A U.S. investor consortium has reportedly acquired a controlling stake in Israeli spyware developer NSO Group Ltd. The company told TechCrunch today that “an American investment group has invested tens of millions of dollars in the company and has acquired controlling ownership.” The valuation that NSO received in the deal and the names of the […] The post US investor consortium buys controlling stake in spyware developer NSO Group appeared first on SiliconANGLE.| SiliconANGLE
Details how Griselda Triana, journalist & wife of slain journalist Javier Valdez Cárdenas, was targeted with NSO Group’s Pegasus spyware after his killing.| The Citizen Lab
This is a living resource document providing links and descriptions to litigation and other formal complaints concerning digital surveillance and the digital surveillance industry.| The Citizen Lab
In this report, we describe how Canadian permanent resident and Saudi dissident Omar Abdulaziz was targeted with a fake package delivery notification. We assess with high confidence that Abdulaziz’s phone was infected with NSO’s Pegasus spyware. We attribute this infection to a Pegasus operator linked to Saudi Arabia.| The Citizen Lab
Citizen Lab validates Amnesty International investigation showing targeting of staff member and Saudi activist with NSO Group's technology.| The Citizen Lab
The international investigation into the 2014 Iguala Mass Disappearance was targeted with infection attempts using spyware developed by the NSO group.| The Citizen Lab
Mexican journalists, lawyers and a child were targeted with infection attempts using NSO Group's government-exclusive Pegasus spyware and Trident exploits.| The Citizen Lab
Research note uncovering use of NSO Group's Pegasus spyware and exploit framework to target Mexican senators and senior politicians in June and July 2016| The Citizen Lab
The court vacated the district court’s decision to dismiss the case against NSO Group, saying it abused its discretion in doing so.| CyberScoop
As reported in May 2019, WhatsApp identified and shortly thereafter fixed a vulnerability that allowed attackers to inject commercial spyware on to phones| The Citizen Lab
Exposing secrets of the Israeli national security state| Tikun Olam תיקון עולם إصلاح العالم
On July 27, 2022, Citizen Lab senior researcher John Scott-Railton spoke before the House Permanent Select Committee on Intelligence. He was invited to provide expert testimony on a hearing devoted to combatting threats to U.S. national security from the proliferation of foreign commercial spyware.| The Citizen Lab
Uncovering an extensive espionage operation infecting dozens of Thai pro-democracy campaigners with NSO Group's Pegasus spyware.| The Citizen Lab
Dada et al v. NSO Group has been one of many cases where alleged spyware victims have run into jurisdictional hurdles.| CyberScoop
Government operatives used NSO Group’s Pegasus spyware to hack 36 personal phones belonging to journalists, producers, anchors, and executives at Al Jazeera. The journalists were hacked by four Pegasus operators, including one operator MONARCHY that we attribute to Saudi Arabia, and one operator SNEAKY KESTREL that we attribute to the United Arab Emirates.| The Citizen Lab
An investigation revealing that Mexican soda tax supporters were targeted with NSO Group's government-exclusive spyware and exploit framework.| The Citizen Lab
Ahmed Mansoor was targeted by NSO Group, an Israel-based “cyber war” company that sells Pegasus, a government-exclusive “lawful intercept” spyware product.| The Citizen Lab