake base station, which
-
can run a fake mobile phone network. And
then target's phone: so Maati could
-
connect to this fake mobile phone base
station. And from that position, it could
-
be possible for NSO to redirect the phone
to a malicious - a malicious exploit link.
-
So we're not sure what happened in this
case if this was the device that was used.
-
But we believe the NSO is demonstrating
or testing these kinds of what are called
-
tactical infection methods. So this was
where our findings were in Morocco - we
-
started to realize that actually relying
on checking for SMS messages, checking for
-
links or relying on people coming to us
with something suspicious wasn't going to
-
work anymore because we began to see what
were called zero-click attacks. And so all
-
a Zero-click attack is is any way of
infecting a device that doesn't rely on
-
some interaction from the user. Doesn't
rely on the user clicking on a link. So we
-
can see here are some examples of other
zero-click attacks that have been
-
discovered over the past couple of years.
I guess one of the first ones here was in
-
2019, where NSO Group developed an exploit
for a for WhatsApp, and it was then used
-
by their customers to target at least 1400
different people around the world. All of
-
this - how it worked is that the - the
target was simply to receive a call over
-
WhatsApp, even a missed call and the
exploit would be able to compromise their
-
phone without the use of clicking
anything. As I described earlier, we saw
-
these kinds of network injection attacks
happen, and then later in 2020, Citizen
-
Lab also found an iMessage zero-day being
used to again compromise iPhone users
-
without any interaction in 2020. So from
our own investigations, we have found that
-
NSO has been using various zero-click
exploits since at least summer 2017 until
-
July of this year. So we know it's not
something that's quite new for NSO
-
but at least it's something we've
started only recently discovering in the
-
past few years. And we've seen, NSO
putting a lot of focus into developing
-
these kinds of complicated but very
powerful zero-click exploits. So now that
-
we know that NSO and their customers are
using these kind of zero-click attacks, we
-
realized we needed to do something kind of
more advanced to try and find these cases
-
of cases of - of surveillance. The big
problem with mobile devices is a lack of
-
visibility, whereas on desktop or laptop
computers, we have antivirus available or
-
we have EDR systems available. There
really is nothing similar that was
-
available for mobile devices. So these
kinds of attacks, especially zero-click
-
attacks, are often going undetected. We
got to investigate this. We realized that
-
it was difficult to perform forensics on
mobile devices. It's actually not
-
impossible. We were somewhat surprised to
realize that iPhones actually allow a
-
significant amount of relevant data to be
extracted from the phones themselves in
-
the form of an iPhone backup. And so it's
actually quite - quite possible to start
-
doing a forensic analysis on iPhones.
Unfortunately, Android devices we found
-
were much more limited because of
restrictions on the Android operating
-
system. It isn't possible to extract much
data in an Android backup, and so all
-
we've really been able to do on Android is
to simply check the SMS messages and maybe
-
the browser history for some traces of -
of targeting. But again, it's just it's
-
much less data is available on Androids
compared to iPhones. The other big problem
-
we realized is that there's there's a lack
of any kinds of public tools for
-
consensual mobile forensics. All of the
forensic tools that are out there are
-
designed for - for people to extract data
from phones that they don't want or their
-
phones have been seized or phones that are
somehow otherwise obtained. There's no
-
there's no tools available to really check
your own phone for signs of spyware. So
-
this is where the Mobile Verification
Toolkit comes into play. So - MVT - it is
-
a public tool developed by Amnesty
International and designed to simplify the
-
process of analyzing mobile devices for
traces of spyware. And here it's available
-
on GitHub, you can go check it out. And
just to highlight all of the
-
cases of Pegasus targeting I've described
previously in all the cases and traces
-
that are present for the rest of the
presentation, all of these have been found
-
using MVT. So MVT really works to - to
detect advanced spyware, including spyware
-
using zero-click, zero-day exploits and
really sophisticated stuff such as
-
Pegasus. So while all of these different
spyware vendors try to say: "Our thing is
-
undetectable": It is definitely advanced,
they definitely spent a lot of money in
-
developing this stuff, but it's not magic.
And if you're careful and diligent about
-
checking the traces, there's always
mistakes that are made. There's always
-
ways of identifying potential suspicious
behavior on these devices. And MVT it is
-
written in Python, it's a very easy to
install, and if you have PIP, you can just
-
go a "pip3 install mvt" . And here's how
it's how it's used. Again, it's very
-
straightforward. To check an iPhone, you
simply make a backup of the iPhone and you
-
run this one command so it'll be "mvt-ios
check-backup" and then you provide the
-
backup folder. In the command here we also
see what's called a stix-file. So a .stix
-
file is simply a file containing
indicators. This maybe like domain names
-
or IP addresses, or process names that are
known to be linked to a spyware tool. And
-
so the MVT is a generic tool. It can be
used with Pegasus indicators, but it also
-
can be used with indicators for other
spyware tools and could be used to detect
-
other spyware. So MVT is a modular
framework, it has modules for parsing
-
different kinds of databases such as SMS
messages or browser history or other kinds
-
of files on the device. I'm going to go
through and explain a few of the modules
-
that are available in MVT and show how
this can be used to - to find traces of
-
Pegasus or other similar spyware tools. So
one module that is quite useful is the SMS
-
module, which is quite straightforward, it
simply reads the SMS database in iPhone
-
backup to extract all of the links from
the SMS messages and check if any of those
-
SMS messages contain links to known
malicious domains. So in this case, we're
-
checking a backup that is targeted with
Pegasus, and we see that - we see that
-
there's multiple domains that are found
and are tied to Pegasus. We see this
-
revolution-news.co, stopsms.biz and
from what we know of NSO we've seen these
-
kinds of exploit SMS used primarily
between 2016 and 2018. We've also seen
-
Pegasus links as far back as 2014, and as
recently as 2020. So this has been quite
-
common and I - if these zero-click attacks
are not available, I think we'll still see
-
these kinds of exploit links being sent in
SMS. So another data source that's quite
-
useful and quite helpful for finding
traces of targeting is the Safari browser
-
history. So what we've seen is we've seen
some as we identify traces of exploit
-
being recorded in Safari browser history,
especially after a network injection
-
attack. So in this case, while there's no
link in SMS when a network injection
-
attack happens the exploit server domain
will be recorded in the browser history.
-
And so by checking the browser history, we
may be able to find evidence that this
-
attack happened. So on the right here you
can see a screenshot and this screenshot
-
was actually taken by Moroccan journalist
Omar Radi when he was being targeted with
-
one of these network injection attacks in
Morocco. So when he was browsing the web
-
he clicked the link and then instantly
redirected into this web page. And when
-
this screenshot was taken, it was actually
running the JavaScript trying to exploit
-
his phone. So unfortunately, following the
publication of this research Omar Radi was
-
repeatedly harassed by the Moroccan
authorities and then he was eventually
-
jailed after an unfair trial, and he's
currently - currently in jail.
-
So another file quite useful in our
investigations is something called the ID
-
status cache file. So the ID status cache
file is a file on iPhones, and it can
-
track traces of any iCloud accounts
which interacted with the device. This can
-
be interacting with the device over a
bunch of different Apple services,
-
including iMessage, AirDrop, Apple Photos.
And so what is really useful about this
-
file, because it showed us which malicious
accounts, which kind of Pegasus related
-
accounts had been targeting a particular
device. So what we know about Pegasus - we
-
believe that these malicious accounts are
- have been set up and have been used by
-
one individual Pegasus customer. So you
can see here in the first row, we see this
-
email address linakeller and we saw this -
this account being used to deliver a
-
iMessage zero-day to quite a number of
different activists. So we've seen it
-
used to deliver exploits to two different
Moroccan activists and a couple of French
-
political figures. So by - by looking at
which individuals have been targeted by
-
the same, the same account, by the same
customer we were able to kind of get a
-
better idea of who that customer might be
and have some idea about the attribution
-
for that attack. The same in these other -
in these other cases, for example we see
-
the jessicadavies1345 email. This was
found on the phone of two different
-
Hungarian journalists. Same for the
emmadavies' address and again for this
-
final address here: williams enny. We
found this on the phone of two different
-
Hungarian individuals, hungarian
activists. So this is really useful for us
-
in our investigation because it really
helped us get a better idea of who might
-
be behind some of the attacks that we were
seeing. So the previous logs
-
I showed about SMS, data and browser
history. These show kind of traces of
-
targeting. They showed some of these had
been sent a malicious link, but they don't
-
necessarily prove that a phone has been
successfully compromised. So what I will
-
show now is some of the logs we can use to
show that a device was indeed compromised.
-
One of these files that was very useful
for us in our investigations was the so-
-
called data usage file. So the data usage
file in an iPhone is a file that records
-
information about how much mobile data
traffic each process on the phone has
-
used. So this may be used to, like help
the iPhone keep track of, you know, which
-
apps on your phone are using the most of
your mobile data. But what is really
-
helpful for this is that it actually
recorded the names of some of the Pegasus
-
processes and how much data each of these
pegasus processes were using. So for all
-
we know about NSO's Pegasus, we believe
that when Pegasus is installed on a phone,
-
it will kind of pick a random name that it
uses to kind of hide itself in running on
-
the system. Throughout our investigation
we found about 50 different process names
-
that the Pegasus process was using to try
and hide itself. And once we identified
-
these process names, then we could go and
look for these Pegasus known Pegasus
-
process names on devices of potential
targets. What's happened, this database
-
also shows a timestamp of when this
process name was first kind of started on
-
the device, when it was last seen on the
device. And also it gives you some kind of
-
information about how much data this
process transferred. In some cases, this
-
has been gigabytes of data which shows
that really the Pegasus spyware was
-
extracting a lot of data from the device.
And again, this is all automated in MVT
-
so if you check a phone using MVT with the
Pegasus indicators, it'll show quite
-
clearly if any of these processes have
been found on the device. Another feature
-
that's been very helpful for us and in our
analysis is the timeline feature of MVT.
-
So how the Timeline feature works is it
takes all of the different indicators and
-
modules on the phone, so it checks the -
the SMS messages, it check the - the file
-
system and every - every event, like every
SMS message, every web browser lookup will
-
all be recorded in a single file with the
date that it happened. So by looking at
-
this timeline, we can often see what
different events happened around the same
-
time as each other, and this can give us
some idea - some idea about how attacks
-
were actually delivered on this device. So
I want to give you just one example of -
-
of how this timeline can be used. Just so
you know how to use this timeline in your
-
own investigations. So this is actually a
demonstration of the phone of a Rwandan
-
activist who was targeted in June 2021
using the forcedentry, iMessage zero-day.
-
So we can see here on the timeline that on
8:00 p.m. 8:45, we see the phone began to
-
receive some push notifications over
iMessage. So it seems it receives like 46
-
push notifications. And then what we saw
was that SMS attachments began to be
-
written to the phone. So in the final line
here, we see that a file is written -
-
written to the SMS attachments directory.
And if you look at the end of the line, we
-
see that the - the file being written to
disk actually had a .GIF attachment. So at
-
the time we thought this was something to
do with the exploit somehow. NSO was
-
delivering their exploit in that GIF file.
If we look a little bit later in the
-
timeline, we see that about 10 minutes
later, on the same day, a Pegasus process
-
starts running on the phone. This otpgrefd
process. Shortly afterwards, some
-
additional files are written on disk and
some more Pegasus processes start. So by
-
looking at this timeline together, we can
see quite clearly that the phone began to
-
receive iMessage messages. These GIF
attachments start to be written on the
-
disk and then about 10 minutes later, the
phone was compromised with the Pegasus. So
-
remember here like - there was no
interaction from the user - they didn't
-
click on any link. As far as we are aware
they I didn't even notice anything
-
happening on the device. This simply
silently these messages were being
-
delivered and after 10 or 20 minutes,
Pegasus began to gain access to the
-
device. So we've shared some of these
findings with Apple, and then later in
-
September 2021, Apple - Citizen Lab
identified a copy of this exploit on
-
another - phone of an another activist and
they shared it with Apple and Apple
-
patched this vulnerability in September
2021. So that's a little bit of how MVT
-
works and how some of this methodology
works to identify Pegasus on a
-
device. So since we published our forensic
methodology and our tools, many other
-
groups and organisations have been using
these tools and methodology to check other
-
devices for signs of Pegasus and found
quite a number of new cases. Here on the
-
top right you're going to see an example
of another NGO "Frontline Defenders", who
-
identified six Palestinian human rights
defenders who had their devices hacked
-
using Pegasus. And other case we see
that the Belgian military intelligence
-
services use a similar methodology to
check the phones of journalists in
-
Belgium, and they found that a journalist,
Belgian journalist, Peter Verlinden, had
-
his iPhone hacked who they suspected by
Rwanda. Again, we see another case where
-
French intelligence services confirmed
that a number of French journalists had
-
their phones hacked using using Pegasus
again using a similar methodology. So what
-
I'd like to highlight is MVT can really be
useful in identifying traces of Pegasus, but also
-
MVT is designed as a kind of generic
mobile forensic tool. So when used with
-
Pegasus indicators it will find Pegasus,
but it also can be used to go and
-
proactively search for new kinds of
spyware. So I really recommend that if
-
you're suspicious that phones may be
targeted with this kind of spyware, you
-
can use MVT to extract some data and then
dig into it. If the person is a member of
-
civil society or an activist then Amnesty
and other organisations will be happy to
-
help support these investigations. And
also, MVT is an open source tool. It's
-
based on different modules, and so we're
always open to ideas for - for new modules
-
and new detection ideas to help make this
tool better and better able to detect new
-
kinds of threats. One thing to remember
about MVT it is - it's designed to detect
-
some kind of spyware. Unfortunately, the
people who develop these spyware, they're
-
- they're smart people and they read these
reports and they watch these kind of
-
presentations. And every time we publish
information about how to detect these
-
kinds of spyware targeting civil society,
the different spyware vendors and actors
-
will try to improve their tools to avoid
them being detected. They'll try to kind
-
of upgrade their infrastructure to hide it
again or to the better obscure their
-
activities. So just to give an example,
here's some of the development of NSO's
-
own infrastructure over time. We see that
after we published - Amnesty published the
-
report in 2018 NSO infrastructure was shut
down and then later over the next two
-
years, it began to run more
infrastructure, which was again shut down
-
after discovery in - in 2021. So it's a
constant arms race. And so while - while
-
this - these tools are useful to detect
Pegasus now, it's not always going to be
-
just automatic, and it's important to do
further research to try and identify new
-
traces of new kinds of attacks. So what is
the future for mobile spyware? So one
-
thing I'd like to reiterate is that while
we focus a lot on NSO Group and Pegasus in
-
this research and in this
talk and also there's been a lot of focus
-
on NSO Group. It's not the only mobile
spyware out there, and there's definitely
-
many other players who are trying to get
into the space and trying to also develop
-
similar kinds of spyware tools, which are
then sold to - to different customers.
-
We've seen that from this investigation.
We found at least 180 journalists who are
-
potential targets of Pegasus and many
other human rights activists and
-
opposition politicians who have been
targeted with these tools over the last number
-
of years. So far, these threat actors and
these - these state agencies are able to
-
target activists and civil society with
impunity due to a lack of visibility and
-
telemetry on mobile platforms. They've
just been getting away with it because
-
they haven't been detected. So tools such
as MVT can help expose some of these
-
threats, but they need to be used more
widely and need to be used with more civil
-
society to really understand the full
scope of these kinds of threats. And it's
-
also important that industry, the tech
industry and the security industry work
-
closely with civil society to help detect
and expose these threats because
-
unfortunately, the people most at risk
from these kinds of really serious attacks
-
are some of the people who are the least
equipped, both financially and technically
-
to defend against them. So to conclude,
I think we're going to continue to see
-
attackers focusing on mobile. Mobile is
where all the data is. No other place
-
gives you as much insight into somebody's
life and all their most innermost
-
thoughts. Even just having a microphone in
everybody's pocket in someone's pocket is
-
such a powerful position to be in that we
think companies and states will continue
-
trying to develop these kinds of tools. We
know - I think that zero-click exploits
-
are going to be highly, highly desirable.
So while Apple and others have done a
-
great job in making attacks against
iMessages more difficult, it's almost
-
certain that these kinds of cyber
surveillance companies will continue
-
trying to develop zero-click exploits. If
not for iMessage then maybe for other chat
-
platforms. I don't know like Signal or
Telegram or WhatsApp, they're going to try
-
and attack other applications that
activists are using. Unfortunately it's
-
not possible for activists and civil
society to protect themselves from these
-
kinds of zero-day attacks from a technical
sense. So we definitely need more active
-
collaboration between civil society and
key platform vendors to help identify and
-
defend against these threats. And also, we
urgently need better regulation to prevent
-
these kinds of really sophisticated
spyware tools being sold to states and
-
agencies which have a long history of
abusing them to target civil society and
-
opposition. So thank you all for
listening, and I'm happy to answer some
-
questions now. If you have some questions
or if you're concerned about, you are a
-
member of civil society or an activist
or are concerned about surveillance please
-
feel free to contact us at share@amnesty.tech
Thank you.
-
Herald: Thank you Donncha. Thank you from
C-Base. We have already taken some
-
overtime this early hacker morning. There
have been popping up some small questions
-
on our internal here from our tiny
audience at C-Base. We don't have that
-
much time left. Just can you give us an
indication: What is the pace of this
-
ongoing war? Do you feel that NSO group is
actively fighting MVT and your tool
-
development or did - didn't you get this
honor yet?
-
D: Definitely. We've seen, even in the
past year, we saw NSO starting to be more
-
careful about cleaning up their forensic
traces, and since 2020, they've begun to
-
already clean some of the traces that
we've been using. And it's clear they've
-
realized that people are investigating
that there is a risk of people discovering
-
this stuff, and I feel like after the
revelations of this summer, they're going
-
to have a much more proactively trying to
to clean up some of these traces. But as I
-
said, NSO is one company out there,
there's also many other companies trying
-
to compete in the same space. So even if
NSO gets better than, you know, other
-
companies are still out there and can
still be caught using MVT and
-
fundamentally, even if they - they clean
up some traces for any kind of failed
-
attacks, these traces are still going to
be left around because it won't be
-
possible to for the spyware to clean up
their traces.
-
H: Uhm-Hmm. So one could still after an
attack eventually, eventually on an old
-
device years later discover that there had
been some spyware activity, which may be
-
in the long run interesting information
about dark campaigns and things. So NSO is
-
not the only actor, there will be more. Do
you feel that there are just copycats in
-
the market or do you think there will be
completely new threats in the future?
-
D: So I guess there's always there's lots
of smart people who work for these
-
companies who are trying to develop these
tools. Just last - earlier this month,
-
Citizen Lab published a report about
another cyber surveillance vendor called
-
Cytrox based in North Macedonia, and they
were selling similar spyware, which is
-
using kind of one-click attacks using
links to help compromise iPhones and
-
Android phones. So that's one company
that's competing in this space. There's
-
other companies doing doing similar kinds
of targeting, but we believe, you know,
-
NSO was definitely the biggest company in
this space, and they had a lot of money to
-
invest in, especially in these kind of
zero-click attacks. So for now, we don't
-
know if they're a company that's as big or
sophisticated as NSO, but I think many
-
others will be trying to take their place
if NSO becomes less popular.
-
H: I see. I see. OK, thank you very much.
We have to go over to the - RC3 morning
-
show in a few seconds. Thank you very much
for this interesting talk this morning.
-
Again, share@amnesty.tech is the address
to go to. And this is probably one of the
-
talks you want to watch again on
media.ccc.de in a few days when it has
-
been published. So greetings to Ireland.
Thank you very much and we will meet and
-
see again in real, I hope. Thank you.
D: Thank you very much. Have a good day.
-
Everything is licensed under CC by 4.0.
And it is all for the community, to download
-
Subtitles created by c3subtitles.de
in the year 2022. Join, and help us!
-
[Translated by {Iikka}{Yli-Kuivila} (ITKST56 course assignment at JYU.FI)]