<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/hacking/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Mon, 23 Jun 2025 05:42:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>hacking Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is the Morris Worm? How One Man Accidentally Destroyed the Internet 30 Years Ago</title>
		<link>https://goodshepherdmedia.net/what-is-the-morris-worm-how-one-man-accidentally-destroyed-the-internet-30-years-ago/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 17:00:34 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Morris Worm]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19530</guid>

					<description><![CDATA[This Is How One Man Accidentally Destroyed the Internet 30 Years Ago It all started with the Morris worm. Pixabay Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how big the internet was — that is, how many devices were [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="cCV">
<div class="sWr">
<div class="GqV JD9">
<div class="gsz Ak6">
<div class="R1N ROm wfd">
<h1 class="aVX cS4">This Is How One Man Accidentally Destroyed the Internet 30 Years Ago</h1>
</div>
<div class="r87 uRt">
<h2>It all started with the Morris worm.</h2>
</div>
<div class="rAY _9O">
<div></div>
</div>
</div>
<div class="daF">
<div class="pxF oL7 YOh"><picture><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z geM" src="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="" /></picture></div>
</div>
<p><span class="Vms j29"><a href="https://pixabay.com/en/hacking-cyber-blackandwhite-crime-2903156/" target="_blank" rel="noopener noreferrer">Pixabay</a></span></p>
</div>
</div>
</div>
<div class="tn6">
<div class="AOL Afg" data-adroot="true">
<p>Back in November 1988, Robert Tappan Morris, son of the famous cryptographer <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">Robert Morris Sr.</a>, was a 20-something graduate student at Cornell who wanted to know <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">how big</a> the internet was — that is, how many devices were connected to it. So he wrote a program that would <a href="http://www.foo.be/docs-free/morris-worm/" target="_blank" rel="noopener noreferrer">travel from computer to computer</a> and ask each machine to send a signal back to a control server, which would keep count.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-1" data-google-query-id="CIjamtf9_4sDFY8I7wId-ZQQEg">
<div id="google_ads_iframe_/49944529/inverse/posts_0__container__">The program worked well — too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren’t enough to keep the program from <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">clogging up large sections of the internet</a>, both copying itself to new machines and sending those pings back. When he realized what was happening, even his <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">messages warning system administrators</a> about the problem couldn’t get through.</div>
</div>
</div>
<div class="sWr iGR">
<div class="yFJ">
<div class="jjV">
<div class="_Qy wmr">
<div id="jwplayer-video-1" class="jwplayer jw-reset jw-state-paused jw-stretch-uniform jw-flag-aspect-mode jw-breakpoint-5 jw-floating-dismissible jw-flag-ads jw-flag-ads-googleima jw-flag-user-inactive" tabindex="0" role="application" aria-label="Video Player - This Quantum Device Will Protect You From Cyberattacks to Make &quot;True&quot; Random Numbers">
<div class="jw-wrapper jw-reset">
<div class="jw-controls jw-reset">
<div class="jw-controlbar jw-reset">
<div class="jw-reset jw-button-container">
<div class="jw-reset jw-spacer">His program became the first of a particular type of <a href="https://www.inverse.com/article/48293-5g-future-cybersecurity-risks">cyberattack</a> called “<a href="https://theconversation.com/attackers-can-make-it-impossible-to-dial-911-67980" target="_blank" rel="noopener noreferrer">distributed denial of service</a>,” in which large numbers of internet-connected devices, including computers, <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">webcams</a>, and <a href="https://theconversation.com/police-around-the-world-learn-to-fight-global-scale-cybercrime-75804" target="_blank" rel="noopener noreferrer">other smart gadgets</a>, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-2" data-google-query-id="CMC61df9_4sDFWBZCAQdjKAwLA">
<div id="google_ads_iframe_/49944529/inverse/posts_1__container__">As the chair of the integrated <a href="https://cybersecurityprograms.indiana.edu/" target="_blank" rel="noopener noreferrer">Indiana University Cybersecurity Program</a>, I can report that these kinds of attacks are <a href="http://bwcio.businessworld.in/article/Verisign-releases-DDOS-Trends-Report-of-Q2-2018/05-10-2018-161517/" target="_blank" rel="noopener noreferrer">increasingly frequent</a> today. In many ways, Morris’s program, known to history as the “Morris worm,” set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3208018" target="_blank" rel="noopener noreferrer">Internet of Everything</a>.”</div>
</div>
</div>
<h2>Unpacking the Morris Worm</h2>
<p>Worms and <a href="https://www.inverse.com/article/44826-pig-virus-human-hosts-human-cells-study-shows">viruses</a> are similar but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book.</p>
<p>In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">halt the worm</a>. In that time, it infected tens of thousands of systems — about <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">10 percent of the computers then on the internet</a>. Cleaning up the infection cost <a href="https://en.wikipedia.org/wiki/Morris_worm#cite_note-6" target="_blank" rel="noopener noreferrer">hundreds or thousands of dollars</a> for each affected machine.</p>
<p>In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">people could catch the computer infection</a>. Sadly, many journalists as a whole <a href="https://medium.com/@davelee/reporting-on-cyberattacks-the-medias-urgent-problem-d6c450a3383a" target="_blank" rel="noopener noreferrer">haven’t gotten much more knowledgeable on the topic</a> in the intervening decades.</p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s-817845468"><picture><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z B9M" src="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="Robert Tappan Morris, in 2008." /></picture></div><figcaption class="rv9 tm3">
<div>
<p>Robert Tappan Morris, in 2008.</p>
</div>
<p><cite class="Afu _Nh"><a href="https://commons.wikimedia.org/wiki/File:Robert_Tappan_Morris.jpg" target="_blank" rel="noopener noreferrer">Trevor Blackwell/Wikimedia, CC BY-SA</a></cite></p>
</figcaption></figure>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-3" data-google-query-id="COiN19j9_4sDFYQ4RAgdtKYB9A">
<div id="google_ads_iframe_/49944529/inverse/posts_2__container__">Morris wasn’t trying to destroy the internet, but the worm’s widespread effects resulted in him being <a href="https://www.wired.com/2011/07/0726first-computer-fraud-indictment/" target="_blank" rel="noopener noreferrer">prosecuted</a> under the then-new <a href="https://theconversation.com/malwaretechs-arrest-sheds-light-on-the-complex-culture-of-the-hacking-world-82136" target="_blank" rel="noopener noreferrer">Computer Fraud and Abuse Act</a>. He was sentenced to three years of probation and a roughly $10,000 fine. In the late 1990s, though, he became a <a href="https://www.cnet.com/news/yahoo-buys-viaweb-for-49-million/" target="_blank" rel="noopener noreferrer">dot-com millionaire</a> — and is now a <a href="https://pdos.csail.mit.edu/%257Ertm/" target="_blank" rel="noopener noreferrer">professor at MIT</a>.</div>
</div>
</div>
<h2>Rising Threats</h2>
<p>The internet remains subject to much more frequent — and more crippling — DDoS attacks. With more than <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/" target="_blank" rel="noopener noreferrer">20 billion</a> devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding.</p>
<p>In October 2016, a DDoS attack using <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">thousands of hijacked webcams</a> — often used for security or baby monitors — <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank" rel="noopener noreferrer">shut down access to a number of important internet services</a> along the eastern US seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by <a href="https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/" target="_blank" rel="noopener noreferrer">software called Mirai</a>. Today’s internet is much larger, but not much more secure, than the internet of 1988.</p>
<p>Some things have actually gotten worse. Figuring out <a href="https://doi.org/10.1080/01402390.2014.977382" target="_blank" rel="noopener noreferrer">who is behind particular attacks</a> is not as easy as waiting for that person to get worried and <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">send out apology notes and warnings</a>, as Morris did in 1988. In some cases — the ones big enough to merit full investigations — it’s possible to identify the culprits. A trio of college students was ultimately found to have <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/" target="_blank" rel="noopener noreferrer">created Mirai to gain advantages</a> when playing the <em>Minecraft</em> computer game.</p>
<h2>Fighting DDoS Attacks</h2>
<p>But technological tools are not enough, and neither are laws and regulations about online activity — including the <a href="https://ssrn.com/abstract=2573787" target="_blank" rel="noopener noreferrer">law under which Morris was charged</a>. The dozens of state and federal cybercrime statutes on the books have <a href="https://phys.org/news/2018-02-cyberattacks-costly-worse.html" target="_blank" rel="noopener noreferrer">not yet seemed to reduce the overall number or severity</a> of attacks, in part because of the <a href="https://www.csoonline.com/article/3153707/security/top-cybersecurity-facts-figures-and-statistics.html" target="_blank" rel="noopener noreferrer">global nature</a> of the problem.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-4" data-google-query-id="CKq1rOL9_4sDFUzl_QUdBhsrdQ">
<div id="google_ads_iframe_/49944529/inverse/posts_3__container__">There are some efforts underway in Congress to <a href="https://www.fifthdomain.com/congress/policy/2018/10/12/support-for-hack-back-grows-after-trumps-pledge-to-get-aggressive-in-cyberspace/" target="_blank" rel="noopener noreferrer">allow attack victims in some cases to engage in active defense measures</a> — a <a href="https://www.lawfareblog.com/tagged/hacking-back" target="_blank" rel="noopener noreferrer">notion</a> that comes with a number of downsides, including the risk of escalation — and to <a href="https://www.reuters.com/article/us-usa-cyber-congress-idUSKBN1AH474" target="_blank" rel="noopener noreferrer">require better security</a> for internet-connected devices. But passage is far from assured.</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU">
<div id="ad-5" data-google-query-id="CLfExuL9_4sDFa78_QUdu4cnBg">
<div id="google_ads_iframe_/49944529/inverse/posts_4__container__">There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world’s first <a href="https://www.sei.cmu.edu/about/divisions/cert/index.cfm#history" target="_blank" rel="noopener noreferrer">Cyber Emergency Response Team</a>, which has been replicated <a href="https://www.us-cert.gov/" target="_blank" rel="noopener noreferrer">in the federal government</a> and <a href="http://www.internationalcybercenter.org/certicc/certworld" target="_blank" rel="noopener noreferrer">around the world</a>. Some policymakers are talking about establishing a <a href="https://www.securityweek.com/does-us-need-national-cybersecurity-safety-board" target="_blank" rel="noopener noreferrer">national cybersecurity safety board</a>, to <a href="https://theconversation.com/what-cybersecurity-investigators-can-learn-from-airplane-crashes-91177" target="_blank" rel="noopener noreferrer">investigate digital weaknesses and issue recommendations</a>, much as the National Transportation Safety Board does with <a href="https://www.inverse.com/article/49548-element-one-hydrogen-fuel-plane-2025">airplane</a> disasters.</div>
</div>
</div>
<p>More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of <a href="https://theconversation.com/notpetya-ransomware-attack-shows-corporate-social-responsibility-should-include-cybersecurity-79810" target="_blank" rel="noopener noreferrer">corporate social responsibility</a>, they — and their staff, customers, and business partners — would be safer.</p>
<p>In <a href="https://www.penguinrandomhouse.com/books/28148/3001-the-final-odyssey-by-arthur-c-clarke/9780345423498/" target="_blank" rel="noopener noreferrer"><em>3001: The Final Odyssey</em></a>, science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon — which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone — governments, companies, and individuals alike — to set up rules and programs that support widespread cybersecurity, without waiting another 30 years. <a href="https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris" target="_blank" rel="noopener">source</a></p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s1359406774"><picture><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" /></picture></div>
</figure>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA Plans to Infect Millions of Computers with Malware using AI</title>
		<link>https://goodshepherdmedia.net/nsa-plans-to-infect-millions-of-computers-with-malware-using-ai/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 25 Jan 2025 19:43:47 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18039</guid>

					<description><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA Plans to Infect Millions of Computers with Malware using AI</h1>
<p>Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.</p>
<p>The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.</p>
<p>The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.</p>
<p>In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.</p>
<p>The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by <em>The Intercept</em> show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”</p>
<p>In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.</p>
<p>Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm <a href="http://home.f-secure.com/en_US/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">F-Secure</a>, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.</p>
<p>“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”</p>
<p>Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”</p>
<p>“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”</p>
<p>The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”</p>
<p>&nbsp;</p>
<h4>“Owning the Net”</h4>
<p>The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret <a href="https://theintercept.com/document/2014/03/12/thousands-implants/">internal records</a>, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.</p>
<p>To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.</p>
<p>In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.</p>
<p>But the NSA recognized that managing a massive network of implants is too big a job for humans alone.</p>
<p>“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”</p>
<p>The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that <a href="https://theintercept.com/document/2014/03/12/industrial-scale-exploitation/">enables</a> “industrial-scale exploitation.”</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in <a href="https://theintercept.com/document/2014/03/12/nsa-technology-directorate-analysis-converged-data/">one secret document</a> from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”</p>
<p>In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.</p>
<p>The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)</p>
<p>&nbsp;</p>
<div class="default"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-18041" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp" alt="" width="1024" height="86" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-400x34.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-768x65.webp 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></div>
<p>&nbsp;</p>
<p>Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.</p>
<p><a href="http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=1" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Earlier</a> <a href="http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reports</a> based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks <a href="http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">across the world</a>, with plans to keep on scaling up those numbers.</p>
<p>The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”</p>
<p>The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”</p>
<h4>Circumventing Encryption</h4>
<p>The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.</p>
<p>One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.</p>
<p>An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.</p>
<p>The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.</p>
<p>It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.</p>
<p>Previous reports <a href="http://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">have alleged</a> that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also <a href="http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reportedly</a> worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.</p>
<p>According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.</p>
<p>In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.</p>
<p>The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”</p>
<p>Similar tactics have been adopted by Government Communications Headquarters, the NSA’s British counterpart. As the German newspaper <em>Der Spiegel</em> <a href="http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported</a> in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.</p>
<p>The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.</p>
<p>Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.</p>
<p>Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a <a href="http://www.techterms.com/definition/vpn" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Virtual Private Network</a>, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.</p>
<div class="default"><img decoding="async" class="alignnone size-full wp-image-18042" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp" alt="" width="618" height="467" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn-400x302.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /></div>
<p>The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.</p>
<div class="default"><img decoding="async" class="alignnone size-full wp-image-18043" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp" alt="" width="621" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp 621w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip-400x302.webp 400w" sizes="(max-width: 621px) 100vw, 621px" /></div>
<p>But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on <a href="https://theintercept.com/document/2014/03/12/one-way-quantum/">a classified list</a> that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.</p>
<p>&nbsp;</p>
<h4>“Mass exploitation potential”</h4>
<p>Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.</p>
<p>According to <a href="https://theintercept.com/document/2014/03/12/nsa-phishing-tactics-man-middle-attacks/">one top-secret document</a> from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.</p>
<p>There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.</p>
<p>Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.</p>
<p>To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors <a href="https://theintercept.com/document/2014/03/12/quantum-insert-diagrams/">alert the TURBINE system</a>, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second.</p>
<p>In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.</p>
<p><iframe id="vimeo-3998515" class="social-iframe social-iframe--vimeo" src="https://player.vimeo.com/video/88822483?title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;color=8280FF" width="100%" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.</p>
<p>According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system.</p>
<p>“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying,” Blaze says.</p>
<p>“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”</p>
<p>In an email statement to <em>The Intercept</em>, Facebook spokesman Jay Nancarrow said the company had “no evidence of this alleged activity.” He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.</p>
<p>Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. “If government agencies indeed have privileged access to network service providers,” he said, “any site running only [unencrypted] HTTP could conceivably have its traffic misdirected.”</p>
<p>A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.</p>
<p>This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.</p>
<p>The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is <a href="https://blogs.rsa.com/man-in-the-middle-standing-between-you-and-your-cash/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes used by criminal hackers</a> to defraud people.</p>
<p>A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. In October, details about the FOXACID system were <a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported by the <em>Guardian</em></a>, which revealed its links to attacks against users of the Internet anonymity service Tor.</p>
<p>But SECONDDATE is tailored not only for “surgical” surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.</p>
<p>According to the 2012 presentation, the tactic has “mass exploitation potential for clients passing through network choke points.”</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/tao-2-1024x768.png" alt="" /></div>
<p>Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale “seems very disturbing.” Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.</p>
<p>“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”</p>
<p>To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.</p>
<p>The agency’s hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.</p>
<p>The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct – deleting itself from an infected computer after a set time expires.</p>
<p>In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”</p>
<p>&nbsp;</p>
<h4>Covert Infrastructure</h4>
<p>The TURBINE implants system does not operate in isolation.</p>
<p>It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has <a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">installed at locations across the world</a>.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/turbine_turmoil_maps-1-1024x768.png" alt="" /></div>
<p>The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.</p>
<p>The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.</p>
<p>When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.</p>
<p>The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.</p>
<p>Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/selectors-1024x768.png" alt="" /></div>
<p>What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.</p>
<p>Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.</p>
<p>GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.</p>
<p><a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">Top-secret documents</a> show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to <a href="https://theintercept.com/document/2014/03/12/menwith-hill-station-leverages-xkeyscore-quantum-yahoo-hotmail/">experiment</a> with implant “exploitation” attacks against users of Yahoo and Hotmail.</p>
<p>In <a href="https://theintercept.com/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics/">one document</a> dated 2010, at least five variants of the QUANTUM hacking method were listed as being “operational” at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities – and test two others – as part of a surveillance system it operates codenamed INSENSER.</p>
<p>GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, <a href="https://www.documentcloud.org/documents/894386-legal-issues-uk-regarding-sweden-and-quantum.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">previously disclosed</a> by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately <a href="https://www.documentcloud.org/documents/1077367-uk-perspective-on-mikey-ibake.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">voiced concerns</a> that performing “active” hacking attacks for surveillance “may be illegal” under British law.</p>
<p>In response to questions from <em>The Intercept</em>, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”</p>
<p>Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA’s primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.</p>
<p>“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in <a href="https://theintercept.com/document/2014/03/12/five-eyes-hacking-large-routers/">a top-secret document</a> dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.” <a href="https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Check if Your Cellphone Is Infected With Pegasus Spyware</title>
		<link>https://goodshepherdmedia.net/how-to-check-if-your-cellphone-is-infected-with-pegasus-spyware/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 20:54:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[A Complete (Updating) List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[A Complete List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[How to Check if Your Cellphone Is Infected With Pegasus Spyware]]></category>
		<category><![CDATA[HOW TO DETECT SPYWARE ON PHONE]]></category>
		<category><![CDATA[NSO GROUP]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Pegasus Spyware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[The NSO File]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18275</guid>

					<description><![CDATA[They’re watching us: How to detect Pegasus and other spyware on your iOS device? The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked How does Pegasus and other spyware work discreetly to access [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="header__title title-h2 mb-24 mt-md-48 mt-lg-64 mt-xl-64">They’re watching us: How to detect Pegasus and other spyware on your iOS device?</h1>
<blockquote>
<h3><span style="color: #ff0000;"><em><strong>The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked</strong></em></span></h3>
</blockquote>
<div class="c-16 c-md-9">
<div class="header--blog-post">
<div class="header__wrapper">
<div class="header__post-info post-info">
<h2 class="header__text mb-xs-48 mb-64 mb-lg-96 mb-xl-96">How does Pegasus and other spyware work discreetly to access everything on your iOS device?</h2>
</div>
</div>
</div>
</div>
<p><img loading="lazy" decoding="async" class="size-large wp-image-18276 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp" alt="" width="640" height="372" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-400x233.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-768x446.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware.webp 1280w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<div class="blog-post-content__section--text">
<h2>Introduction</h2>
<p>In today’s digital age, mobile phones and devices have evolved from being exclusive to a few to becoming an absolute need for everyone, aiding us in both personal and professional pursuits. However, these devices, often considered personal, can compromise our privacy when accessed by nefarious cybercriminals.</p>
<p>Malicious mobile software has time and again been wielded as a sneaky weapon to compromise the sensitive information of targeted individuals. Cybercriminals build complex applications capable of operating on victims’ devices unbeknownst to them, concealing the threat and the intentions behind it. Despite the common belief among iOS users that their devices offer complete security, shielding them from such attacks, recent developments, such as the emergence of Pegasus spyware, have shattered this pretense.</p>
<p>The first iOS exploitation by Pegasus spyware was <a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">recorded</a> in August 2016, facilitated through spear-phishing attempts—text messages or emails that trick a target into clicking on a malicious link.</p>
<h2>What is Pegasus spyware?</h2>
<p>Developed by the <a href="https://www.nsogroup.com/">Israeli company NSO Group</a>, Pegasus spyware is malicious software designed to gather sensitive information from devices and users illicitly. Initially licensed by governments for targeted cyber espionage purposes, it is a sophisticated tool for remotely placing spyware on targeted devices to pry into and reveal information. Its ‘zero-click’ capability makes it particularly dangerous as it can infiltrate devices without any action required from the user.</p>
<p>Pegasus can gather a wide range of sensitive information from infected devices, including messages, audio logs, GPS location, device information, and more. It can also remotely activate the device’s camera and microphone, essentially turning the device into a powerful tool for illegal surveillance.</p>
<p>Over time, NSO Group has become more creative in its methods of unwarranted intrusions into devices.  The company, which was founded in 2010, claims itself to be a “leader” in <a href="https://www.documentcloud.org/documents/815991-1276-nso-group-brochure-pegasus.html">mobile and cellular cyber warfare</a>.</p>
<p>Pegasus is also capable of accessing data from both iOS and Android-powered devices. The fact that it can be deployed through convenient gateways such as SMS, WhatsApp, or iMessage makes it an effortless tool to trick users into installing the spyware without their knowledge. This poses a significant threat to the privacy and security of individuals and organizations targeted by such attacks.</p>
<h2>How does Pegasus spyware work?</h2>
<p>Pegasus is extremely efficient due to its strategic development to use zero-day vulnerabilities, code obfuscation, and encryption. NSO Group provides two methods for remotely installing spyware on a target’s device: a zero-click method and a one-click method. The one-click method includes sending the target a regular SMS text message containing a link to a malicious website. This website then exploits vulnerabilities in the target’s web browser, along with any additional exploits needed to implant the spyware.</p>
<p>Zero-click attacks do not require any action from device users to establish an unauthorized connection, as they exploit ‘zero-day’ vulnerabilities to gain entry into the system. Once the spyware is installed, Pegasus actively captures the intended data about the device. After installation, Pegasus needs to be constantly upgraded and managed to adapt to device settings and configurations. Additionally, it may be programmed to uninstall itself or self-destruct if exposed or if it no longer provides valuable information to the threat actor.</p>
<p>Now that we’ve studied what Pegasus is and the privacy concerns it raises for users, this blog will further focus on discussing precautionary and investigation measures. The suggested methodology can be leveraged to detect not just Pegasus spyware but also <a href="https://www.group-ib.com/blog/operation-triangulation/">Operation Triangulation</a>, <a href="https://www.itpro.com/security/spyware/370302/greek-intelligence-predator-spyware-wiretap-facebook-staffer">Predator spyware</a>, and more.</p>
<p>Let’s explore how to check iOS or iPadOS devices for signs of compromise when only an iTunes backup is available and obtaining a full file system dump isn’t a viable option.</p>
<p>In recent years, targeted attacks against iOS devices have made headlines regularly. Although the infections are not widespread and they hardly affect more than 100 devices per wave, such attacks still pose serious risks to Apple users. The risks have appeared as a result of iOS becoming an increasingly complex and open system, over the years, to enhance user experience. <b>A good example of this is the flawed design of the iMessage application, which wasn’t protected through the operating system’s sandbox mechanisms. </b></p>
<p>Apple failed to patch this flaw with a security feature called BlastDoorin iOS 14, instead implementing a Lockdown Mode mechanism that, for now, cybercriminals have not been able to bypass. <a href="https://github.com/blacktop/presentations/blob/main/0x41con_2023/PDF/AnatomyOfLockdownMode.pdf">Learn more about Lockdown Mode here</a>.</p>
<p>While BlastDoor provides a flexible solution through sandbox analysis, Lockdown Mode imposes limitations on iMessage functionality. Nonetheless, the vulnerabilities associated with ImageIO may prompt users to consider disabling iMessage permanently. Another major problem is that there are no mechanisms to examine an infected iOS device directly. Researchers have three options:</p>
<ol>
<li>Put the device in a safe and wait until an exploit is developed that can extract the full file system dump</li>
<li>Analyze the device’s network traffic (with certain limitations as not all viruses can transmit data via Wi-Fi)</li>
<li>Explore a backup copy of an iOS device, despite data extraction limitations</li>
</ol>
<p>The backup copy must be taken only with encryption (password protection) as data sets in encrypted and unencrypted copies differ. Here, our analysts focus on the third approach, as it is a pragmatic way to safely examine potential infections without directly interacting with the compromised device. This approach allows researchers to analyze the device’s data in a controlled environment, avoiding any risk of further compromising the device and losing valuable evidence that forms the ground for crucial investigation and analysis.</p>
<p>To conduct research effectively, the users will need either a Mac or Linux device. Linux virtual machines can also be used, but it is recommended that users avoid using Windows Subsystem for Linux as it has issues with forwarding USB ports.</p>
<p>In the analysis performed by Group-IB experts, we use an open-source tool called <a href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit (MVT)</a>, which is supported by a <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">methodology report</a>.</p>
<p>Let’s start with installing dependencies:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install python3 python3-pip libusb-1.0-0 sqlite3</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Next, install a set of tools for creating and working with iTunes backups:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install libimobiledevice-utils</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Lastly, install MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">git clone https://github.com/mvt-project/mvt.git<br />
cd mvt<br />
pip3 install</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Now, let’s begin with the analysis. To create a backup, perform the following:</p>
<ol>
<li>Connect the iOS device and verify the pairing process by entering your passcode.</li>
<li>Enter the following command:</li>
</ol>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ideviceinfo</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Users will receive a substantial output with information about the connected device, such as the iOS version and model type:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ProductName: iPhone OS<br />
ProductType: iPhone12.5<br />
ProductVersion: 17.2.1</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After that, users can set a password for the device backup:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 -i encryption on</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Enter the password for the backup copy and confirm it by entering your phone’s passcode.</p>
<p>As mentioned, the above step is crucial to ensure the integrity of the data extracted from the device.</p>
<p>Create the encrypted copy:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 backup &#8211;full /path/to/backup/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>This process may take a while depending on the amount of space available on your device. Users will also need to enter the passcode again.</p>
<p>Once the backup is complete (as indicated by the<i> Backup Successful</i> message), the users will need to decrypt it.</p>
<p>To do so, use MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios decrypt-backup -p [password] -d /path/to/decrypted /path/to/backup</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After being through with the process, users may have successfully decrypted the backup.</p>
<p>Now, let’s check for known indicators. Download the most recent IoCs (Indicators of Compromise):</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios download-iocs</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>We can also track IoCs relating to other spyware attacks from several sources, such as:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;NSO Group Pegasus Indicators of Compromise&#8221;<br />
&#8220;Predator Spyware Indicators of Compromise&#8221;<br />
&#8220;RCS Lab Spyware Indicators of Compromise&#8221;<br />
&#8220;Stalkerware Indicators of Compromise&#8221;<br />
&#8220;Surveillance Campaign linked to mercenary spyware company&#8221;<br />
&#8220;Quadream KingSpawn Indicators of Compromise&#8221;<br />
&#8220;Operation Triangulation Indicators of Compromise&#8221;<br />
&#8220;WyrmSpy and DragonEgg Indicators of Compromise&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/AmnestyTech/investigations">Indicators from Amnesty International’s investigations</a></li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/mvt-project/mvt-indicators">Index and collection of MVT compatibile indicators of compromise</a></li>
</ul>
<p>The next step is to launch the scanning:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios check-backup &#8211;output /path/to/output/ /path/to/decrypted/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>The users will obtain the following <a href="https://docs.mvt.re/en/latest/ios/records/">set of JSON files for analysis</a>.</p>
<p>If any infections are detected, the users will receive a *_detected.json file with detections.</p>
<div id="attachment_31382" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18333" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png" alt="" width="1600" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-400x100.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1024x255.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-768x192.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1536x383.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31382" class="wp-caption-text">Image 1: Result of MVT IOCs scan with four detections</p>
</div>
<div id="attachment_31383" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18334" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png" alt="" width="1600" height="380" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-400x95.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1024x243.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-768x182.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1536x365.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31383" class="wp-caption-text">Image 2: The detected results are saved in separate files with “_detected” ending</p>
</div>
<p>If there are suspicions of spyware or malware without IOCs, but there are no detections, and a full file system dump isn’t feasible, users will need to work with the resources at hand. The most valuable files in the backup include:</p>
<p><em><b>Safari_history.json</b></em> – check for any suspicious redirects and websites.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;id&#8221;: 5,<br />
&#8220;url&#8221;: &#8220;http://yahoo.fr/&#8221;,<br />
&#8220;visit_id&#8221;: 7,<br />
&#8220;timestamp&#8221;: 726652004.790012,<br />
&#8220;isodate&#8221;: &#8220;2024-01-11 07:46:44.790012&#8221;,<br />
&#8220;redirect_source&#8221;: null,<br />
&#8220;redirect_destination&#8221;: 8,<br />
&#8220;safari_history_db&#8221;: &#8220;1a/1a0e7afc19d307da602ccdcece51af33afe92c53&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Datausage.json </b></em>– check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;first_isodate&#8221;: &#8220;2023-11-21 15:39:34.001225&#8221;,<br />
&#8220;isodate&#8221;: &#8220;2023-12-14 03:05:02.321592&#8221;,<br />
&#8220;proc_name&#8221;: &#8220;mDNSResponder/com.apple.datausage.maps&#8221;,<br />
&#8220;bundle_id&#8221;: &#8220;com.apple.datausage.maps&#8221;,<br />
&#8220;proc_id&#8221;: 69,<br />
&#8220;wifi_in&#8221;: 0.0,<br />
&#8220;wifi_out&#8221;: 0.0,<br />
&#8220;wwan_in&#8221;: 3381.0,<br />
&#8220;wwan_out&#8221;: 8224.0,<br />
&#8220;live_id&#8221;: 130,<br />
&#8220;live_proc_id&#8221;: 69,<br />
&#8220;live_isodate&#8221;: &#8220;2023-12-14 02:45:10.343919&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Os_analytics_ad_daily.json</b></em> – check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;package&#8221;: &#8220;storekitd&#8221;,<br />
&#8220;ts&#8221;: &#8220;2023-07-11 05:24:31.981691&#8221;,<br />
&#8220;wifi_in&#8221;: 400771.0,<br />
&#8220;wifi_out&#8221;: 52607.0,<br />
&#8220;wwan_in&#8221;: 0.0,<br />
&#8220;wwan_out&#8221;: 0.0</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Keeping a backup copy of a control device is required to maintain a record of the current names of legitimate processes within a specific iOS version. This control device can be completely reset and reconfigured with the same iOS version. Although annual releases often introduce significant changes, new legitimate processes may still be added, even within a year, through major system updates.</p>
<p><em><b>Sms.json</b></em> – check for links, the content of these links, and domain information.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "ROWID": 97,
        "guid": "9CCE3479-D446-65BF-6D00-00FC30F105F1",
        "text": "",
        "replace": 0,
        "service_center": null,
        "handle_id": 1,
        "subject": null,
        "country": null,
        "attributedBody": "",
        "version": 10,
        "type": 0,
        "service": "SMS",
        "account": "P:+66********",
        "account_guid": "54EB51F8-A905-42D5-832E-D98E86E4F919",
        "error": 0,
        "date": 718245997147878016,
        "date_read": 720004865472528896,
        "date_delivered": 0,
        "is_delivered": 1,
        "is_finished": 1,
        "is_emote": 0,
        "is_from_me": 0,
        "is_empty": 0,
        "is_delayed": 0,
        "is_auto_reply": 0,
        "is_prepared": 0,
        "is_read": 1,
        "is_system_message": 0,
        "is_sent": 0,
        "has_dd_results": 1,
        "is_service_message": 0,
        "is_forward": 0,
        "was_downgraded": 0,
        "is_archive": 0,
        "cache_has_attachments": 0,
        "cache_roomnames": null,
        "was_data_detected": 1,
        "was_deduplicated": 0,
        "is_audio_message": 0,
        "is_played": 0,
        "date_played": 0,
        "item_type": 0,
        "other_handle": 0,
        "group_title": null,
        "group_action_type": 0,
        "share_status": 0,
        "share_direction": 0,
        "is_expirable": 0,
        "expire_state": 0,
        "message_action_type": 0,
        "message_source": 0,
        "associated_message_guid": null,
        "associated_message_type": 0,
        "balloon_bundle_id": null,
        "payload_data": null,
        "expressive_send_style_id": null,
        "associated_message_range_location": 0,
        "associated_message_range_length": 0,
        "time_expressive_send_played": 0,
        "message_summary_info": null,
        "ck_sync_state": 0,
        "ck_record_id": null,
        "ck_record_change_tag": null,
        "destination_caller_id": "+66926477437",
        "is_corrupt": 0,
        "reply_to_guid": "814A603F-4FEC-7442-0CBF-970C14217E1B",
        "sort_id": 0,
        "is_spam": 0,
        "has_unseen_mention": 0,
        "thread_originator_guid": null,
        "thread_originator_part": null,
        "syndication_ranges": null,
        "synced_syndication_ranges": null,
        "was_delivered_quietly": 0,
        "did_notify_recipient": 0,
        "date_retracted": 0,
        "date_edited": 0,
        "was_detonated": 0,
        "part_count": 1,
        "is_stewie": 0,
        "is_kt_verified": 0,
        "is_sos": 0,
        "is_critical": 0,
        "bia_reference_id": null,
        "fallback_hash": "s:mailto:ais|(null)(4)&lt;7AD4E8732BAF100ABBAF4FAE21CBC3AE05487253AC4F373B7D1470FDED6CFE91&gt;",
        "phone_number": "AIS",
        "isodate": "2023-10-06 00:46:37.000000",
        "isodate_read": "2023-10-26 09:21:05.000000",
        "direction": "received",
        "links": [
            "https://m.ais.co.th/J1Hpm91ix"
        ]
    },</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Sms_attachments.json</b></em> – check for suspicious attachments.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "attachment_id": 4,
        "ROWID": 4,
        "guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "created_date": 726724286,
        "start_date": "",
        "filename": "~/Library/SMS/Attachments/b8/08/97883E8C-99FA-40ED-8E78-36DAC89B2939/IMG_0005.HEIC",
        "uti": "public.heic",
        "mime_type": "image/heic",
        "transfer_state": 5,
        "is_outgoing": 1,
        "user_info": ",
        "transfer_name": "IMG_0005.HEIC",
        "total_bytes": 1614577,
        "is_sticker": 0,
        "sticker_user_info": null,
        "attribution_info": null,
        "hide_attachment": 0,
        "ck_sync_state": 0,
        "ck_server_change_token_blob": null,
        "ck_record_id": null,
        "original_guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "is_commsafety_sensitive": 0,
        "service": "iMessage",
        "phone_number": "*",
        "isodate": "2024-01-12 03:51:26.000000",
        "direction": "sent",
        "has_user_info": true
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Webkit_session_resource_log.json </b></em>and<b> </b><em><b>webkit_resource_load_statistics.json</b></em> – check for suspicious domains.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>{
        "domain_id": 22,
        "registrable_domain": "sitecdn.com",
        "last_seen": 1704959295.0,
        "had_user_interaction": false,
        "last_seen_isodate": "2024-01-11 07:48:15.000000",
        "domain": "AppDomain-com.apple.mobilesafari",
        "path": "Library/WebKit/WebsiteData/ResourceLoadStatistics/observations.db"
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Tcc.json </b></em>– check which applications have been granted which permissions.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "service": "kTCCServiceMotion",
        "client": "com.apple.Health",
        "client_type": "bundle_id",
        "auth_value": "allowed",
        "auth_reason_desc": "system_set",
        "last_modified": "2023-07-11 06:25:15.000000"</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>To collect data about processes, users can use XCode Instruments.</p>
<p><b><i>Note: Developer mode must be enabled on the iOS device.</i></b></p>
<div id="attachment_31384" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18331" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp" alt="" width="787" height="482" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp 787w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-400x245.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-768x470.webp 768w" sizes="(max-width: 787px) 100vw, 787px" /></p>
<p id="caption-attachment-31384" class="wp-caption-text">Image 3: Showcasing XCode instruments profile selection</p>
</div>
<p>Process data collection:</p>
<div id="attachment_31381" class="wp-caption alignnone">
<figure id="attachment_18332" aria-describedby="caption-attachment-18332" style="width: 1600px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-18332" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg" alt="" width="1600" height="791" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-400x198.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1024x506.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-768x380.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1536x759.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /><figcaption id="caption-attachment-18332" class="wp-caption-text">Screenshot</figcaption></figure>
<p id="caption-attachment-31381" class="wp-caption-text">Image 4: Process list from iPhone</p>
</div>
<h2>Overcoming the iOS interception challenge</h2>
<h3>For the common public</h3>
<p>iOS security architecture typically prevents normal apps from performing unauthorized surveillance. However, a jailbroken device can bypass these security measures. Pegasus and other mobile malware may exploit remote jailbreak exploits to steer clear of detection by security mechanisms. This enables operators to install new software, extract data, and monitor and collect information from targeted devices.</p>
<p>Warning signs of an infection on the device include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Slower device performance</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Spontaneous reboots or shutdowns</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Rapid battery drain</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Appearance of previously uninstalled applications</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Unexpected redirects to unfamiliar websites</li>
</ul>
<p>This reinstates the critical importance of maintaining up-to-date devices and prioritizing mobile security. Recommendations for end-users include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Avoid clicking on suspicious links</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Review app permissions regularly</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Enable Lockdown mode for protection against spyware attacks</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Consider disabling iMessage and FaceTime for added security</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Always install the updated version of the iOS</li>
</ul>
<h3>For businesses: Protect against Pegasus and other APT mobile malware</h3>
<p>Securing mobile devices, applications, and APIs is crucial, particularly when they handle financial transactions and store sensitive data. Organizations operating in critical sectors, government, and other industries are prime targets for cyberattacks such as espionage and more, especially high-level employees.</p>
<p>Researching iOS devices presents challenges due to the closed nature of the system. <a href="https://www.group-ib.com/products/threat-intelligence/">Group-IB Threat Intelligence</a>, however, helps organizations worldwide identify cyber threats in different environments, including iOS, with our recent discovery being <a href="https://www.group-ib.com/media-center/press-releases/golddigger-trojan-vietnam/"><strong>GoldPickaxe.iOS</strong></a> – the first iOS Trojan harvesting facial scans and using them to potentially gain unauthorized access to bank accounts. Group-IB Threat Intelligence provides a constant feed on new and previously conducted cyber attacks, the tactics, techniques, and behaviors of threat actors, and susceptibility of attacks based on your organization’s risk profile— giving a clear picture of how your devices can be exploited by vectors, to initiate timely and effective defense mechanisms.</p>
<p>If you suspect your iOS or Android device has been compromised by Pegasus or similar spyware, turn to our <a href="https://www.group-ib.com/contacts/">experts for immediate support</a>. To perform device analysis or set up additional security measures, organizations can also get in touch with <a href="https://www.group-ib.com/services/digital-forensics/">Group-IB’s Digital Forensics team</a> for assistance. <a href="https://www.group-ib.com/blog/pegasus-spyware/" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="post__title">HOW TO DEFEND YOURSELF AGAINST THE POWERFUL NEW NSO SPYWARE ATTACKS DISCOVERED AROUND THE WORLD</h1>
<p>Even iPhones were vulnerable to the surveillance software, which appears to have been used against activists, journalists, and others.</p>
<p><u>AN INTERNATIONAL GROUP</u> of journalists this month <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed </a><a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">extensive</a> new <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">evidence</a> that spyware made by Israeli company NSO Group was used against activists, business executives, journalists, and lawyers around the world. Even Apple’s iPhone, frequently lauded for its tight security, was found to be “<a href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">no match</a>” for the surveillance software, leading Johns Hopkins cryptographer Matthew Green to fret that the NSO revelations had led some hacking experts to descend into a posture of “<a href="https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">security nihilism</a>.”</p>
<p>Security nihilism is the idea that digital attacks have grown so sophisticated that there’s nothing to be done to prevent them from happening or to blunt their impact. That sort of conclusion would be a mistake. For one thing, it plays into the hands of malicious hackers, who would love nothing more than for targets to stop trying to defend themselves. It’s also mistaken factually: You <i>can</i> defend yourself against NSO’s spyware — for example, by following operational security techniques like not clicking unknown links, practicing device compartmentalization (such as using separate devices for separate apps), and having a virtual private network, or VPN, on mobile devices. Such techniques are effective against any number of digital attacks and thus useful even if NSO Group turns out to be correct in its <a href="https://zetter.substack.com/p/the-nso-surveillance-list-what-it" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">claim that the purported evidence against the company is not valid</a>.</p>
<p>There may be no such thing as perfect security, as one classic adage in the field states, but that’s no excuse for passivity. Here, then, are practical steps you can take to reduce your “attack surface” and protect yourself against spyware like NSO’s.</p>
<h3>Pegasus Offers “Unlimited Access to Target’s Mobile Devices”</h3>
<p>The recent revelations concern a specific NSO spyware product known as Pegasus. They follow extensive prior studies of the company’s software from entities like <a href="https://citizenlab.ca/tag/nso-group/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">the Citizen Lab</a>, <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Amnesty International</a>, <a href="https://articulo19.org/wp-content/uploads/2017/06/Reporte-Gobierno-Espi%CC%81a-Final.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Article 19, R3D, and SocialTIC</a>. Here’s what we know about Pegasus specifically.</p>
<p>The software’s capabilities were outlined in what appears to be a <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">promotional brochure</a> from NSO Group dating to <a href="https://wikileaks.org/hackingteam/emails/emailid/5391" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">2014</a> or earlier and made available when WikiLeaks published a <a href="https://wikileaks.org/hackingteam/emails/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">trove of emails</a> related to a different spyware firm, Italy’s Hacking Team. The brochure’s authenticity cannot be confirmed, and NSO has said it is not commenting further on Pegasus. But the document markets Pegasus aggressively, saying it provides “unlimited access to target’s mobile devices” and allows clients to “remotely and covertly collect information about your target’s relationships, location, phone calls, plans and activities — whenever and wherever they are.” The brochure also states the Pegasus can:</p>
<ul>
<li>Monitor voice and VoIP calls in real-time.</li>
<li>Siphon contacts, passwords, files, and encrypted content from the phone.</li>
<li>Operate as an “environmental wiretap,” listening through the microphone.</li>
<li>Monitor communications through apps like WhatsApp, Facebook, Skype, Blackberry Messenger, and Viber.</li>
<li>Track the phone’s location via GPS.</li>
</ul>
<p>For all the hype, Pegasus is, however, just a glorified version of an old type of malware known as a Remote Access Trojan, or RAT: a program that allows an unauthorized party full access over a target device. In other words, while Pegasus may be potent, the security community knows well how to defend against this type of threat.</p>
<p>Let’s look at the different ways Pegasus can potentially infect phones — its various “agent installation vectors,” in the brochure’s own vernacular — and how to defend against each one.</p>
<h3>Dodging Social Engineering Clickbait</h3>
<p>There are numerous examples in reports of Pegasus attacks of journalists and human rights defenders receiving <a href="https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">SMS</a> and <a href="https://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">WhatsApp</a> bait messages enjoining them to click malicious links. The links download spyware that lodges into devices through security holes in browsers and operating systems. This attack vector is called an Enhanced Social Engineer Message, or ESEM, in the leaked brochure. It states that “the chances that the target will click the link are totally dependent on the level of content credibility. The Pegasus solution provides a wide range of tools to compose a tailored and innocent message to lure the target to open the message.”</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>“The chances that the target will click the link are totally dependent on the level of content credibility.”</p></blockquote>
<p>As the Committee to Protect Journalists has <a href="https://cpj.org/2019/11/cpj-safety-advisory-journalist-targets-of-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed</a>, ESEM bait messages linked to Pegasus fall into various categories. Some claim to be from established organizations like banks, embassies, news agencies, or parcel delivery services. Others relate to personal matters, like work or alleged evidence of infidelity, or claim that the targeted person is facing some immediate security risk.</p>
<p>Future ESEM attacks may use different types of bait messages, which is why it’s important to treat any correspondence that tries to convince you to perform a digital action with caution. Here are some examples of what that means in practice:</p>
<ul>
<li>If you receive a message with a link, particularly if it includes a sense of urgency (stating a package is about to arrive or that your credit card is going to be charged), avoid the impulse to immediately click on it.</li>
<li>If you trust the linked site, type out the link’s web address manually.</li>
<li>If going to a website you frequently visit, save that website in a bookmark folder and only access the site from the link in your folder.</li>
<li>If you decide you’re going to click a link rather than typing it out or visiting the site via bookmark, at least scrutinize the link to confirm that it is pointing to a website you are familiar with. And remember that it’s possible you will still be fooled: Some phishing links use similar-looking letters from a non-English character set, in what is known as a <a href="https://en.wikipedia.org/wiki/IDN_homograph_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">homograph attack</a>. For example, a Cyrillic “О” might be used to mimic the usual Latin “O” we see in English.</li>
<li>If the link appears to be a shortened URL, use a URL expander service such as <a href="https://urlex.org/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">URL Expander</a> or <a href="https://www.expandurl.net/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">ExpandURL</a> to reveal the actual, long link it points to before clicking.</li>
<li>Before you click a link apparently sent by someone you know, confirm that the person really did send it; their account may have been hacked or their phone number spoofed. Confirm with them using a different communication channel from the one on which you received the message. For instance, if the link came via a text or email message, give the sender a call. This is known as out-of-band verification or authentication.</li>
<li>Practice device compartmentalization, using a secondary device without any sensitive information on it to open untrusted links. Keep in mind that if the secondary device is infected, it may still be used to monitor you via the microphone or camera, so keep it in a <a href="https://www.google.com/search?tbm=shop&amp;q=phone+faraday+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Faraday bag</a> when not in use — or at least away from where you have sensitive conversations (a good idea even if it’s in a Faraday bag).</li>
<li>Use nondefault browsers. According to a section titled “Installation Failure” in the leaked Pegasus brochure, installation may fail if the target is running an <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html#document/p15/a437978" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">unsupported browser</a> and in particular a browser other than “the default browser of the device.” But the document is now several years old, and it is possible that Pegasus today supports all kinds of browsers.</li>
<li>If there is ever any doubt about a given link, the safest operational security measure is to avoid opening the link.</li>
</ul>
<h3>Thwarting Network Injection Attacks</h3>
<p>Another way Pegasus <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">infected</a> devices in multiple <a href="https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">cases</a> was by intercepting a phone’s network traffic using what’s known as a man-in-the-middle, or <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">MITM</a>, attack, in which Pegasus intercepted unencrypted network traffic, like HTTP web requests, and redirected it toward malicious payloads. Pulling this off entailed either tricking the phone into connecting to a rogue portable device which pretends to be a cell tower nearby or gaining access to the target’s cellular carrier (plausible if the target is in a repressive regime where the government provides telecommunication services). This attack worked even if the phone was in mobile data-only mode, and not connected to Wi-Fi.</p>
<p>When <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Maati Monjib</a>, the co-founder of the Freedom Now NGO and the Moroccan Association for Investigative Journalism, opened the iPhone Safari browser and typed yahoo.fr, Safari first tried going to http://yahoo.fr. Normally this would have redirected to https://fr.yahoo.com, an encrypted connection. But since Monjib’s connection was being intercepted, it instead redirected to a malicious third-party site which ultimately hacked his phone.</p>
<blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><p>Typing just the website domain into a browser opens you to attacks, because your browser will attempt an unencrypted connection to the site.</p></blockquote>
<p>Typing just the website domain (such as yahoo.fr) into a browser address bar without specifying a protocol (such as https://) opens the possibility for MITM attacks, because your browser by default will attempt an unencrypted HTTP connection to the site. Usually, you reach the genuine site, which immediately redirects you to a safe HTTPS connection. But if someone is tracking to hack your device, that first HTTP connection is enough of an opening to hijack your connection.</p>
<p>Some websites protect against this using a complicated security feature known as <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">HTTP Strict Transport Security</a>, which prevents your browser from ever making an unencrypted request to them, but you can’t always count on this, even for some websites that implement it correctly.</p>
<p>Here are some things you can do to prevent these kinds of attacks:</p>
<ul>
<li>Always type out https:// when going to websites.</li>
<li>Bookmark secure (HTTPS) URLs for your favorite sites, and use those instead of typing the domain name directly.</li>
<li>Alternately, use a <a href="https://en.wikipedia.org/wiki/Virtual_private_network" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">VPN</a> on both your desktop and mobile devices. A VPN tunnels all connections securely to the VPN server, which then accesses websites on your behalf and relays them back to you. This means that an attacker monitoring your network will likely not be able to perform a successful MITM attack as your connection is encrypted to the VPN — even if you type a domain directly into your browser without the “https://” part.</li>
</ul>
<p>If you use a VPN, keep in mind that your VPN provider has the ability to spy on your internet traffic, so it’s important to pick a trustworthy one. Wirecutter publishes a regularly updated, thorough <a href="https://www.nytimes.com/wirecutter/reviews/best-vpn-service/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">comparison of VPN providers</a> based on their history of third-party security audits, their privacy and terms of use policies, the security of the VPN technology used, and other factors.</p>
<h3>Zero-Click Exploits</h3>
<p>Unlike infection attempts which require that the target perform some action like clicking a link or opening an attachment, zero-click exploits are so called because they require no interaction from the target. All that is required is for the targeted person to have a particular vulnerable app or operating system installed. Amnesty International’s <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">forensic report </a>on the recently revealed Pegasus evidence states that some infections were transmitted through zero-click attacks leveraging the Apple Music and iMessage apps.</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>Your device should have the bare minimum of apps that you need.</p></blockquote>
<p>This is not the first time NSO Group’s tools have been linked to zero-click attacks. A 2017 <a href="https://cdn2.uvnimg.com/db/e1/9105935b4499804fd3feb1f7f933/martinelli-complaint.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> against Panama’s former President Ricardo Martinelli states that journalists, political figures, union activists, and civic association leaders were targeted with Pegasus and rogue push notifications delivered to their devices, while in 2019 WhatsApp and Facebook filed a <a href="https://context-cdn.washingtonpost.com/notes/prod/default/documents/bf5edf35-5672-49fa-aca1-edefadff683f/note/8ef25c0d-fee9-416a-b7f9-e0a4dedc66f2.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> claiming NSO Group developed malware capable of exploiting a zero-click vulnerability in WhatsApp.</p>
<p>As zero-click vulnerabilities by definition do not require any user interaction, they are the hardest to defend against. But users can reduce their chances of succumbing to these exploits by reducing what is known as their “attack surface” and by practicing device compartmentalization. Reducing your attack surface simply means minimizing the possible ways that your device may be infected. Device compartmentalization means spreading your data and apps across multiple devices.</p>
<p>Specifically, users can:</p>
<ul>
<li>Reduce the number of apps on your phone. The fewer unlocked doors your home has, the fewer opportunities a burglar has to enter; similarly, fewer apps means fewer virtual doors on your phone for an adversary to exploit. Your device should have the bare minimum apps that you need to perform day-to-day function. There are some apps you cannot remove, such as iMessage; in those cases you can often <a href="https://selfsolve.apple.com/deregister-imessage/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">disable</a> them, though doing so will also make text messages no longer work on your iPhone.</li>
<li>Regularly audit your installed apps (and their permissions), and remove any that you no longer need. It is safer to remove a seldom-used app and download it again when you actually need it than to let it remain on your phone.</li>
<li>Regularly update both your phone’s operating system and individual apps, since updates close vulnerabilities, <a href="https://www.vice.com/en_us/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes even unintentionally</a>.</li>
<li>Compartmentalize your remaining apps. If a phone only has WhatsApp installed and is compromised, the hacker will get WhatsApp data, but not other sensitive information like email, calendar, photos, or <a href="https://theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal/">Signal messages</a>.</li>
<li>Even a compartmentalized phone can still be used as a wiretap and a tracking device, so keep devices physically compartmentalized — that is, leave them in another room, ideally in a <a href="https://www.google.com/search?tbm=shop&amp;q=tamper+evident+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">tamper bag</a>.</li>
</ul>
<h3>Physical Access</h3>
<p>A final way an attacker can infect your phone is by physically interacting with it. According to the brochure, “when physical access to the device is an option, the Pegasus agent can be manually injected and installed in less than five minutes” — though it is unclear if the phone needs to be unlocked or if attackers are able to infect even a PIN-protected phone.</p>
<p>There seem to be no known cases of physically launched Pegasus attacks, though such exploits may be difficult to spot and distinguish from online attacks. Here’s how you can mitigate them:</p>
<ul>
<li>Always maintain a line of sight to your devices. Losing sight of your devices opens the possibility of physical compromise. Obviously there is a difference between a customs agent taking your phone at the airport versus you leaving your laptop behind in a room in your residence when you go to the bathroom, but all involve some risk, and you will have to calibrate your own risk tolerance.</li>
<li>Put your device in a tamper bag when it needs to be left unattended, particularly in riskier locations like hotel rooms. This will not prevent the device from being manipulated but will at the least provide a ready alert that the device has been taken out of the bag and <i>might</i> have been tampered with, at which point the device should no longer be used.</li>
<li>Use burner phones and other compartmented devices when entering potentially hostile environments such as government buildings, including embassies and consulates, or when going through border checkpoints.</li>
</ul>
<p>Generally:</p>
<ul>
<li>Use Amnesty International’s <a href="https://mvt.readthedocs.io/en/latest/index.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Mobile Verification Toolkit</a> if you suspect your phone is infected with Pegasus.</li>
<li>Regularly back up important files.</li>
<li>And finally, there’s no harm in regularly <a href="https://support.apple.com/guide/iphone/erase-iphone-iph7a2a9399b/ios" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">resetting</a> your phone.</li>
</ul>
<p>Although Pegasus is a sophisticated piece of spyware, there are tangible steps you can take to minimize the chance that your devices will be infected. There’s no foolproof method to eliminate your risk entirely, but there are definitely things you can do to lower that risk, and there’s certainly no need to resort to the defeatist view that we’re “no match” for Pegasus. <a href="https://theintercept.com/2021/07/27/pegasus-nso-spyware-security/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1>How to Check if Your Cellphone Is Infected With Pegasus Spyware</h1>
<p class="rz ti ky tj tk tl">NSO Group’s Pegasus spyware can turn any infected smartphone into a remote microphone and camera, spying on its own owner while also offering the hacker – usually in the form of a state intelligence or law enforcement agency – full access to files, messages and, of course, the user’s location.</p>
<p class="rz ti ky tj tk tl"><a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">Pegasus</a> is one of a number of proprietary tools sold as part of the hacker-for-hire industry – and one found at the very high-end of that dark market. Other companies offer less expensive services – for example, only providing geolocation services for its clients. So how can you protect yourself? And how can you check to see if your phone has been targeted in the past or is infected now?</p>
<p class="rz ti ky tj tk tl">Haaretz offers a simple, nontechnical explanation on how to check and stay safe&#8230;</p>
<p class="rz ti ky tj tk tl"><strong class="ey">The weakest link</strong></p>
<p class="rz ti ky tj tk tl">Most cellphone spyware operates in a similar fashion: a message is sent to a phone with a nefarious message. The message usually contains a link that will either download the malware onto your device directly, or refer it to a website that will prompt a download – all unbeknown to the phone’s owner.</p>
<p class="rz ti ky tj tk tl">There are other ways to get your phone to download something that don&#8217;t involve a message. However, from the moment of infection, most spyware tools follow a similar protocol: once installed, the spyware contacts what is called a “command-and-control” server, which provides it with instructions remotely.</p>
<p class="rz ti ky tj tk tl">“Let’s say the Israel Police are the ones who installed Pegasus on your smartphone and they want to know where you – or, more precisely, your phone – has been in the previous 24 hours. To get that information, instructions to obtain that data are sent to a C&amp;C server connected to the phone,” explains Dr. Gil David, a researcher and cybersecurity consultant.</p>
<div class="undefined hy">
<div class="FI_PH">The best way to stay safe, any cybersecurity expert will tell you, is to never – ever! – open any link sent to you, unless it&#8217;s a link you are expecting from someone you know and trust.</div>
</div>
<div class="undefined hy">
<div class="FI_PH">The reason is that, once infected, “the C&amp;C server communicates between the hacker and the spyware installed on your phone. Without it, the hacker has no way of relaying instructions to Pegasus, and Pegasus has no way to get information from the victim’s phone back to the hacker,” David writes in Haaretz Hebrew.</div>
</div>
<p class="rz ti ky tj tk tl">Many times, the links sent to you will appear innocent. It may look like a message from the Post Office or Amazon. But don’t be fooled: Through some simple social engineering and a process called “DNS spoofing,” even an official-looking URL may be a trap.</p>
<div class="undefined hy">
<div class="FI_PH"><strong class="ey" style="color: #ff0000;">Double zero</strong></div>
</div>
<p class="rz ti ky tj tk tl">Sadly, staying safe is not always possible.</p>
<p class="rz ti ky tj tk tl">What makes Pegasus so expensive is its ability to not just potentially infect any smartphone selected for targeting remotely, but to do so with a “zero click” infection. This means your phone can be infected without you even having to click on a link – for example, with the code instructing your phone to reach out to the server secretly encoded into a WhatsApp message or even in a file like a photo texted to you via iMessage.</p>
<p class="rz ti ky tj tk tl">These “zero click” attacks make use of what is called “zero-day” exploits: unknown loopholes in your phone’s defenses that allow these hidden bits of code to kick into action without the victim doing anything.</p>
<p class="rz ti ky tj tk tl">So, another good practice is to make sure your phone’s operating system is as updated as possible: As new exploits are discovered, they are quickly “patched” by the likes of Apple and Google.</p>
<p class="rz ti ky tj tk tl">According to digital forensics experts Amnesty International and Citizen Lab, Pegasus’ zero click infections have only been found on iPhones. “Most recently, a successful ‘zero-click’ attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July 2021,” Amnesty notes in its instructive report <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">&#8220;How to Catch NSO Group&#8217;s Pegasus.&#8221;</a></p>
<p class="rz ti ky tj tk tl">It seems Pegasus’ ability to infect iPhones was based on a previously unknown loophole in the iMessage service, and this too has subsequently been patched. However, other Israel firms, for instance QuadDream, reportedly have such abilities as well.</p>
<p class="rz ti ky tj tk tl">“From 2019, an increasing amount of vulnerabilities in iOS, especially iMessage and FaceTime, started getting patched thanks to their discoveries by vulnerability researchers, or to cybersecurity vendors reporting exploits discovered in-the-wild,” Amnesty writes – so make sure your phone is updated.</p>
<h2 class="rz ti ky tj tk tl"><span style="color: #ff0000;"><strong class="ey">Indicators of compromise</strong></span></h2>
<p class="rz ti ky tj tk tl">Groups like Amnesty and Citizen Lab find NSO’s spyware on phones using two different methods. Both involve searching for what is termed “indicators of compromise,” or IOCs.</p>
<p class="rz ti ky tj tk tl">Amnesty maintains a database of nefarious domains used by NSO’s clients. The list is constantly updating as more bogus URLs are found. Citizen Lab, meanwhile, also maintains a database of so-called vectors: messages sent to victims containing nefarious code or URLS. The two groups each maintain updated lists of Pegasus’ related processes that together permit attribution.</p>
<p class="rz ti ky tj tk tl">The only thing that has changed with Pegasus over the years is the way your phone is referred to the server, and the way the so-called payload is delivered.</p>
<p class="rz ti ky tj tk tl">“While SMS messages carrying malicious links were the tactic of choice for NSO Group’s customers between 2016 and 2018, in more recent years they appear to have become increasingly rare,” Amnesty wrote in its <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">July 2021 report</a>.</p>
<p class="rz ti ky tj tk tl">The newer trend, discovered in the case of Moroccan journalist <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/news/2020/06/nso-spyware-used-against-moroccan-journalist/">Omar Radi, who was infected with Pegasus in 2020</a>, is what is known as “packet injection.” This means that the download order is delivered not through a message but instead through your network, in the form of a hidden command “injected” into the phone through what Amnesty describes as “tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator.</p>
<p class="rz ti ky tj tk tl">“The discovery of network injection attacks in Morocco signaled that the attackers’ tactics were indeed changing. Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators,” it explained.</p>
<p class="rz ti ky tj tk tl">As NSO’s clients are state agencies, they can easily make use of the mobile infrastructure to infect phones.</p>
<p class="rz ti ky tj tk tl">Therefore, and though such injection infections can also be forced upon you, other good practices include never using free Wi-Fi; never connecting to wireless networks you do not absolutely know are secure – as these networks can easily be hacked so they infect your phone and refer it to the snooping server. Not using so-called VPNs is also advisable for the same reason.</p>
<p class="rz ti ky tj tk tl">Chances are you have not been infected with Pegasus. However, if you have cause for concern and are scared you are or were infected, there are a few options:  Amnesty offers a useful, free and open source tool called the Mobile Verification Toolkit that can check a backup of your device or its logs for any IOC. The MVT will scan your iPhone’s logs for Pegasus-related processes or search your Android&#8217;s messages for nefarious links. The tool <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://github.com/mvt-project/mvt?fbclid=IwAR0JV7V9TcMh5Kbe5aKi9cnxqbv5IFyhgHpdT8aesFiwS5h5xSztlEoOg6k">can be downloaded here</a>. The bad news is that it requires some technical know-how and is currently devoid of a simple-to-use interface. To get it to work, you first need to make a specific type of backup of your phone, and then you need to download the program and run the code on your computer so it can scan the file you created. Running the program requires you to download Python. Luckily, the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://web.archive.org/web/20210830112025/https://docs.mvt.re/en/latest/install.html">tool comes with very clear instructions</a>, and even those unskilled in code can make use of it with a bit of effort. Furthermore, it also allows you to conduct the test yourself. A similar product is <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://imazing.com/guides/detect-pegasus-and-other-spyware-on-iphone">iMazing</a>, a phone-backup platform that runs on your desktop and provides a MVT-like analysis of your device. It does not prevent infections but can check your phone for IOCs. If the best offense is defense, there’s also a growing cellphone security market. Cyberdefense firms like ZecOps offer organizations like the BBC and Fortune 2000 companies a platform that inspects phones for current infections or traces of historic attacks. ZecOps also provides this service pro bono for journalists involved in the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">Pegasus Project</a>. Private users can also buy such services. For example, the Israeli-Indian security firm SafeHouse Technologies offers an app called “BodyGuard” that provides defenses for your phone, for a small price. It already has more than a million users, mostly in India. If you can’t get the Mobile Verification Toolkit to work and are reluctant to use an app, and you genuinely fear you have been targeted, you can also <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="mailto:omerbenj@protonmail.com?subject=Pegasus%20test%20request%20tip">drop us a tip here</a> and we at Haaretz will get you checked. <a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="post-title single-post-title entry-title">HOW TO DETECT PEGASUS SPYWARE</h1>
<p>As one of the leading commercial spyware programs, Pegasus has been used by a host of companies, governments, and other entities to collect sensitive data from individuals’ smartphones. If Pegasus is deployed on your smartphone, your sensitive data could be at risk.<span id="more-12891"></span></p>
<p>Read on to learn how to detect Pegasus spyware on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b><b> on Your Smartphone</b></h2>
<p>The data privacy demands of today’s IT landscape call for robust mobile security, as more individuals rely on smartphone applications for essential day-to-day tasks.</p>
<p>Safeguarding your smartphone data from threats like Pegasus starts with knowing how to:</p>
<ul>
<li aria-level="1"><em>Scan for and detect Pegasus spyware on your smartphone</em></li>
<li aria-level="1"><em>Identify Pegasus spyware installed on your smartphone</em></li>
<li aria-level="1"><em>Remove Pegasus spyware from your Android or iPhone</em></li>
<li aria-level="1"><em>Prevent Pegasus spyware from compromising your smartphone data </em></li>
</ul>
<p>Dealing with advanced mobile security risks like Pegasus spyware is much easier with the help of a managed security services provider (MSSP), who can advise on how to detect pegasus spyware on iPhone or Android.</p>
<p>&nbsp;</p>
<h2><b>What is Pegasus Spyware?</b></h2>
<p>Developed by the NSO group in Israel, Pegasus is signature spyware that has been implicated in the secret surveillance of individuals worldwide. Pegasus spyware is considered dangerous because it allows an attacker to control a victim’s smartphone.</p>
<p>Using Pegasus spyware, a perpetrator can:</p>
<ul>
<li aria-level="1">Wiretap and listen to conversations</li>
<li aria-level="1">Access photos and videos</li>
<li aria-level="1">Control applications on a smartphone</li>
</ul>
<p>It is difficult and often impossible for antivirus solutions to detect Pegasus spyware because it exploits zero-day vulnerabilities, which are unknown to the developers of these solutions.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b></h2>
<p>Over years of extensive research, Amnesty International has developed a methodology to detect Pegasus spyware on smartphones, providing it to the public as a resource on Github.</p>
<p>Using Amnesty International’s methodology, you can find a list of:</p>
<ul>
<li aria-level="1"><em>Domain names of Pegasus infrastructure</em></li>
<li aria-level="1"><em>Email addresses identified in previous attacks</em></li>
<li aria-level="1"><em>Process names associated with Pegasus</em></li>
</ul>
<p>Beyond the indicators of Pegasus compromise methodology, Amnesty International also released a Mobile Verification Toolkit (MVT) to help support users interested in detecting Pegasus spyware on their smartphones. With the help of Amnesty International’s spyware detection tools, you can learn how to detect pegasus spyware on Android or iPhone.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on iOS</b></h3>
<p>Here’s how to check for pegasus spyware on iOS devices such as iPhones:</p>
<ul>
<li aria-level="1">Create a backup of encrypted data on a device other than your smartphone</li>
<li aria-level="1">Once your smartphone is securely backed up, download the MVT tool onto your iPhone and follow Amnesty International’s instructions for detecting Pegasus.</li>
</ul>
<p>Whereas other apps can detect Pegasus on iOS, it’s best to follow Amnesty International’s instructions or work with a <strong>qualified MSSP</strong> to avoid running into any issues while detecting the spyware.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on Android</b></h3>
<p>Although the MVT mostly caters to iOS devices, it can still detect Pegasus on Android.</p>
<p>If you are wondering how to detect Pegasus spyware on Android with the MVT, the first places to start looking are potentially malicious text messages and APKs on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How Pegasus Works</b></h2>
<p>For most Pegasus infections, the spyware is installed remotely on victims’ smartphones. However, Pegasus can be installed physically, and, in some cases, it can use the victim’s smartphone for data storage prior to transmitting data to a remote server.</p>
<h3><b>Pegasus Remote Installation</b></h3>
<p>Pegasus spyware can be remotely installed on a smartphone via:</p>
<ul>
<li aria-level="1"><b>Zero-click attacks</b> – Zero-click exploits typically leverage applications such as Apple Music or iMessage to send requests to the victim’s smartphone. Here, the victim does not interact with the spyware and is clueless about the download of Pegasus spyware.</li>
<li aria-level="1"><b>Malicious text messages</b> –  A victim receives a text message containing an exploit link for a Pegasus spyware download. Clicking the link deploys spyware on the victim’s smartphone.</li>
<li aria-level="1"><b>Network injection attack</b> – While browsing the Internet, a victim is redirected from a clear-text HTTP website to a decoy of a legitimate business. Unknowingly, a victim may then provide access credentials or other sensitive information.</li>
</ul>
<p>In most cases, remote installation of Pegasus spyware on victims’ phones via zero-click attacks leverages zero-day vulnerabilities, of which the smartphone manufacturer may not be aware.</p>
<p>This makes Pegasus spyware very dangerous to its victims, who may not realize their sensitive data is being surveilled until it is too late.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10971" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg" sizes="(max-width: 825px) 100vw, 825px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-768x306.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1024x408.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1170x466.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-585x233.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning.jpg 1277w" alt="planning" width="825" height="330" /></p>
<h3><b>Pegasus Physical Installation</b></h3>
<p>While it is uncommon, Pegasus can be installed by connecting a victim’s smartphone to another device such as a computer to deploy the spyware. However, this would involve the difficult task of accessing a victim’s smartphone without their knowledge.</p>
<p>&nbsp;</p>
<h3><b>Pegasus Data Management</b></h3>
<p>According to NSO, the spyware will transmit data from a victim’s smartphone to a server where the attacker can access the data. However, if Pegasus is unable to send data to a server, it will transmit the data to a “hidden and encrypted buffer” within the phone’s storage.</p>
<p>&nbsp;</p>
<h2><b>What Data Can Pegasus Access?</b></h2>
<p>Once deployed on a smartphone, Pegasus spyware can access a range of data, including:</p>
<ul>
<li aria-level="1">Text messages</li>
<li aria-level="1">Emails</li>
<li aria-level="1">Photos and videos</li>
<li aria-level="1">Personal contacts</li>
<li aria-level="1">Location</li>
<li aria-level="1">Audio messages and recordings</li>
</ul>
<p>Detecting Pegasus spyware on your smartphone is critical to minimizing the risks of your sensitive data being exposed by perpetrators.</p>
<p>&nbsp;</p>
<h3><b>Can Pegasus be Removed?</b></h3>
<p>You can remove Pegasus from your smartphone by attempting the following actions:</p>
<ul>
<li aria-level="1">Restarting your smartphone, to put a temporary stop to Pegasus</li>
<li aria-level="1">Resetting your smartphone to its factory settings, which <i>may</i> remove Pegasus</li>
<li aria-level="1">Updating your smartphone’s system software and apps to current versions</li>
<li aria-level="1">Removing any unknown device connections to social media platforms</li>
</ul>
<p>When removing Pegasus from your smartphone, it is always best to work with the MVT resource provided by Amnesty International. If Pegasus spyware removal becomes difficult, consider consulting an MSSP for help.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10968" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg" sizes="(max-width: 818px) 100vw, 818px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-768x300.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1024x400.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1170x456.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-585x228.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident.jpg 1279w" alt="incident" width="818" height="319" /></p>
<h2><b>What to Do if You Have Pegasus</b></h2>
<p>According to Reporters Without Borders (RSF), here’s what to do if you have Pegasus:</p>
<ul>
<li aria-level="1">Buy a new smartphone and stop using the one infected with Pegasus, ensuring the compromised smartphone is not close to you or your work environment.</li>
<li aria-level="1">Change passwords for all accounts on the new smartphone and remember to sign out of the accounts on the compromised one.</li>
</ul>
<p>If you have Pegasus, it is best to contact an experienced MSSP, who will point you to Pegasus spyware removal tools that will help remove Pegasus and keep your data safe.</p>
<p>&nbsp;</p>
<h2><b>Other Spyware like Pegasus</b></h2>
<p>Besides Pegasus, other types of spyware include:</p>
<ul>
<li aria-level="1">Trojans, which can steal a victim’s funds or credentials to make fraudulent purchases.</li>
<li aria-level="1">Stealware, which can intercept traffic from online shopping sites like those offering credits or rewards for purchases.</li>
</ul>
<p>With everyone using smartphones or tablets to store sensitive information like account passwords, securing these devices from spyware and other forms of malware is paramount.</p>
<p>In an organizational setting, it is critical for leadership to emphasize the importance of mobile security in defending sensitive data stored on smartphones from various types of spyware.</p>
<p>&nbsp;</p>
<h2><b>How to Protect From Pegasus and Other Spyware</b></h2>
<p>Protecting your organization from Pegasus and other spyware revolves around implementing mobile device security best practices such as:</p>
<ul>
<li aria-level="1">Encrypting any communication of sensitive data with industry-standard algorithms</li>
<li aria-level="1">Keeping up-to-date with the latest phishing and malware attempts</li>
<li aria-level="1">Updating your smartphone or mobile device with the latest security patches</li>
<li aria-level="1">Using strong passwords and multi-factor authentication on all mobile devices</li>
<li aria-level="1">Conducting routine penetration testing on mobile devices that contain sensitive data</li>
</ul>
<p>If you are wondering how to block Pegasus spyware, some of the mobile security best practices above can help. However, it’s best to implement them with the guidance of a leading MSSP. <a href="https://blog.rsisecurity.com/how-to-detect-pegasus-spyware/#:~:text=Although%20the%20MVT%20mostly%20caters,and%20APKs%20on%20your%20smartphone." target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="Page-headline">Journalists, lawyers and activists hacked with Pegasus spyware in Jordan, forensic probe finds</h1>
<div class="StoryPage-actions-wrapper">
<div class="Page-byline"></div>
</div>
<div class="RichTextStoryBody RichTextBody">
<p>de Pegasus spyware was used in Jordan to hack the cellphones of at least 30 people, including journalists, lawyers, human rights and political activists, the digital rights group Access Now said Thursday.</p>
<p>The hacking with <span class="LinkEnhancement">spyware</span> made by Israel’s <span class="LinkEnhancement">NSO Group</span> occurred from 2019 until last September, Access Now said in its report. It did not accuse Jordan’s government of the hacking.</p>
<p>One of the targets was Human Rights Watch’s deputy director for the region, Adam Coogle, who said in an interview that it was difficult to imagine who other than Jordan’s government would be interested in hacking those who were targeted.</p>
<p>The Jordanian government had no immediate comment on <span class="LinkEnhancement">Thursday’s report</span>.</p>
<p><span class="LinkEnhancement">In a 2022 report</span> detailing a much smaller group of Pegasus victims in Jordan, digital sleuths at the University of Toronto’s Citizen Lab identified two operators of the spyware it said may have been agents of the Jordanian government. A year earlier, <span class="LinkEnhancement">Axios reported</span> on negotiations between Jordan’s government and NSO Group.</p>
<p>“We believe this is just the tip of the iceberg when it comes to the use of Pegasus spyware in Jordan, and that the true number of victims is likely much higher,” Access Now said. Its Middle East and North Africa director, Marwa Fatafta, said at least 30 of 35 known targeted individuals were successfully hacked.</p>
<p>Citizen Lab <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://citizenlab.ca/2024/02/confirming-large-scale-pegasus-surveillance-of-jordan-based-civil-society" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">confirmed all but five of the infections</a></span>, with 21 victims asking to remain anonymous, citing the risk of reprisal. The rest were identified by Human Rights Watch, Amnesty International’s Security Lab, and the Organized Crime and Corruption Reporting Project.</p>
<p>NSO Group says it only sells to vetted intelligence and law enforcement agencies — and only for use against terrorists and serious criminals. But cybersecurity researchers who have tracked the spyware’s use in 45 countries have documented dozens of cases of politically motivated abuse of the spyware — from <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/mexico-pegasus-spyware-activists-press-freedom-army-76477e1d4e3e09250e20aa4896b1f9e1" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Mexico</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/thailand-surveillance-nso-spyware-1081ac34cf80e15c048af8c2d1db0e33" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Thailand</a></span> to <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-business-software-spyware-jaroslaw-kaczynski-0c41a504e8fbdbb6b9b06f6869848a48" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Poland</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.theguardian.com/world/2022/aug/19/british-judge-rules-dissident-ghanem-almasarir-can-sue-saudi-arabia-for-pegasus-hacking" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Saudi Arabia.</a></span></p>
<p>An NSO Group spokesperson said the company would not confirm or deny its clients’ identities. NSO Group says it vets customers and investigates any report its spyware has been abused.</p>
<p>The U.S. government was unpersuaded and blacklisted the NSO Group in November 2021, when iPhone maker Apple Inc. sued it, calling its employees “amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.”</p>
<p>Those targeted in Jordan include Human Rights Watch’s senior researcher for Jordan and Syria, Hiba Zayadin. Both she and Coogle had received threat notifications from Apple on Aug. 29 that state-sponsored attackers had attempted to compromise their iPhones.</p>
<p>Coogle’s local, personal iPhone was successfully hacked in October 2022, he said, just two weeks after the human rights group <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2022/09/18/jordan-government-crushes-civic-space" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">published a report</a></span> documenting the persecution and harassment of citizens organizing peaceful political dissent.</p>
<p>After that, Coogle activated <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-hacking-apple-inc-spyware-ad4fb8df901b525d6fddc359670ce3a9" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">“Lockdown Mode,”</a></span> on the iPhone, which Apple recommends for users at high risk.</p>
<p>Human Rights Watch said <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2024/02/01/spyware-targets-human-rights-watch-staff-jordan" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">in a statement</a></span> Thursday that it had contacted NSO Group about the attacks and specifically asked it to investigate the hack of Coogle’s device “but has received no substantive response to these inquiries.”</p>
<p>Jordanian human rights lawyer Hala Ahed — known for defending women’s and workers rights and prisoners of conscience — was also targeted at least twice by Pegasus, successfully in March 2021 then unsuccessfully in February 2023, Access Now said.</p>
<p>About half of those found to have been targeted by Pegasus in Jordan — 16 in all — were journalists or media workers, the report said.</p>
<p>One veteran Palestinian-American journalist and columnist, Dauod Kuttab, was hacked with Pegasus three times between February 2022 and September 2023.</p>
<p>Along the way, he said, he’s learned important lessons about not clicking on links in messages purporting to be from legitimate contacts, which is how one of the Pegasus hacks snared him.</p>
<p>Kuttab refused to speculate about who might have targeted him.</p>
<p>“I always assume that somebody is listening to my conversations,” he said, as getting surveilled “comes with the territory” when you are journalist in the Middle East.</p>
<p>But Kuttab does worry about his sources being compromised by hacks — and the violation of his privacy.</p>
<p>“Regardless of who did it, it’s not right to intervene into my personal, family privacy and my professional privacy.” <a href="https://apnews.com/article/jordan-hacking-pegasus-spyware-nso-group-99b0b1e4ee256e0b4df055f926349a43" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="ao ap aq ar as at nx ny nz oa m" data-test="articleHeaderTitle">The NSO File: A Complete (Updating) List of Individuals Targeted With Pegasus Spyware</h1>
<p class="ob q r oc od oe of og oh oi oj ok ol om ac ae af ag" data-test="articleHeaderSubtitle">The Israeli-made Pegasus spyware is suspected of infecting over 450 phones targeted by clients of NSO, who range from Saudi Arabia to Mexican drug lords. Here’s a list of the confirmed Pegasus victims.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The Israeli-made Pegasus spyware, sold by the cyberoffense firm NSO to state intelligence agencies around the world, has become infamous in recent years. Exploiting unknown loopholes in WhatsApp, iMessage and Android has allowed the group’s clients to potentially infect any smartphone and gain full access to it – in some cases without the owner even clicking or opening a file.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Digital forensics groups such as Amnesty International and the University of Toronto’s Citizen Lab have revealed numerous potential targets with traces of the spyware on their phones. Last summer, Project Pegasus – led by Paris-based NGO Forbidden Stories with the help of Amnesty’s Security Lab – organized an international consortium of journalists, including Haaretz and its sister publication TheMarker, to investigate thousands of additional potential targets selected for possible surveillance by <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">NSO Group</a> clients worldwide.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">So far, targets have been found across the world: from India and Uganda to Mexico and the West Bank, with high-profile victims including U.S. officials and a New York Times journalist.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Now, for the first time, Haaretz has assembled a list of confirmed cases involving Pegasus spyware.</p>
<p data-test="articleHeaderSubtitle"><img loading="lazy" decoding="async" class="alignnone wp-image-18277" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp" alt="" width="681" height="681" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp 960w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-400x400.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-150x150.webp 150w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-768x768.webp 768w" sizes="(max-width: 681px) 100vw, 681px" /></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Though there have been over 450 suspected hacking cases, this list, which was put together with the help of Amnesty’s Security Lab, includes only the cases in which infections were confirmed either by Amnesty or another digital forensics group like Citizen Lab (which also helped construct this list). It also includes a few instances where official bodies such as French intelligence agencies or private firms like Apple or WhatsApp have publicly confirmed attacks.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list does not include those suspected of being targeted – for example, Amazon’s Jeff Bezos, who was reportedly sent the spyware via a WhatsApp message from no less than <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/mohammed-bin-salman-0000017f-da25-d718-a5ff-faa5ec430000">Saudi Crown Prince Mohammed bin Salman</a>. Rather, it is those who have actually been found with Pegasus on their phones.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The NSO Group, which refuses to confirm the identity of its clients and claims it has no knowledge of their targets, has denied most of these cases and says digital forensic analysis cannot fully identify its software.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<ul class="py ue r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv go gn gm vi vj vk vl" data-test="relatedArticles">
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">How to Check if Your Cellphone Is Infected With Pegasus Spyware</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/2022-01-18/ty-article/police-used-nsos-pegasus-to-spy-on-israelis-without-court-order-report-says/0000017f-e3bc-d804-ad7f-f3fefd210000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Police Use NSO&#8217;s Pegasus to Spy on Israelis Without Warrant, Report Says</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Israeli NSO Spyware Found on Phones of Jordanian, Bahraini Women’s Rights Activists</span></a></li>
</ul>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The gap between the massive list of potential targets and those who were actually infected highlights how hard it is to confirm the presence of Pegasus spyware on phones. For instance, a private investigation commissioned by Bezos himself found that his phone had received a strange message from Crown Prince Mohammed, after which the tycoon’s device began sending out a lot of data. However, Bezos was reluctant to hand his phone over to anyone other than the handpicked investigators he had hired; they said it was very likely his phone had been infected.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Here is the list of most, if not all, known and confirmed Pegasus cases. They are sorted by the nationality of the victims or their country of residence when they were targeted.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list of confirmed cases is followed by an additional list of names of those who have been confirmed to have been targeted but whose actual infection has not been verified.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="The NSO Group logo on one of its Israeli offices., Credit: AMIR COHEN/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="The NSO Group logo on one of its Israeli offices." width="767" height="511" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">The NSO Group logo on one of its Israeli offices.</span><span class="ao pt rj dp dq qs qt">Credit: AMIR COHEN/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">AZERBAIJAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Khadija Ismayilova</strong><br />
The Azerbaijani investigative journalist based in Baku was targeted repeatedly for over three years as part of government persecution as a result of her work, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">the Project Pegasus investigation revealed</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag"></div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sevinc Vaqifqizi</strong><br />
Freelance Azerbaijanii journalist Vaqifqizi was found by Amnesty and Forbidden Stories to have had their phone infected with Pegasus in 2019 and 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">BAHRAIN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moosa Abd-Ali</strong><br />
Moosa Abd-Ali is a Bahraini activist living in exile in London who was found to have been targeted in the past, with the Bahraini government hacking his personal computer in 2011. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/">According to Citizen Lab</a>, Abd-Ali’s iPhone 8 appears to have been hacked with Pegasus at some point prior to September 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yusuf al-Jamri</strong><br />
A Bahraini blogger who says he was tortured by his government, Yusuf al-Jamri was granted asylum in the U.K. in 2018. According to Citizen Lab, Jamri’s iPhone 7 appears to have been hacked with Pegasus at some point prior to September 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Seven rights activists</strong><br />
At least three members of the Bahrain Centre for Human Rights, another three from the nonprofit Waad and one from the group Al Wefaq were also infected, Citizen Lab found. At least another seven members of BCHR and the other groups were actually targeted, but their infection was not confirmed by Citizen Lab.</p>
<div class="undefined ev"></div>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">EL SALVADOR</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carlos Martínez</strong><br />
A reporter for El Faro, he was one of over 35 journalists and members of civil society groups infected by the Pegasus spyware between July 2020 and November 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Daniel Lizárraga</strong><br />
A Mexican journalist and the editor of El Faro, who was expelled from El Salvador. Citizen Lab found that his phne had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Nine El Faro journalists</strong><br />
The following journalists with El Faro were all found by Citizen Lab to have been infected by the Pegasus spyware: Gabriela Cáceres, Carlos Dada, Carlos Ernesto Martínez D’aubuisson, Julia Gavarrete (who had two phones hacked), Valeria Guzmán, Ana Beatriz Lazo, Rebeca Monge, Víctor Peña, Nelson Rauda.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">El Salvadorian journalists</strong><br />
Citizen Lab discovered that the following journalists were also infected with Pegasus: Efren Lemus, Gabriel Labrador, José Luis Sanz, María Luz Nóchez, Mauricio Ernesto Sandoval Soriano, Óscar Martínez, Roman Gressier, Roxana Lazo, Sergio Arauz, Beatriz Benitez, Ezequiel Barrera, Xenia Oliva, an unnamed journalist from Diario El Mundo, and Daniel Reyes.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Noah Bullock</strong><br />
The head of Cristosal, a human rights organization based in El Salvador, who was also found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ricardo Avelar</strong><br />
A journalist with El Diario de Hoy, Citizen Lab confirmed that his device had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jose Marinero</strong><br />
An official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Xenia Hernandez</strong><br />
Another official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oscar Luna</strong><br />
An activist with the digital rights group Revista Digital Disruptiva. Citizen Lab found that their phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mariana Belloso</strong><br />
An independent journalist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carmen Tatiana Marroquín</strong><br />
An economist and columnist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FINLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Finnish diplomats</strong><br />
An unknown number of Finnish diplomats stationed abroad were found to have been infected, the Finnish Foreign Ministry confirmed. Their identity was not disclosed, nor was the suspected operator.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FRANCE</strong></mark></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bruno Delport</strong><br />
The phone of the director of Parisian radio station TSF Jazz was found by Citizen Lab to have been infected in 2019, just as he was applying for the presidency of Radio France.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lénaïg Bredoux</strong><br />
The investigative journalist and general editor of Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus. Bredoux was involved in a story about the head of Morocco’s intelligence agency, a known NSO client.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Edwy Plenel</strong><br />
The investigative journalist with Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed France 24 journalist</strong><br />
A senior journalist with France 24 was confirmed to have been infected by Pegasus in May 2019, September 2020 and January 2021. That was confirmed by France’s computer security agency after Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Claude Mangin</strong><br />
French national whose husband, Naama Asfari, is jailed in Morocco for advocating for Western Saharan independence. As part of Project Pegasus, it was found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/">at least two of her phones were infected</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Arnaud Montebourg</strong><br />
A former minister in the government of Manuel Valls, Montebourg was targeted in 2019, most likely by Morocco, an analysis by Amnesty found. Montebourg has given testimony to ANSSI and its investigation into NSO in France.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">HUNGARY</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dániel Németh</strong><br />
A Hungarian photojournalist involved in covering President Viktor Orbán and the country’s elites, two of his phones were infected in 2021. Direkt36, working with Citizen Lab and Amnesty’s Security Lab, confirmed the infections.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Zoltán Páva</strong><br />
The former Hungarian politician, now the publisher of an opposition news website, was also infected by Pegasus in March and May 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Adrien Beauduin</strong><br />
A gender studies student at Central European University in Hungary, Beauduin was confirmed to have had his phone infected after being arrested in a protest against Orbán’s policies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Szabolcs Panyi</strong><br />
The journalist with Direkt36, which was a partner in the Pegasus Project, was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">András Szabó</strong><br />
An investigative journalist with Direkt36, Szabó’s phone was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Brigitta Csikász</strong><br />
A Hungarian journalist covering crime stories, Csikász’s phone was infected in 2019 – which <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">was confirmed by Direkt36 and Amnesty</a>.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">INDIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jagdeep Singh Randhawa</strong><br />
Human rights lawyer and activist from Punjab <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/tech/punjab-pegasus-project-lawyers-police-brutality-uapa-surveillance">had his phone hacked in July and August 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mangalam Kesavan Venu</strong><br />
Founding editor of The Wire – a nonprofit Indian investigative journalism outlet that was part of the Project Pegasus investigation – was found to have been infected with the spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Paranjoy Guha Thakurta</strong><br />
Investigative journalist who was looking into how the Modi government used Facebook to spread disinformation; Amnesty confirmed his phone had been infected by NSO’s spyware as part of the Project Pegasus investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Prashant Kishor</strong><br />
Political pollster working with a number of opposition parties in India, his phone was infected in 2018, Amnesty confirmed, months before an election – in what critics say was an attempt by Modi’s party to use the spyware to collect political information.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rona Wilson</strong><br />
An activist focused on minorities and prisoners’ rights, digital forensics firm Arsenal Consulting found that his phone had been infected in July 2017 and April 2018. His phone number appeared in the Project Pegasus leaks.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Syed Abdul Rahman Geelani</strong><br />
Geelani (also known as SAR Geelani), a Delhi University professor serving time in India for ties to an outlawed Maoist group and prisoners’ rights activist, was found by Amnesty to have been infected between 2017 and 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sushant Singh</strong><br />
A journalist who covered defense issues for The Indian Express, and was investigating a massive deal between India and France, was found by Amnesty to have <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">been infected as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">S.N.M. Abdi</strong><br />
Journalist for India’s Outlook had his phone infected by Pegasus in April 2019, May 2019, July 2019, October 2019 and December 2019, Amnesty <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/media/pegasus-project-spyware-indian-journalists">found as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bela Bhatia</strong><br />
An Indian human rights lawyer whose phone was found to have been infected in 2019, and is one of five victims <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.nytimes.com/2019/11/09/technology/nso-group-spyware-india.html">who are part of WhatsApp suit against NSO</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Siddharth Varadarajan</strong><br />
An Indian investigative journalist who is the former editor of The Hindu and founding editor of The Wire, a Pegasus Project partner. He had his phone targeted with NSO-made spyware in April 2018. Forbidden Stories and Amnesty International’s Security Lab’s forensic analysis revealed he was successfully infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed legal officer</strong><br />
The legal officer was also confirmed to have been hacked with spyware <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">following the Project Pegasus investigation</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ankit Grewal</strong><br />
The lawyer and so-called anti-caste activist was found to have been targeted in 2019 – one of a large group of victims named by WhatsApp in its suit against NSO.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">Read our full story on Pegasus in India</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">ISRAEL</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shai Babad</strong><br />
A former director general of the Finance Ministry who was also a politician and also served in a senior position in Israel’s public broadcaster. Israeli business daily Calcalist said his phone had been infected with Pegasus by the Israel Police. All of the Israeli cases listed below <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/israel-police-used-nsos-pegasus-spyware-against-top-govt-officials-journalists-and-activists/0000017f-e7ff-da9b-a1ff-efff62400000">are based on Calcalist reporting</a> that has yet to be confirmed or reviewed by Haaretz or international bodies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avi Berger</strong><br />
The former director general of the Communications Ministry and a witness in the ongoing Case 4000 trial against former Prime Minister Benjamin Netanyahu. Calcalist reported that Berger&#8217;s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aviram Elad</strong><br />
The former editor of Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company, the telecom giant Bezeq, in Case 4000. Calcalist said his phone was infected by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Iris Elovitch</strong><br />
The wife of Bezeq owner Shaul Elovitch; both are defendants in Case 4000. Her phone was infected with Pegasus by the Israel Police, Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<div class="qg xn m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. , Credit: Reuben Castro" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=250&amp;width=375 375w" alt="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. " width="2200" height="1466" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. </span><span class="ao pt rj dp dq qs qt">Credit: Reuben Castro</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Keren Terner-Eyal</strong><br />
A former director general of the transportation and finance ministries, Terner-Eyal assumed the latter position after Babad left the role. Calcalist said her phone was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shlomo Filber</strong><br />
A former director general of the Communications Ministry, who was appointed by Netanyahu in 2015 and now serves as a key state&#8217;s witness in the Bezeq quid pro quo case. Filber was the first Israeli whose name was published by Calcalist as having been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Miriam Feirberg</strong><br />
The mayor of Netanya, who was suspected of corruption and investigated by the police until her case was closed in 2019. Calcalist said her phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Stella Handler</strong><br />
The former CEO of Bezeq, was said by Calcalist to have been infected with Pegasus by the Israel Police. Handler is part of Case 4000.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yair Katz</strong><br />
The chairman of the workers union at Israel Aerospace Industries and son of former Likud lawmaker Haim Katz was said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rami Levy</strong><br />
A prominent Israeli businessman famous for his low-cost supermarket chain who also owns a small telecom firm. Calcalist reported that his phone was infected with Pegasus by the Israel Police. He was investigated by the police in the past.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Topaz Luk</strong><br />
A former adviser to Netanyahu who is considered close to his son, Yair Netanyahu, and served a number of roles in past campaigns. He is also credited with key aspects of the then-prime minister’s media strategy. Calcalist said Luk’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dudu Mizrahi</strong><br />
The CEO of Bezeq, who took over the telecom company after Handler. Calcalist said his device was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avner Netanyahu</strong><br />
The youngest son of former Prime Minister Benjamin Netanyahu. Calcalist reported that Avner Netanyahu’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Emi Palmor</strong><br />
A jurist and former director general of the Justice Ministry who currently serves on Facebook’s Advisory Board. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yaakov Peretz</strong><br />
The mayor of Kiryat Ata, who was suspected of corruption in 2019 and investigated by the police until the case was closed in 2020. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moti Sasson</strong><br />
The six-term mayor of the Tel Aviv suburb of Holon was another mayor whose phone was infected with Pegasus by the Israel Police, according to Calcalist.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ilan Yeshua</strong><br />
The CEO of the news website Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company Bezeq. Yeshua is also part of Case 4000 and was infected with Pegasus by the Israel Police. Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jonatan Urich</strong><br />
A former adviser to Benjamin Netanyahu and considered close to his son, Yair. He served a number of roles in various electoral campaigns and is credited with key aspects in Netanyahu’s media strategy. Urich, whose phone was hacked by Israeli police as part of an investigation, was also said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Walla journalists</strong><br />
As part of Case 4000, a number of journalists with the news site were said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Protest leaders</strong><br />
The leaders of three protest movements were said by Calcalist to have been infected with Pegasus by the Israel Police. The protest movements targeted were: Israelis with disabilities; Israelis of Ethiopian descent; and heads of the anti-Netanyahu protests. The first were fighting for better rights, the second demonstrated against police violence and the third sought to oust Netanyahu.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Extreme settlers</strong><br />
A number of extreme settlers were said by Calcalist to have been infected with Pegasus by the Israel Police ahead of the evacuations of illegal outposts.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><em class="un"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/.premium/israel-polices-spyware-scandal-politicians-demand-commission-of-inquiry/0000017f-e7d8-df5f-a17f-ffde9b610000">Read our full story on Pegasus in Israel</a></strong></em></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">JORDAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hala Ahed Deeb</strong><br />
Jordanian human rights lawyer, unionizer and feminist activist was found by Front Line Defenders <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">to have been infected with Pegasus since March 2021</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ahmed al-Neimat</strong><br />
A rights activist focused on workers rights and combating corruption. He works with a reform group called Hirak and has been targeted in the past, facing arrest for “insulting the king” and even a travel ban. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.frontlinedefenders.org/en/statement-report/report-jordanian-human-rights-defenders-and-journalists-hacked-pegasus-spyware">Front Line Defenders</a> and <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/">Citizen Lab found</a> his phone was hacked at the end of January 2021, likely through the FORCEDENTRY exploit, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000">making him the earliest victim of that particular method</a>. His phone was likely hacked using the exploit’s zero-click capabilities.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suhair Jaradat</strong><br />
A rights activist and journalist focused on women’s rights in Jordan and the Arab world who serves on the executive committee of the International Federation for Journalists. She was hacked six times between February and December 2021, through the FORCEDENTRY exploit in iPhones. The last hack took place after Apple had patched the breach, informed potential victims across the world and sued NSO. Jaradat did not update her phone and was thus still exposed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Malik Abu Orabi</strong><br />
A rights lawyer who works with prominent Jordanian unions and was previously arrested by the state for his efforts. He was hacked at least 21 times between August 2019 and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anonymous journalist</strong><br />
A female journalist was also hacked, Front Line Defenders and Citizen Lab found. She requested to remain anonymous.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000"><strong class="dm">Read our full story on Pegasus in Jordan</strong></a></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">KAZAKHSTAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aizat Abilseit, Dimash Alzhanov and Tamina Ospanova</strong><br />
Three members of the opposition group Wake Up, Kazakhstan whose phones were found by Amnesty’s Security Lab to have been infected by Pegasus in June 2021. Apple also warned them about the hack, which it attributed to a “state-sponsored attacker.”</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Darkhan Sharipov</strong><br />
The Kazakh activist’s phone was also found by Amnesty to have been infected by Pegasus in June 2021.<br />
<strong class="dm">Suspected operator:</strong> Kazakhstan</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-09/ty-article/israeli-nso-spyware-found-on-kazakhstan-activists-phones/0000017f-e48a-d568-ad7f-f7eb86f30000">Read our full story on Pegasus in Kazakhstan</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">LEBANON</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lama Fakih</strong><br />
Human Rights Watch’s crisis and conflict director also heads the group’s Beirut office. She was targeted with Pegasus spyware at least five times between April and August 2021, HRW and Amnesty International’s Security Lab found.<br />
<strong class="dm">Suspected operator:</strong> Unknown</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-26/ty-article/human-rights-watch-official-in-beirut-reportedly-targeted-by-israeli-nso-spyware/0000017f-db87-db5a-a57f-dbef14a50000">Read our full story</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">MOROCCO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hicham Mansouri</strong><br />
Freelance investigative journalist and co-founder of the Moroccan Association of Investigative Journalists had his iPhone infected with Pegasus more than 20 times between February and April 2021, the Project Pegasus investigation revealed. Mansouri fled Morocco in 2016 and is now based in Paris.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mahjoub Mleiha</strong><br />
Human rights activist from Western Sahara who is active in the Collective of Sahrawi Human Rights Defenders, now lives in Belgium, where he is also a citizen. Amnesty found that his phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Joseph Breham</strong><br />
A French lawyer who is involved in a lawsuit against Saudi Crown Prince Mohammed over claims of torture and inhumane treatment in Yemen. Amnesty confirmed that his phone had been infected with Pegasus using the same type of messages <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2018-04-10/ty-article/rights-group-files-lawsuit-against-saudi-prince-over-yemen/0000017f-dc26-df62-a9ff-dcf715ef0000">other alleged victims in Morocco also received</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oubi Buchraya Bachir</strong><br />
Sahrawi diplomat who has served as its representative in a number of African countries. Amnesty confirmed as part of Project Pegasus that his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Maati Monjib</strong><br />
Founder of the Moroccan Association for Investigative Journalism and the NGO Freedom Now (dedicated to protecting the rights of journalists and writers), Amnesty found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.amnesty.org/en/latest/research/2019/10/morocco-human-rights-defenders-targeted-with-nso-groups-spyware/">his phone had been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus., Credit: Majdi Mohammed/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO&#8217;s workers&#8217; phones was infected by Pegasus.</span><span class="ao pt rj dp dq qs qt">Credit: Majdi Mohammed/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Radi</strong><br />
An independent, award-winning Moroccan journalist whose phone was <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2020-06-22/ty-article/.premium/israels-nso-helped-moroccan-govt-spy-on-journalist-amnesty-claims/0000017f-f4fb-d5bd-a17f-f6fb56ad0000">found by Amnesty to have been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aboubakr Jamaï</strong><br />
Jamaï is a journalist who has long inspired the ire of Morocco’s royal family. Citizen Lab together with <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.accessnow.org/nso-whatsapp-hacking-victims-stories/">Access Now found</a> his phone had been infected with Pegasus after materials on it were leaked online in an attempt to tarnish Jamaï and his associates.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Fouad Abdelmoumni</strong><br />
A Moroccan human rights and democracy activist who works with Human Rights Watch and Transparency International Morocco, Abdelmoumni’s phone was found to have been infected, most likely by the Moroccan intelligence services. Citizen Lab investigated the hacking after being commissioned by WhatsApp.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">PALESTINIAN TERRITORIES (WEST BANK)</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ghassan Halaika</strong><br />
Human rights activist working for Al-Haq, a Palestinian NGO blacklisted by Israel, whose phone was infected in July 2020. The confirmation was made by human rights organization Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ubai Aboudi</strong><br />
The phone of the director of the Bisan Center for Research and Development, a Palestinian NGO blacklisted by Israel, was infected in 2020 and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Salah Hammouri</strong><br />
Lawyer and researcher with the Addameer Prisoner Support and Human Rights Association, a Palestinian NGO blacklisted by Israel, whose phone was infected in 2020, according to Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Three unnamed activists</strong><br />
Phones of three activists working with Palestinian NGOs blacklisted by Israel were infected in 2020, and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all six cases:</strong> Israel</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xp m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month., Credit: Czarek Sokolowski/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=989&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=880&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=706&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=631&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=499&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=412&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=292&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=258&amp;width=375 375w" alt="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month." width="2362" height="1623" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month.</span><span class="ao pt rj dp dq qs qt">Credit: Czarek Sokolowski/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-11-08/ty-article/.highlight/nso-spyware-used-against-palestinian-activists-in-blacklisted-ngos-report-says/0000017f-ded8-d3a5-af7f-fefe14b60000">Read our full story on Pegasus in the West Bank</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">POLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Krzysztof Brejza</strong><br />
Polish senator and member of the opposition party Civic Platform whose phone was confirmed to have been infected over 30 times in 2019. The confirmation was made by Citizen Lab and reported by AP.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Roman Giertych</strong><br />
A lawyer who has represented leaders of Brejza’s Civic Platform party in sensitive cases, and was confirmed to have been infected over 10 times in 2019. The confirmation was made by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ewa Wrzosek</strong><br />
The phone of the prosecutor and critic of the ruling Law and Justice party’s attempt to undermine Poland’s judiciary was confirmed to have been infected a number of times in 2019. The confirmation was made by Citizen Lab after she received a notification from Apple warning that her phone had been hacked.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Michal Kolodziejczak</strong><br />
The agrarian social movement leader was hacked several times in May 2019 ahead of a fall election in which Kolodziejczak was hoping to have his group, AGROunia, become a formal political party. Courts have so far blocked his efforts to form a political party.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tomasz Szwejgiert</strong><br />
An author and collaborator with Polish secret services who found himself at odds with powerful figures was hacked while co-authoring a book about the head of Poland’s secret services, Mariusz Kaminski. He was hacked 21 times with Pegasus from late March to June 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Poland</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-03/ty-article/.highlight/poland-reportedly-purchased-pegasus-spyware-after-netanyahu-meeting/0000017f-f7c6-d47e-a37f-fffe908b0000">Read our full story on Pegasus in Poland</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">RWANDA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carine Kanimba</strong><br />
A U.S.-Belgian citizen, Kanimba is the daughter of Rwandan activist Paul Rusesabagina, who was arrested and forcibly returned to the country. Her father’s plight inspired the 2004 movie “Hotel Rwanda” and she was confirmed by Amnesty to have been hacked at the start of 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xq m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year., Credit: MURAD SEZER/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=947&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=842&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=676&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=604&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=477&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=395&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=279&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=247&amp;width=375 375w" alt="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year." width="2465" height="1621" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year.</span><span class="ao pt rj dp dq qs qt">Credit: MURAD SEZER/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Peter Verlinden</strong><br />
The Belgian journalist stationed in Africa has worked for the national Flemish broadcaster VTR. Belgian intelligence services and Amnesty found that his phone had been infected in September, October and November 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Marie Bamutese</strong><br />
The phone of Peter Verlinden’s wife was also found to have been hacked. This was confirmed <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/news/2021/jul/19/hotel-rwanda-activist-daughter-pegasus-surveillance">by Belgium&#8217;s General Intelligence and Security Service</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Placide Kayumba</strong><br />
A Rwandan activist and member of the opposition in exile, Kayumba was found to have been targeted as part of an investigation by Citizen Lab commissioned by WhatsApp into hacking of its clients.<br />
<strong class="dm">Suspected operator:</strong> Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">SAUDI ARABIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hatice Cengiz</strong><br />
The Turkish national was the fiancée of the late Washington Post columnist Jamal Khashoggi, and her phone was infected a few days after her partner was murdered at the Saudi Embassy in Istanbul in October 2018 – as revealed by Amnesty as part of Pegasus Project.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Abdulaziz</strong><br />
A close friend of Khashoggi’s, Abdulaziz’s phone was infected with Pegasus in the months before the Saudi dissident’s murder in 2018, CItizen Lab found. Based in Canada, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus">he has filed a lawsuit against NSO in Israel</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Wadah Khanfar</strong><br />
Al Jazeera’s former director general and another close friend of Khashoggi, Amnesty found that his phone was infected as recently as July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ragip Soylu</strong><br />
A Turkish journalist who heads Middle East Eye’s bureau in Ankara. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.middleeasteye.net/news/pegasus-israel-spyware-target-turkey-middle-east-eye-journalist">Amnesty confirmed that his phone was infected</a> several times between February and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ben Hubbard</strong><br />
The phone of the New York Times journalist <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/">was confirmed by Citizen Lab</a> to have been infected between June 2018 to June 2021 while he was based in Lebanon, reporting on Saudi Arabia and writing a book about Crown Prince Mohammed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Saudi Arabia</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/khashoggis-fiancee-son-targeted-by-nso-tech-investigation-reveals/0000017f-dc92-db5a-a57f-dcfa206c0000">Read our full story on Pegasus in Saudi Arabia</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">TOGO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. , Credit: Burhan Ozbilici/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. " width="2449" height="1633" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Egyptian dissident Ayman Nour speaking in Istanbul in 2019. </span><span class="ao pt rj dp dq qs qt">Credit: Burhan Ozbilici/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Father Pierre Marie-Chanel Affognon</strong><br />
A Catholic priest from Togo who is an anti-corruption activist fighting for constitutional and electoral reform in the West African country. An investigation by Citizen Lab commissioned by WhatsApp into the hacking of its clients found his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED ARAB EMIRATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Alaa al-Siddiq</strong><br />
Executive director of ALQST, a nonprofit advocating for human rights in the UAE and the Gulf region. Her phone was found to have been infected a number of times from 2015, when she was living in Qatar (where she had moved to flee persecution), and up until 2019, when she had relocated to Britain. She died in a car crash in 2021. Citizen Lab made the hacking confirmation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Abdulaziz Alkhamis</strong><br />
The former editor of Al Arab, Alkhamis was hacked as part of a showcase NSO organized for the UAE. According to a lawsuit filed on behalf of Alkhamis, the UAE, which were already NSO clients from 2014, were offered an expensive upgrade of the Pegasus spyware. To show the new product’s value, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2018-08-31/ty-article/uae-used-israeli-spyware-to-track-qatari-royals/0000017f-f2b9-d5bd-a17f-f6bb091f0000">NSO emailed two audio recordings of Alkhamis to Emerati officials, the New York Times reported in 2018</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ayman Nour</strong><br />
Egyptian dissident, 2005 Egyptian presidential candidate and opposition activist. Citizen Lab found his phone had been <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-12-17/ty-article/two-israeli-spyware-firms-hacked-dissidents-phones-in-egypt-india/0000017f-ed9b-d639-af7f-eddf0b8f0000">infected by Pegasus, as well as an additional spyware</a> called Predator – which was developed by NSO competitor Cytrox.<br />
<strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rania Dridi</strong><br />
A journalist with Alaraby TV, she had her phone infected at least six times during 2020, as confirmed by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tamer Almisshal</strong><br />
Investigative journalist for Al Jazeera in Arabic who has covered the Gulf region extensively, including the Khashoggi killing. His phone was infected in 2020, Citizen Lab confirmed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ebtisam al-Saegh</strong><br />
Bahraini human rights activist focused on women’s rights. Front Line Defenders found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">her phone was hacked at least eight times</a> between August and November 2019. Saegh had been arrested in Bahrain for her activism in the past and has faced persecution for her work.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">34 Al Jazeera staffers</strong><br />
The phones of 34 other journalists, producers, anchors and executives at Al Jazeera were confirmed to have been infected in 2020, Citizen Lab reported.<br />
<strong class="dm">Suspected operator:</strong> Saudi Arabia, Bahrain and/or the UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl xa xb go gp xc xd xe xf xg xh fp fq xi fs ft xj xk ah fj fk fl fm fn fo xl gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO., Credit: MEXICO'S PRESIDENCY / REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 1232px,(min-width: 64em) 978px,(min-width: 48em) 660px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=512&amp;width=768 768w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Mexican President Andres Manuel Lopez Obrador speaking last July about allegedly being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO.</span><span class="ao pt rj dp dq qs qt">Credit: MEXICO&#8217;S PRESIDENCY / REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED KINGDOM</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">David Haigh</strong><br />
The <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">human rights lawyer and LGBTQ activist</a> who represented Princess Latifa of Dubai was the first British target confirmed to have been infected by Pegasus. He supplied Amnesty with his phone in the wake of Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anas Altikriti</strong><br />
Muslim anti-war activist based in the U.K. whose phone was confirmed to have been infected with Pegasus. His interfaith thinktank, the Cordoba Foundation, has been accused of maintaining ties with the Muslim Brotherhood and Hamas. <strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED STATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">11 unnamed U.S. officials</strong><br />
Eleven officials with the U.S. State Department in Uganda <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-12-05/ty-article/.premium/targeting-u-s-officials-could-mean-death-sentence-for-israeli-nso/0000017f-f7da-d2d5-a9ff-f7de3c070000">were confirmed to have been hacked with Pegasus</a>. The revelation led to a U.S. Department of Commerce decision last November to blacklist NSO.<br />
<strong class="dm">Suspected operator:</strong> Uganda or Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">LIST OF THOSE WHO HAVE ALSO BEEN TARGETED BY PEGASUS:</strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ahmed Mansoor (Emirati human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rafael Cabrera (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Dr. Simon Barquera (Mexican researcher)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alejandro Calvillo (Mexican whistleblower)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Luis Encarnación (Mexican activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Karla Micheel Salas (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">David Peña (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carmen Aristegui (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Emilio Aristegui (son of Carmen Aristegui)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sebastián Barragán (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carlos Loret de Mola (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Salvador Camarena (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Daniel Lizárraga (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mario E. Patrón (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stephanie Brewer (U.S. human rights activist working in Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santiago Aguirre (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alexandra Zapata (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Azam Ahmed (Former New York Times bureau chief for Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016., Credit: AP Photo/Rebecca Blackwell" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016.</span><span class="ao pt rj dp dq qs qt">Credit: AP Photo/Rebecca Blackwell</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ricardo Anaya Cortés (Mexican lawyer/politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sen. Roberto Gil Zuarth (Mexican senator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Fernando Rodríguez Doval (Mexican politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Claudio X. González (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">GIEI investigation (Mexican probe into mass disappearances)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ghanem Almasarir (Saudi dissident)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Yahya Assiri (Saudi activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed Amnesty International employee</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Abdessadak El Bouchattaoui (Moroccan journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Griselda Triana (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Nihalsing Rathod (Indian human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Priyanka Gandhi Vadra (General secretary, Indian National Congress)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santosh Bhartiya (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shubhranshu Choudhary (Indian peace activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed U.K. lawyer</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shalini Gera (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Degree Prasad Chauhan (Indian human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Anand Teltumbde (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ashish Gupta (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Seema Azad (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vivek Sundara (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Saroj Giri (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sidhant Sibal (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rajeev Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupali Jadhav (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Meshram (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alok Shukla (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ajmal Khan (Indian research scholar)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Balla Ravindranath (Indian lawyer/activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mandeep Singh (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">P. Pavana (Indian, daughter of activist P. Varavara Rao)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Arunank (Indian law graduate)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Smita Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Hanan Elatr (wife of Jamal Khashoggi)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jorge Carrasco (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Álvaro Delgado Gómez (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Latifa al Maktoum (daughter of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Haya bint Hussein (estranged wife of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Mayer (aerial photographer who recorded Princess Latifa’s skydives)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Lynda Bouchikhi (Princess Latifa’s officially sanctioned chaperone)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sioned Taylor (friend of Princess Latifa)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Martin Smith (head of U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shimon Cohen (British PR expert)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ross Smith (head of investigations at U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">John Gosden (British horse trainer, friend of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Aisha bint Hussein (half sister of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stuart Page (British private investigator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">K.K. Sharma (former Indian Border Security Force chief)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Maithani (Indian Border Security Force officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha (former Indian espionage officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Col. Mukul Dev (former Indian army officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Devirupa Mitra (Indian diplomatic correspondent)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vijaita Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Bishop Benoit Alowonou (Togolese clergyman)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Elliott Ohin (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Raymond Houndjo (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Roger Torrent (Catalan parliamentary speaker)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">A Complete (Updating) List of Individuals Targeted With Pegasus Spyware Plus 1,400 other potential targets who WhatsApp believes were hacked.</p>
<p>&nbsp;</p>
<p><a href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article-magazine/nso-pegasus-spyware-file-complete-list-of-individuals-targeted/0000017f-ed7a-d3be-ad7f-ff7b5a600000" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MIMO Fake Cell Towers Allow mobile interception device can intercept cellular data to Keep Track of You</title>
		<link>https://goodshepherdmedia.net/mimo-fake-cell-towers-allow-mobile-interception-device-can-intercept-cellular-data-to-keep-track-of-you/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 18:54:23 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[How to clone cells data]]></category>
		<category><![CDATA[MIMO Attacks]]></category>
		<category><![CDATA[mobile interception]]></category>
		<category><![CDATA[mobile interception device]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18031</guid>

					<description><![CDATA[MIMO Fake Cell Towers Allow mobile interception device can intercept cellular data to Keep Track of You Fake Cell Towers Allow the NSA and Police to Keep Track of You The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>MIMO Fake Cell Towers Allow mobile interception device can intercept cellular data to Keep Track of You</h1>
<h2>Fake Cell Towers Allow the NSA and Police to Keep Track of You</h2>
<p>The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.</p>
<p>These fake towers, known as &#8220;interceptors,&#8221; were<a class="multivariate" href="http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls" rel="nofollow"> discovered</a> in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden&#8217;s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. While driving around the country, CryptoPhone users plotted on a map every time they connected to a nameless tower (standard towers run by wireless service providers like Verizon usually have names) and received an alert that the device had turned off their phone&#8217;s encryption (allowing their messages to be read).</p>
<p>Map showing the location of rogue cell towers identified by the firewall on CryptoPhones in August via ESD America, a defense and law enforcement technology provider based in Las Vegas.</p>
<p>While the abilities of these interceptors vary, the full-featured versions available to government agencies are capable of a panoply of interceptions. For example, the VME Dominator can <a class="multivariate" href="http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls" rel="nofollow">capture</a> calls and texts, and can even control the intercepted phone.<a class="multivariate" href="https://paleofuture.gizmodo.com/the-nsa-can-still-bug-your-phone-when-its-powered-off-1585427282" rel="nofollow"> (In an interview with NBC</a>, Snowden revealed that with this kind of technology the NSA is capable of turning on a powered-down phone and essentially using it as a bug.)</p>
<p>This NSA-style surveillance is spreading to local cops. A growing number of police departments are using tower-mimicking devices, &#8220;stingrays,&#8221; to track a cell phone&#8217;s location and extract call logs. Though little is known about the use of these devices, watchdog groups have scored small victories in their attempts to punch through this veil of secrecy. The<a class="multivariate" href="https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices-whos-got-them?redirect=maps/stingray-tracking-devices-whos-got-them" rel="nofollow"> map below</a>, courtesy of the ACLU, shows how the use of stingrays is spreading. The map also shows that despite the ALCU&#8217;s greatest efforts, it is unable to uncover information about stingray use in most of the country.</p>
<p>A recent case provided a glimpse into what stingrays can do and how they are being used.</p>
<div id="dfp-ad-inarticle3-wrapper" class="dfp-tag-wrapper dfp-ad-lazy dfp-ad-count">
<div id="dfp-ad-inarticle3" class="dfp-tag-wrapper mpu-only unstick" data-google-query-id="CL-c1qeDsIYDFVpaCAQdXtYNJw">
<p>In January, Tallahassee, Florida, police<a class="multivariate" href="https://www.aclu.org/blog/national-security/privacy-and-surveillance/police-hide-use-cell-phone-tracker-courts-because?redirect=blog/national-security-technology-and-liberty/police-hide-use-cell-phone-tracker-courts-because" rel="nofollow"> used</a> one to track a stolen cell phone to a suspect&#8217;s apartment. The police then entered the home without permission, conducted a search, and arrested the suspect in his home. Not only did the police not have a warrant, but they did not disclose to a judge that they were in possession of a stingray because the department had received it on loan from the manufacturer on condition of secrecy.</p>
<p>Only after a judge granted a motion filed by the ACLU to unseal the transcripts of the case (the federal government had previously <a class="multivariate" href="https://www.aclu.org/blog/victory-judge-releases-information-about-police-use-stingray-cell-phone-trackers?redirect=blog/national-security-technology-and-liberty/victory-judge-releases-information-about-police-use" rel="nofollow">demanded</a> the proceedings be sealed, going so far as to try to invoke the Homeland Security Act as the reason) was it revealed that between 2007 and 2010 the department used stingrays without getting warrants around 200 times. Additionally, the department had two devices; one mounted on a police vehicle, and the other carried by hand—and both were evaluating nearby cell phones in order to find a suspect. This means that information like location and phone data was pulled from innocent bystanders as well as the target of an investigation.</p>
<p>In the wake of the militarized response by the police in Ferguson, Missouri to protesters, many are taking a closer look at how the government may be abetting law enforcement in surreptitious cell phone surveillance. The purchase of such equipment is often funded by Homeland Security grants for which state and local police departments can apply. The gradual uncovering of this paper trail reveals new details about surveillance technology use. For instance, a Tacoma, Washington <a class="multivariate" href="http://usaspending.gov/explore?fiscal_year=all&amp;comingfrom=searchresults&amp;piid=DJD13HQG0264&amp;typeofview=complete" rel="nofollow">purchase order</a>, uncovered by <em><a class="multivariate" href="http://www.thenewstribune.com/2014/08/26/3347665_documents-tacoma-police-using.html?rh=1" rel="nofollow">The News Tribune</a></em>, revealed that a major reason there&#8217;s been a recent surge in requests for upgraded stingrays is the spread of 4G service.</p>
<p>Older stingrays, like the kind used by police departments, force phones using 4G or 3G down to 2G in order to more easily de-crypt data in real time. But 2G service is expected to be shut off soon—AT&amp;T<a class="multivariate" href="http://arstechnica.com/information-technology/2012/08/att-will-kill-2g-network-by-2017-to-clear-spectrum-for-3g-and-4g/" rel="nofollow"> announced</a> it would do so in 2017. If a stingray can&#8217;t knock a 4G phone down to 2G, however, it can&#8217;t do its job.</p>
<p>Last week, the city of Oakland, California, released documents<a class="multivariate" href="https://www.documentcloud.org/documents/1280786-sharpscanoaklandnet-com-20140826-180929.html" rel="nofollow"> revealing</a> that three local jurisdictions applied for a Homeland Security grant to obtain a &#8220;state-of-the-art cell phone tracking system&#8221; with 4G tracking abilities. Other areas, including Tacoma; Baltimore; Chesterfield, Virginia; Sunrise, Florida; and Michigan&#8217;s Oakland County are also seeking upgrades.</p>
<p>Since the news of the phony cell phone towers broke, Les Goldsmith, the CEO of ESD America, which is marketing the CryptoPhone500 in the U.S., told <em>Newsweek </em>that sales have been &#8220;exceptional.&#8221; He added, &#8220;We should get far greater units in the field to report interceptors.&#8221; <a href="https://www.newsweek.com/what-cell-ls-those-ominous-phony-towers-268589" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<hr />
<h1 class="post-title single-post-title entry-title">Awesome Resources explains how anyone with a mobile interception device can intercept cellular data</h1>
<p>Mobile networks are dominant in the age of communication and are used to relay mobile communication signals to <a href="https://privacyinternational.org/explainer/1640/phone-monitoring" target="_blank" rel="external noopener" data-wpel-link="external">Public Switched Telephone Networks</a> (PSTN). There is a lot of information that is exchanged on a daily basis. But is your mobile network confidential?</p>
<div id="attachment_82278" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18035" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-Interception-systems-chart.webp" alt="" width="952" height="694" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-Interception-systems-chart.webp 952w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-Interception-systems-chart-400x292.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-Interception-systems-chart-768x560.webp 768w" sizes="(max-width: 952px) 100vw, 952px" /></p>
<div class="code-block code-block-7">
<table>
<tbody>
<tr>
<td>Your mobile phone can be used for industrial espionage, unauthorized transfer of data, or for trading secrets of the enterprises. All this is done through interception of mobile signals, voice calls or using your mobile as a bug. You’d be surprised to hear what’s to follow in this article.</p>
<p>We bring you devices, types, and techniques for mobile interception. Sit tight as we prepare you against being a victim of malicious interception practices.</p>
<h4>What is mobile interception?</h4>
<p>Mobile interception technology is the storage, recording, tracking, and interception of cellular communications like phone calls, internet usage, SMS, etc. This technology is primarily used for gathering intelligence regarding terrorist or criminal activities.</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>Even though it started out as an ethical technology for security, there are reports about the misuse of the technology doing the rounds.</p>
<p>However, for those concerned about their privacy during calls, using tools like <a href="https://apps.apple.com/us/app/call-recorder-icall/id1447098963" target="_blank" rel="external noopener" data-wpel-link="external">Call Recorder iCall </a>can provide an added layer of security by recording and securely storing conversations.</p>
<h4>How does mobile interception work?</h4>
<p>There are three types of mobile networks – NGN (Next Generation Networks like 3G, 4G, and 5G), GSM (Global System for Mobile communications) and CDMA (Code Division Multiple Access). All three of them are targets of multiple surveillance technologies.</p>
<p>When the mobile phone data travels over these networks, they are passively intercepted between the mobile phone and the base station it is communicating to. Both uplink signal (outgoing voice or data) and downlink (incoming voice or data) signals can be intercepted.</p>
<div id="attachment_82280" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18032" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-networks.webp" alt="" width="952" height="717" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-networks.webp 952w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-networks-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mobile-networks-768x578.webp 768w" sizes="(max-width: 952px) 100vw, 952px" /></p>
<p id="caption-attachment-82280" class="wp-caption-text">Source: Cobham Survaillance</p>
</div>
<h4>Who can intercept your mobile signal?</h4>
<p>Mobile Interception technology is extensively used by law enforcement agencies, military &amp; defense, or authorities like government and federal &amp; local law enforcement agencies (LEAs). These are also termed as <a href="http://4g5gworld.com/blog/lawful-interception-architecture-lte-evolved-packet-system" target="_blank" rel="external noopener" data-wpel-link="external">Lawful Interceptions</a>. But there are unauthorized intercepts too!</p>
<p>Our expert <a href="https://www.awesomeresources.co.uk/about-us/" target="_blank" rel="external noopener" data-wpel-link="external">Sam Tilston</a> from <a href="https://www.awesomeresources.co.uk/" target="_blank" rel="external noopener" data-wpel-link="external">AwesomeResources.co.uk</a>, a professional in cyber security for more than 20 years believes that anyone with a mobile interception device can intercept cellular information like- voice, data transmission, and metadata.</p>
<h4>Lawful Interception (LI) – The modern legal interception protocol</h4>
<p>Lawful Interception or LI refers to a specific facility in telecommunications where LEA or government with court orders or legal authorization can intercept mobile signals. In common parlance it’s also called selective wiretapping or authorized wiretapping.</p>
<p>Lawful interception is different from the <a href="https://en.wikipedia.org/wiki/Dragnet_(policing)" target="_blank" rel="external noopener" data-wpel-link="external">dragnet-type mass surveillance</a> and is usually carried out by intelligence agencies. The data is merely passed through a fiber-optic splice where its extracted and filtered.</p>
<p>Many countries follow local, national, and global standards for lawful interception laid down by <a href="https://www.etsi.org/deliver/etsi_ts/133100_133199/133107/12.09.00_60/ts_133107v120900p.pdf" target="_blank" rel="external noopener" data-wpel-link="external">ESTI</a>. Governments and authorities require PSPs (Public Service Providers) to install a (LIG) legal interception gateway and LIN (legal interception nodes) for real-time interception.</p>
<h4>Lawful Interception architecture</h4>
<p>Currently the global standard for Lawful Interception and its architecture is provided by ESTI. The standard architecture in recent use is 3GPP Evolved Packet System (EPS) that provides IP based services.</p>
<p>The ESP architecture attempts to define an extensible and systematic means by which LEAs and network operators can interact. There are three stages in the architecture:</p>
<ol>
<li><strong>Collection:</strong> target-related call content and data are extracted from these PSP networks.</li>
<li><strong>Mediation: </strong>data is formatted to match the specific standard.</li>
<li><strong>Delivery: </strong>The content and data are delivered to the law enforcement agencies.</li>
</ol>
<p>Delivery function in the architecture is what is used to hide your sensitive interceptions from Intercepting Control Element (ICE). Even when there are multiple targets on the same number, the authorities have no idea about it.</p>
<h4>What is the need for mobile interception?</h4>
<p>Apart from the malicious effects like snooping and eavesdropping, mobile interception can be used for security. Want to know the uses?</p>
<p><strong>1. Administration Security</strong></p>
<p>The Administrative function (ADMF) keeps all the intercept activities of individual LEAs separate and interfaces to the intercepting network.</p>
<p>After configuring authorized user access within the network, password protection can be enabled using one of the following security mechanisms:</p>
<ul>
<li>CUG/VPN</li>
<li>COLP</li>
<li>CLIP</li>
<li>Authentication &amp; Encryption</li>
</ul>
<div id="browsi_adWrapper_ai_2_ati_1_rc_0">
<div id="browsi_adContainer_ai_2_ati_1_rc_0" data-google-query-id="CIOU0PrMr4YDFdlHCAQdc8YCtw">
<div id="google_ads_iframe_/22181265,22606297331/llb_970v_2_2__container__">The systems or illegal use can be prevented by intercepting the signals in the administrative network.</div>
</div>
</div>
<p><strong>2. IRI (Intercept Related Information) security</strong></p>
<p>In case of communication failures, IRI can be buffered in the 3G network. After successfully transmitting IRI, the content buffer and total buffer can be deleted via a command or a timer. This prevents the IRI data from being exposed to illegal use.</p>
<p><strong>3. CC (Call Content) security</strong></p>
<p>Data inconsistency, log files, and critically important data like billing information can be suppressed to be viewed by only a fraction of the users over the network. This data can also be deleted after successful transmission to the required personnel.</p>
<h4>Can your mobile be intercepted?</h4>
<p>If you’re in the crosshairs of the authorities, then chances are that you may be under surveillance right now. Don’t worry, if you’re under one, then you’re not alone!</p>
<p>Lawful interceptions are very common, in fact there are 2000-3000 mobile signals being intercepted and analyzed every day. In fact, if you have a few selected smartphone models from Samsung, chances are that <a href="https://gadgets.ndtv.com/mobiles/news/researchers-demonstrate-way-to-intercept-calls-made-by-samsung-phones-764656" target="_blank" rel="external noopener" data-wpel-link="external">your calls are being intercepted</a>.</p>
<p>The presence of Shannon-branded baseband chips, a tracing IC (integrated circuit) and RF (radio frequency) transceiver make it a device that can be easily intercepted. Calls and messages can be intercepted by creating a proxy base station by frankly anyone with a device.</p>
<h4>What is the future of mobile interception market?</h4>
<p>The market of mobile interception is estimated at $1.8 billion globally, and $ 226.1 million in the U.S. alone. The market is estimated to grow at a tremendous rate of 5.8% annually for the next decade.</p>
<p>With new developments of communication frequencies, networks and channels, integration with newer interception systems will create a little hurdle. New and portable devices are being deployed every day across the world to hamper the mobile interception market.</p>
<h4>In summary</h4>
<p>Mobile interception is a debatable topic. On one hand, you are always on someone’s radar and that’s something that you can’t live with knowing. On the other hand, it’s a crucial and apt technology for intercepting malicious calls and threats.</p>
<p>As hard as it may sound, it’s hard to negate the importance of mobile interception, as long as it’s legal, and meets the global standards of lawful interception.</p>
<p>Hey, as long as it continues to save millions of lives by combating increasing criminal activities and security threats, it’s always a handy technology and probably will be in the future too. <a href="https://londonlovesbusiness.com/the-current-state-of-mobile-interception/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="entry-title">Understanding MIMO (Multiple Input, Multiple Output) – Cellular Speed &amp; Booster Implications</h1>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18033" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/understanding-mimo.webp" alt="" width="736" height="1102" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/understanding-mimo.webp 736w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/understanding-mimo-267x400.webp 267w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/understanding-mimo-684x1024.webp 684w" sizes="(max-width: 736px) 100vw, 736px" /></p>
<h2>The Wonders of MIMO</h2>
<p>For RVers and Cruisers, understanding what MIMO technology is, how it works, and how it can be used to enhance cellular speeds has the potential to make finding great mobile internet on the road an easier experience.</p>
<p><strong>For anyone who knows a thing or two about wireless communications, modern 4G/LTE and 5G cellular radios are borderline miraculous.</strong></p>
<p>Consider the first iPhone &#8211; which launched in 2007 with a maximum theoretical cellular speed of around 500 Kbps using AT&amp;T&#8217;s 2G EDGE cellular network.</p>
<p>A decade and a half later &#8211; the latest flagship cellular devices were able to support maximum theoretical speeds of over 2,000 Mbps.</p>
<p><strong>That&#8217;s more than a 4,000x increase!</strong></p>
<p>And as the 5G era has matured and become more mainstream, we see peak theoretical speeds are approaching 10 Gbps, another 10x increase!</p>
<p>Of course, theory rarely equals reality &#8211; and the cellular networks need to be substantially upgraded and built out to even come close to being able to deliver speeds like this to real people outside of a lab.</p>
<p>And in the real world &#8211; you will be sharing this speed with perhaps hundreds or thousands of others connected to the same cell tower.</p>
<figure id="attachment_18947" class="wp-caption alignleft" aria-describedby="caption-attachment-18947"><img loading="lazy" decoding="async" class=" wp-image-18947" title="" src="https://rvmobileinternet.com/wp-content/uploads/2015/10/MIMO-Stereo-300x208.gif" alt="An early MIMO prototype..." width="350" height="243" /><figcaption id="caption-attachment-18947" class="wp-caption-text">An early MIMO antenna prototype?</figcaption></figure>
<p>But real-world 4G/LTE speeds over 50Mbps are actually not at all uncommon, and speeds over 100Mbps are now widely reported, and things just keep getting faster. Mid band 5G is has become lot more common on most of the carriers and we are now seeing the gap between really good LTE and good mid band 5G become way more prevalent in everyday connectivity. If you are in a mmWave 5G area, the speeds can be blazing fast.</p>
<p>One of the key technologies making these sorts of speeds possible is known as MIMO (Multiple Input, Multiple Output) &#8211; an incredibly clever technique for putting multiple antennas to work to increase both data transmission speed and reliability.</p>
<p>MIMO technology is fundamental to both 4G/LTE, 5G, and WI-Fi radios &#8211; but cellular boosters and MIMO have some&#8230; challenges&#8230; working together.</p>
<p>Read on to get a grasp of what MIMO is, how it works, and how you can use a little bit of MIMO awareness to potentially increase your cellular speeds.</p>
<h2>MIMO In A Nutshell</h2>
<p>MIMO is one of the core technologies enabling 4G/LTE and 5G cellular, and almost every modern mobile device (whether a phone or a hotspot) has two or more cellular antennas on board to enable the magic of MIMO.</p>
<p>On the other end of the line &#8211; cell towers typically have multiple antennas working together in tight synchronization to communicate with you.</p>
<p>With more antennas transmitting a signal, there are more possible echoes and reflections (read the &#8220;how it works&#8221; section below to understand the magic here) for the receiving device to catch a signal.</p>
<p>The ability to make multiple connections on the cell tower the better the transmit speeds, even with weak signals.</p>
<p>The cell tower will have a number of transmit/receive antennas and many LTE devices had two antennas.  This allows those devices to utilize 2&#215;2 MIMO.</p>
<p>Devices with four antennas for 4&#215;4 MIMO is now common, with consumer devices such as flagship hotspots such as the <a href="https://www.rvmobileinternet.com/gear/nighthawk-m6/">AT&amp;T Netgear Nighthawk M6 Pro Hotspot Pro</a>, the <a href="https://www.rvmobileinternet.com/gear/inseego-m3100/" target="_blank" rel="noopener">Verizon &amp; T-Mobile MiFi X Pro 5G hotspots</a>, plus all the the latest flagship smartphones from Apple, Samsung, and Google.</p>
<p>Although the latest cellular standards (Category 18 &amp; higher) support 8&#215;8 MIMO, consumer devices with 8 antennas are not common.</p>
<p>These antennas connect to a cell tower that will usually have at least four antennas &#8211; and as many as 128!  The number of antennas on the tower gives devices more options to get a good, high-performing connection.</p>
<p>This figure illustrates a relatively simple 4&#215;2 MIMO deployment.  In this case, 4&#215;2 means four transmit/receive antennas on the tower, and two on the user device:</p>
<figure id="attachment_18944" class="wp-caption aligncenter" aria-describedby="caption-attachment-18944"><img loading="lazy" decoding="async" class="wp-image-18944 size-full" title="mimo-antennas-to-mifi" src="https://www.rvmobileinternet.com/wp-content/uploads/2015/10/mimo-antennas-to-mifi.png" sizes="(max-width: 603px) 100vw, 603px" srcset="https://www.rvmobileinternet.com/wp-content/uploads/2015/10/mimo-antennas-to-mifi.png 603w, https://www.rvmobileinternet.com/wp-content/uploads/2015/10/mimo-antennas-to-mifi-300x145.png 300w" alt="4x2 MIMO illustration" width="603" height="292" /><figcaption id="caption-attachment-18944" class="wp-caption-text">A basic 4G/TE network 4&#215;2 deployment &#8211; with 4 antennas on the cell tower and 2 in the mobile device working together. The device itself is using 2&#215;2 MIMO.</figcaption></figure>
<p>This 4&#215;2 configuration isn&#8217;t the only one possible, however, upgraded cell towers can have many more transmit/receive antenna elements. The latest devices typically have four antennas to better take advantage of the cell towers antenna array.</p>
<p>MIMO is one of the key technologies that allow these devices to have such great performance &#8211; it really is pretty darn amazing stuff! <a href="https://www.rvmobileinternet.com/guides/understanding-mimo-multiple-input-multiple-output-lte-speed-cell-booster-implications/" target="_blank" rel="noopener">source</a></p>
<h2><span id="MIMO_vs_Boosters_Video" class="ez-toc-section"></span>MIMO vs Boosters Video</h2>
<p><iframe title="MIMO vs Boosters: Do Cellular Boosters Provide the Best Signal &amp; Data Performance?" width="640" height="360" src="https://www.youtube.com/embed/14tWiAsqfJk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="teaser-content">
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<hr />
<div class="teaser-content">
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">
</div>
</div>
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">The U.S. Department of Justice is collecting data from Americans’ cellphones with surveillance planes that “mimic cellphone towers,” according to a <a href="http://online.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">Wall Street Journal report</a>.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">The program is designed to catch criminals, but collects data from innocent people as well, sources familiar with the operation told the Journal.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">The program bears some resemblance to the <a href="http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html?itid=lk_inline_manual_4">National Security Administration’s dragnet approach</a> to collecting information while tracking terrorists.</div>
<div data-qa="article-body"></div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">A Justice Department official would not confirm or deny the existence of the program to the Journal: “The official said discussion of such matters would allow criminal suspects or foreign powers to determine U.S. surveillance capabilities. Justice Department agencies comply with federal law, including by seeking court approval, the official said.”</div>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">The program has existed since 2007, and is operated by the U.S. Marshals Service’s Technical Operations Group. It deploys Cessna aircraft from at least five airports that, combined, have a flying range that covers most of the U.S. population.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">According to the Journal story, by Devlin Barrett, the planes carry a device called a “dirtbox” — the name is inspired by Digital Receiver Technology Inc., the Boeing subsidiary that makes the device — that acts like a cellphone communications tower.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Cellphones register user locations with towers every few minutes, even if they aren’t making a call.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">By intercepting these signals, the dirtboxes can identify phones’ unique registration information — even phones with encryption like the new iPhone 6.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">The device can pinpoint the location of a cellphone within 10 feet and manipulate the phone by jamming its signal. It can extract text messages and photos from phones, too.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Instead of asking cellphone companies for subscriber information, which law enforcement has done with <a href="http://www.nytimes.com/2012/07/09/us/cell-carriers-see-uptick-in-requests-to-aid-surveillance.html?pagewanted=all&amp;_r=0">increased frequency</a> in recent years, agencies can now find it themselves.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<div id="gift-share-inline" class="PJLV PJLV-ilotWTr-css hide-for-print" data-testid="gift-share-inline">
<div class="wpds-c-kPqOkS wpds-c-kPqOkS-jtSXsT-hasSubsText-false" data-testid="gift-share-interstitial-trigger"><span class="wpds-c-hBJqc"><span class="wpds-c-dzSncg">Share this article</span></span><span class="wpds-c-eCvjpK"><span class="wpds-c-enedHQ wpds-c-enedHQ-cCitdK-isShown-false">Share</span></span></div>
</div>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">In a single flight, the device can collect information about tens of thousands of cellphones. People familiar with the program told the Journal the device can identify phones linked to criminal suspects and keep that information, but “lets go” of information from other phones.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">It’s unclear whether the government is keeping data about non-suspects gathered by the device.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Describing it as a “a dragnet surveillance program,” Christopher Soghoian, chief technologist at the American Civil Liberties Union, told the Journal: “It’s inexcusable and it’s likely — to the extent judges are authorizing it — [that] they have no idea of the scale of it.”</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Courts are <a href="https://www.aclu.org/how-government-tracking-your-movements">still catching up</a> to technology like cellphone scanners. The Supreme Court has never considered whether this type of surveillance is a search requiring a warrant.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Earlier this year, the U.S. Court of Appeals for the 11th Circuit <a href="https://www.aclu.org/sites/default/files/assets/q_davis_opinion_0.pdf">ruled</a> law enforcement needs a warrant to get people’s phone location histories. However, the 5th Circuit <a href="http://www.nytimes.com/interactive/2013/07/30/technology/historic-cell-data-appeals-court-ruling.html">took the opposite view</a> last year.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">The most recent Supreme Court case is <a href="http://public.cq.com/docs/weeklyreport/weeklyreport-000003976652.html">United States v. Jones</a>, a 2012 decision involving a GPS tracking device attached to a suspect’s car for month with no warrant. The Court <a href="http://www.scotusblog.com/case-files/cases/united-states-v-jones/">decided</a> attaching a device that gathered detailed information over time was a search, but didn’t say whether a warrant was required.</p>
</div>
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<p class="wpds-c-cYdRxM wpds-c-cYdRxM-iPJLV-css overrideStyles font-copy" dir="null" data-testid="drop-cap-letter" data-el="text">Civil liberties groups have already sued to challenge law enforcement use of similar devices, such as the Stingray, used on the ground by law enforcement to gather mobile data in a given area.</p>
</div>
<p>&nbsp;</p>
<hr />
<div class="teaser-content">
<div class="wpds-c-PJLV article-body" data-qa="article-body">
<h1 id="main-content" class="PJLV PJLV-ihMAsLZ-css overrideStyles" data-testid="headline" data-qa="headline"><span class="PJLV" data-qa="headline-text">Report: Secret government program uses aircraft for mass cellphone surveillance</span></h1>
</div>
</div>
<p><iframe src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/Mimo-Cell-Stealing-Network-Calls-2112.02096v2.pdf" width="900" height="1100"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>8 Ways a Data Breach Could Take Out Your Company Tomorrow</title>
		<link>https://goodshepherdmedia.net/8-ways-a-data-breach-could-take-out-your-company-tomorrow/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 10 Mar 2024 18:59:15 +0000</pubDate>
				<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[how to protect your business from hacking]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=17243</guid>

					<description><![CDATA[8 Ways a Data Breach Could Take Out Your Company Tomorrow If your company uses, collects, stores or relies on first-party data (and what successful company these days doesn&#8217;t?), you face all kinds of security-related risks. f you cringe every time you see a headline about a massive data breach, fasten your seatbelt. It&#8217;s going [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="tracking-tight font-extrabold text-gray-900 mb-4 text-[2.2rem] leading-[2.7rem] sm:text-[2.5rem] sm:leading-[2.9rem]">8 Ways a Data Breach Could Take Out Your Company Tomorrow</h1>
<p class="tracking-tight font-extrabold text-gray-900 mb-4 text-[2.2rem] leading-[2.7rem] sm:text-[2.5rem] sm:leading-[2.9rem]"><span class="leading-7 block text-gray-500 font-normal mt-4 mb-6 text-lg">If your company uses, collects, stores or relies on first-party data (and what successful company these days doesn&#8217;t?), you face all kinds of security-related risks.</span></p>
<p>f you cringe every time you see a headline about a massive data breach, fasten your seatbelt. It&#8217;s going to get much worse before it gets better. For most companies, it&#8217;s a question of <i>when</i> not if they&#8217;re going to have a data breach. The bigger question is how big the blast radius is going to be and what can you do preemptively to avert or contain it.</p>
<p>The facts are sobering: The average annual cost of a data-security breach for a company that misuses or loses data is $4.24 million, according to a recent IBM security survey, nearly 10% higher than it was before the pandemic. And that&#8217;s just the initial price tag. The real cost of a data breach cuts much deeper and can be existential: 60% of small- and medium-size businesses go bust within six months of a massive data breach.</p>
<p>Sadly, despite these statistics, most companies still don&#8217;t view data security as a top priority. If your company uses, collects, stores or relies on first-party data (and what successful company these days doesn&#8217;t?), you face all kinds of security-related risks that can make that $4.24 million seem like a bargain.</p>
<h2>1. Someone misuses the data you collect</h2>
<p>Here&#8217;s a shocker: One in four data breaches is caused by employees rather than outside attackers. That&#8217;s important because your company is not just on the hook for securing data you collect; you also need to secure how it&#8217;s <i>used</i>. Thanks to the EU&#8217;s GDPR and California&#8217;s CCPA privacy laws, if someone in your company (or one of your partners) misuses your data, you face steep fines. And if you are fined 4% of the topline for simple data misuse, it could bankrupt your whole company.</p>
<h2>2. Your data breach gets media attention</h2>
<p>A data snafu at scale is a PR disaster. It erodes consumer trust in your brand and customers&#8217; trust in your relationship. A recent PwC report found that 69% of consumers believe that the companies they use are vulnerable to being hacked, and 87% of consumers are even willing to walk away if a data breach occurs. And that doesn&#8217;t even factor in the pricey marketing costs of rebuilding a damaged reputation.</p>
<h2>3. Data mishandling exposes you to regulatory action</h2>
<p>That&#8217;s right, misusing data can open you up to a whole new universe of penalties, fines, sanctions and legal costs, which can be enormous and go on for years. You could easily spend a billion dollars addressing your case — just ask Facebook about that one.</p>
<h2>4. A data breach costs you deals</h2>
<p>This one hits you directly in the wallet. Once you have a security situation, current business customers can shut off deals. At the very least, you&#8217;ll spend countless hours documenting your processes and reassuring partners their data and reputation are safe. And if a data-security issue leads to a court action or some regulatory action, all your business customers now have reasonable cause to back out too. Which leads to this next one …</p>
<h2>5. Or it can cost you your entire business model</h2>
<p>If the world decides that it just can&#8217;t afford to do things the way you&#8217;re doing them, you&#8217;ll have to change your whole model (we&#8217;re looking at you, Ashley Madison). The pivot can be an expensive and existential threat.</p>
<p>&nbsp;</p>
<h2>6. Lax security locks you out of the deal flow</h2>
<p>Once you&#8217;re caught in a security disaster, you can be labeled as a business risk in an ecosystem. And that basically cuts you out of a marketplace.</p>
<h2>7. Security snafus are a massive time suck</h2>
<p>All the time and suffering a security problem demands, especially the attention of key people in the organization, can be a massive operational setback. Plus, who wants to work for a company with a bad rap? Suddenly you can&#8217;t attract or retain the most mobile and valuable talent.</p>
<h2>8. Data breaches devalue your business</h2>
<p>If you can&#8217;t secure your data, you won&#8217;t be able to do all the good things that can be done today with the secure application of data. And that&#8217;s the risk of not doing the right thing for the business — and not realizing your company&#8217;s full potential and upside. And that might be the biggest risk of all.</p>
<p>Managing all this risk isn&#8217;t easy, and there are lots of stakeholders to wrangle. But nobody&#8217;s got their eye on all the data — and all the ways data breaches could bite your company.</p>
<p>But there is one way to mitigate all these risks:<b> </b>Deploy technology that prevents risk from even being created, rather than just tools to clean up better after a breach or violation.</p>
<p>You want technology that does three things well:</p>
<ul>
<li>Enables the creation and enforcement of a digital version of the sharing agreement or contract.</li>
<li>Allows the data to be processed inside a shared enclave.</li>
<li>Documents every transaction and communicates to the relevant parties, so only agreed-upon recipients receive the insights from processing.</li>
</ul>
<p>You&#8217;ll save money on legal fees and improve productivity since only the most necessary approvals will be required by expensive attorneys. And since you can now trust your data-sharing partnerships, your insights will soar along with accompanying revenues from such projects. You owe it to yourself to have a fully automated security solution that&#8217;s got your back.</p>
<p>Your company&#8217;s survival depends on it. <a href="https://www.entrepreneur.com/science-technology/8-ways-a-data-breach-could-take-out-your-company-tomorrow/398557" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<h3 class="viewsHeaderText"><a href="https://goodshepherdmedia.net/the-mother-of-all-breaches-just-happened-heres-the-security-implications-for-businesses/" target="_blank" rel="noopener">The &#8216;Mother of All Breaches&#8217; Just Happened — Here&#8217;s the Security Implications for Businesses</a></h3>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The &#8216;Mother of All Breaches&#8217; Just Happened — Here&#8217;s the Security Implications for Businesses</title>
		<link>https://goodshepherdmedia.net/the-mother-of-all-breaches-just-happened-heres-the-security-implications-for-businesses/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 18:55:14 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[worlds biggest hack]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=17240</guid>

					<description><![CDATA[The &#8216;Mother of All Breaches&#8217; Just Happened — Here&#8217;s the Security Implications for Businesses At the beginning of the year, Security Discovery and Cybernews researchers uncovered a dataset of 26 billion(!) leaked entries associated with LinkedIn, Twitter.com, Tencent, Dropbox, Adobe, Canva, Telegram and other platforms. Government agencies in the U.S., Brazil, Germany, the Philippines, and Turkey are also [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="viewsHeaderText">The &#8216;Mother of All Breaches&#8217; Just Happened — Here&#8217;s the Security Implications for Businesses</h1>
<p><span class="dropcap-element-slot">A</span>t the beginning of the year, Security Discovery and Cybernews researchers uncovered a dataset of 26 billion(!) leaked entries associated with LinkedIn, Twitter.com, Tencent, Dropbox, Adobe, Canva, Telegram and other platforms. Government agencies in the U.S., Brazil, Germany, the Philippines, and Turkey are also among the organizations hit by the &#8220;mother of all breaches&#8221; (MOAB).</p>
<p>As the investigation team reported, a significant share of information in the dataset was compromised during past data breaches. However, the stash also contains new data.</p>
<h2 class="article-sub-heading">Aftermath for businesses</h2>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Simply put, this 12-terabyte behemoth will send shockwaves through the business community, posing a continual threat to personal information and corporate security.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">But this is not just a breach; it&#8217;s a comprehensive toolkit for threat actors to orchestrate an endless number of cyberattacks, including identity theft. Criminals can maliciously exploit the stolen personal data from the MOAB dataset. It is a powerful weapon capable of wreaking havoc on a global scale.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">So, in the coming weeks, it&#8217;s time to move to a proactive stance. Here are some signals businesses should listen to when monitoring their infrastructure:</p>
<ol>
<li><b>Uncommon access scenarios.</b> In light of a data breach like this, keeping a close eye on access logs for any unusual activity is critical. A sudden surge in requests or unfamiliar IP addresses could indicate unauthorized entry. Logins during non-standard hours, especially outside of ordinary business hours, may be considered malicious activity as well.</li>
<li><b>Suspicious account activity.</b> In an attempt to take over the compromised account, scammers may reveal themselves through unexpected adjustments in user privileges or alterations to account roles. Frequent changes in login locations, irregular login times, and spikes in data access are also red flags.</li>
<li class="intra-article-module" data-t="{&quot;n&quot;:&quot;intraArticle&quot;,&quot;t&quot;:13}"><b>Surge in phishing attempts.</b> Massive breaches often provide fertile ground for cybercriminals to launch phishing attacks targeting employees or customers related to affected brands. Unscheduled phishing training or educational campaigns may help your staff and clients recognize phishing scams at early stages.</li>
<li><b>Abnormal network traffic.</b> Another alert of malicious activity is unexplained spikes in outbound traffic and unusual communication patterns between internal systems.</li>
<li><b>Boost in helpdesk requests.</b> A growing volume of user requests to the support team can also indicate a problem, especially when there is a sudden surge in inquiries related to compromised accounts or suspicious activities.</li>
<li><b>Customer feedback.</b> An influx of complaints about unauthorized access, account compromises, or suspicious transactions should trigger an immediate investigation.</li>
</ol>
<h2 class="article-sub-heading">A new security paradigm</h2>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Unfortunately, the MOAB is just a single event in the never-ending war between cybercriminals and corporations. In an age of the constant growth of security threats, companies must develop a refined sense of foresight. Recognizing patterns and anomalies within their data is not just a skill; it&#8217;s a necessity. The MOAB underscores the importance of proactive monitoring, urging companies to invest in robust systems that swiftly detect irregularities.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Importantly, entering this new reality means that user security is again becoming more crucial than user experience. Some companies have a hard time accepting that fact. However, in the long run, it&#8217;s worth the gamble.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">It doesn&#8217;t imply building a kind of imposing wall with menacing guards around your infrastructure that makes users avoid your service. The security measures you deploy can be easy to use for customers. The latest identity verification options — such as self-check-in at airports — prove the concept while staying user-friendly and secure.</p>
<div class="intra-article-module-bottom-slot" data-t="{&quot;n&quot;:&quot;intraArticle&quot;,&quot;t&quot;:13}"></div>
<h2 class="article-sub-heading">Guide to the transformation</h2>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Effective information security management powered by global standards such as ISO/IEC 27001 and ISO/IEC 27002 is at the core of the process. By adhering to the standards, an organization guarantees that it has established an Information Security Management System for addressing security risks associated with data owned or managed by the company. Despite certification often being associated with enterprise-level organizations, middle-sized companies, especially those from industries where data safety matters, such as FinTech, should not skip this step. Moreover, unlike ISO 27001, you don&#8217;t need certification to prove compliance with ISO 27002, which, being more informative than regulatory, details the controls required.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Enhancing authentication policies may be the next step to take. Unfortunately, you can&#8217;t rely on your customers to be prudent while setting logins and passwords. Nevertheless, nudging them to select more advanced options is under your control.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">More companies across different sectors now implement multi-factor authentication involving users&#8217; biometrics like fingerprint scans or face recognition. With the idea of a passwordless future pushed by tech giants like Google, this approach is gradually becoming an industry best practice. On the one hand, setting a &#8220;Privacy Screen&#8221; to secure Google Drive on iOS mobile devices through Touch ID or Face ID requires additional action on the user&#8217;s end. On the other, once the feature is enabled, user satisfaction soars as well.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Finally, the adoption of liveness detection technology — both for IDs and selfies — in identity verification procedures is crucial. It helps determine whether the source of a biometric sample is a live individual, and provides evidence that a user-submitted document photo is a genuine passport or other document. Additionally, this step can be made mandatory, not only during registration for a service but also at the purchase stage. Neural networks under the hood of the liveness detection process are constantly improving, showing high accuracy rates. That also contributes to data processing speed, making it possible to perform a liveness check in seconds.</p>
<h2 class="article-sub-heading">Final thoughts</h2>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">The MOAB incident serves as a call to action for businesses worldwide. Unfortunately, the brand names on the MOAB list prove that there is room for improvement for all the companies, including enterprise-level. It&#8217;s more critical than ever to bolster defenses, sharpen our cyber instincts, and fortify our systems against the impending storm.</p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">Still, there is no need to turn the sign-in or payment processes into a math quiz with a bunch of problems to be solved on the customer&#8217;s part. UX still matters, especially for companies from B2C sectors whose success is measured by the number of active users. For this reason, a mobile banking app is always more secure than an e-book subscription service. <a href="https://www.msn.com/en-us/money/smallbusiness/the-mother-of-all-breaches-just-happened-here-s-the-security-implications-for-businesses/ar-BB1j35BL?cvid=8e3a428b0b1448beb8f670eb5a0bb995&amp;ocid=winp2fptaskbar&amp;ei=16" target="_blank" rel="noopener">source</a></p>
<p data-t="{&quot;n&quot;:&quot;blueLinks&quot;}">
<h3 data-t="{&quot;n&quot;:&quot;blueLinks&quot;}"><a href="https://goodshepherdmedia.net/8-ways-a-data-breach-could-take-out-your-company-tomorrow/" target="_blank" rel="noopener">8 Ways a Data Breach Could Take Out Your Company Tomorrow</a></h3>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MGM reeling from cyber &#8216;chaos&#8217; 5 days after attack as Caesars Entertainment says it was hacked too</title>
		<link>https://goodshepherdmedia.net/mgm-reeling-from-cyber-chaos-5-days-after-attack-as-caesars-entertainment-says-it-was-hacked-too/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 15 Sep 2023 19:28:30 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Caesars]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[las Vegas]]></category>
		<category><![CDATA[las Vegas Hacked]]></category>
		<category><![CDATA[las Vegas Hackers]]></category>
		<category><![CDATA[MGM cyberattack]]></category>
		<category><![CDATA[MGM Resorts International]]></category>
		<category><![CDATA[MGM Resorts International website]]></category>
		<category><![CDATA[MGM Resorts International website down]]></category>
		<category><![CDATA[MGM Resorts website down]]></category>
		<category><![CDATA[MGM website down]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Scattered Spider attack]]></category>
		<category><![CDATA[serious threat]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=15963</guid>

					<description><![CDATA[MGM reeling from cyber &#8216;chaos&#8217; 5 days after attack as Caesars Entertainment says it was hacked too &#8220;The machines wouldn&#8217;t take our ticket,&#8221; said one MGM Resorts customer. Five days after a cyberattack crippled operations of MGM Resorts International, including its signature Las Vegas properties the Bellagio and the MGM Grand, the company said Thursday morning it [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="vMjA gjbz eHrJ mTgU ">MGM reeling from cyber &#8216;chaos&#8217; 5 days after attack as Caesars Entertainment says it was hacked too</h1>
<p><iframe src="https://abcnews.go.com/video/embed?id=103203890" width="640" height="360" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p class="jxTE Poys lqtk HkWF HfYh kGyA ">&#8220;The machines wouldn&#8217;t take our ticket,&#8221; said one MGM Resorts customer.</p>
<p class="Ekqk yuUa MvWX TjIX aGjv ebVH">Five days after a cyberattack crippled operations of MGM Resorts International, including its signature Las Vegas properties the Bellagio and the MGM Grand, the company said Thursday morning it is still working to resolve issues as another major resort operation, Caesars Entertainment, acknowledged it was also the target of a cyberattack.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">Hackers struck MGM Resorts on Sunday morning, rendering doors to the chain&#8217;s casinos and hotels unusable. Slot machines and ATM machines were also inoperable, elevators were out of order and customers had to wait hours to check into rooms. Even the company&#8217;s website remains down.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;We continue to work diligently to resolve our cybersecurity issues while addressing individual guest needs promptly,&#8221; MGM Resorts said a statement Thursday. &#8220;We couldn&#8217;t do this without the thousands of incredible employees who are committed to guest service and support from our loyal customers. Thank you for your continued patience.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">But for MGM Resorts Las Vegas visitors like Walter Haywood, patience is running out.</p>
<div class="oLzS QrHM fnRU pvsT EhJP vPlO zNYg OsTs RMeq daRV ISNQ sKyC eRft acPP MENS nFwa MCnQ mEee SmBj xegr rPLs iulO NIuq zzsc lzDC aHUB IEgz OjMN eQqc SVqK GQmd jaoD VWDd ONJd vrZx OnRT gbbf roDb GPGw oMlS gfNz oJhu eXZc zhVl ">
<div class="InlineImage GpQC lZur asrE " data-testid="prism-inline-image">
<figure class="kzIj GNme pYrt dSqF " data-testid="prism-figure"><img decoding="async" class="hsDd vBqt oOra " draggable="false" src="https://i.abcnewsfe.com/a/23e42bb5-8b31-4a1c-bb85-c093110dcfcd/mgm-2-gty-bb-230914_1694697237709_hpEmbed_5x4.jpg" alt="PHOTO: Betting kiosks at the sportsbook at MGM Grand in Las Vegas on Sept. 12, 2023." data-testid="prism-image" /><figcaption>
<div class="SAMu aBIU PriD " data-testid="prism-caption">
<div class="HXPP IzgM VcHI uhSz YGNM "><span class="hsDd IzgM GpQC lZur VlFa " data-testid="prism-truncate"><span class="ncwc Qmvg nyTI VbLm ystq kqbG akor ARhV ygKV yHyq tsIf WHLR lKuK CVfp xijV soGR XgdC aWMf ">Betting kiosks at the sportsbook at MGM Grand in Las Vegas on Sept. 12, 2023.</span></span></div>
<div class="qinl IpWv lyWx "><span class="YNuj JGtj ncwc Qmvg nyTI VbLm ystq kqbG akor ARhV ygKV yHyq tsIf WHLR lKuK CVfp xijV soGR XgdC aWMf ">Las Vegas Review-journal/TNS via Getty Images</span></div>
</div>
</figcaption></figure>
</div>
</div>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;It was kind of chaotic,&#8221; Haywood told ABC Las Vegas affiliate station KTNV. &#8220;The machines wouldn&#8217;t take our ticket. Lines everywhere. Just chaos.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">MGM Resorts has acknowledged the attack but has released no details on how it occurred or who might be responsible.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">The company said it &#8220;took prompt action to protect our system and data, including shutting down certain systems.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">The FBI said it is investigating the attack and has been in contact with the chain since Sunday.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">The Cybersecurity and Infrastructure Security Agency, which is part of the U.S. Department of Homeland Security, announced on Thursday that it is in contact with MGM Resorts &#8220;to understand the impacts of their recent cyber incident.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;We are also offering any necessary assistance should the organization need or request it,&#8221; the CISA said in a statement.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">Nevada Gov. Joe Lombardo and the Nevada Gaming Board released a joint statement, saying they are &#8220;monitoring the cybersecurity incident with MGM Resorts and are in communication with company executives.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;Additionally, the Nevada Gaming Control Board remains in communication with other law enforcement agencies,&#8221; the statement from Lombardo and the gaming board said.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">VX-Underground &#8212; a research group boasting the largest collection of malware source code, samples and papers on the internet &#8212; posted to X that the ransomware group &#8220;ALPHV,&#8221; also known as Black Cat, is allegedly is behind the MGM cyberattack. Authorities have not confirmed the report.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk. A company valued at $33,900,000,000 was defeated by a 10-minute conversation,&#8221; VX-Underground said.</p>
<div class="oLzS QrHM fnRU pvsT EhJP vPlO zNYg OsTs RMeq daRV ISNQ sKyC eRft acPP MENS nFwa MCnQ mEee SmBj xegr rPLs iulO NIuq zzsc lzDC aHUB IEgz OjMN eQqc SVqK GQmd jaoD VWDd ONJd vrZx OnRT gbbf roDb GPGw oMlS gfNz oJhu eXZc zhVl ">
<div class="InlineImage GpQC lZur asrE " data-testid="prism-inline-image">
<figure class="kzIj GNme pYrt dSqF " data-testid="prism-figure"><img decoding="async" class="hsDd vBqt oOra " draggable="false" src="https://i.abcnewsfe.com/a/674e2f91-1847-4c72-ae74-36dbe4dfa43f/mgm-3-rt-bb-230914_1694697039563_hpMain.jpg" alt="PHOTO: An exterior view of MGM Grand hotel and casino, after MGM Resorts shut down some computer systems due to a cyber attack in Las Vegas, Sept. 13, 2023." data-testid="prism-image" /><figcaption>
<div class="SAMu aBIU PriD " data-testid="prism-caption">
<div class="HXPP IzgM VcHI uhSz YGNM "><span class="hsDd IzgM GpQC lZur VlFa " data-testid="prism-truncate"><span class="ncwc Qmvg nyTI VbLm ystq kqbG akor ARhV ygKV yHyq tsIf WHLR lKuK CVfp xijV soGR XgdC aWMf ">An exterior view of MGM Grand hotel and casino, after MGM Resorts shut down some computer systems due to a cyber attack in Las Vegas, Sept. 13, 2023.</span></span></div>
<div class="qinl IpWv lyWx "><span class="YNuj JGtj ncwc Qmvg nyTI VbLm ystq kqbG akor ARhV ygKV yHyq tsIf WHLR lKuK CVfp xijV soGR XgdC aWMf ">Bridget Bennett/Reuters</span></div>
</div>
</figcaption></figure>
</div>
</div>
<p class="Ekqk yuUa lqtk TjIX aGjv">Bloomberg News reported Wednesday that the same ransomware group is responsible for a cyberattack this month on Caesars Entertainment Inc. and that the company paid &#8220;millions&#8221; to get its data back.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">Caesars Entertainment &#8212; which runs more than 50 resorts including, Caesars Palace and Harrah&#8217;s in Las Vegas &#8212; acknowledged the attack occurred on Sept. 7 in a filing Thursday with the U.S. Securities Exchange Commission.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">&#8220;Caesars Entertainment Inc. recently identified suspicious activity in its information technology network resulting from a social engineering attack on an outsourced IT support vendor used by the Company,&#8221; Caesars said in its SEC Form 8-K filing.</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">While the company said it did not pay a ransom, it noted that &#8220;we have incurred, and may continue to incur, certain expenses related to this attack, including expenses to respond to, remediate and investigate this matter. The full scope of the costs and related impacts of this incident, including the extent to which these costs will be offset by our cybersecurity insurance or potential indemnification claims against third parties, has not been determined.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">Caesars Entertainment, according to the filing, said its investigation determined that hackers acquired a copy of its loyalty program database, which includes driver’s license numbers and Social Security numbers &#8220;for a significant number of members in the database.&#8221;</p>
<p class="Ekqk yuUa lqtk TjIX aGjv">Caesars added, &#8220;We have taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result.&#8221; <a href="https://abcnews.go.com/Business/mgm-reeling-cyber-chaos-5-days-after-attack/story?id=103148809" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 data-test-locator="headline">The Morning After: Hacking a Vegas casino may just take a single phone call</h1>
<div class="caas-subheadline">
<h2>The ALPHV ransomware group used social engineering to attack MGM Resorts.</h2>
<div class="caas-figure-with-pb">
<div>
<div class="caas-img-container"><img decoding="async" class="caas-img" src="https://s.yimg.com/ny/api/res/1.2/2nLKXOroqmf7qZUeHcFnNQ--/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTcyMDtjZj13ZWJw/https://s.yimg.com/os/creatr-uploaded-images/2023-09/457014c0-523d-11ee-8f6b-71de2d5f7e12" data-src="https://s.yimg.com/ny/api/res/1.2/2nLKXOroqmf7qZUeHcFnNQ--/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTcyMDtjZj13ZWJw/https://s.yimg.com/os/creatr-uploaded-images/2023-09/457014c0-523d-11ee-8f6b-71de2d5f7e12" /></div>
<div>
<p>The ALPHV/BlackCat ransomware group claimed responsibility for the MGM Resorts cyber outage on Tuesday, and it apparently took the group only 10 minutes on a phone call to glean the information needed to shut down systems and slot machines — not the slot machines! — at casinos owned by MGM Resorts.</p>
<p>“All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk,” the organization wrote in a post on X. Those details came from ALPHV but have not been independently confirmed by security researchers.</p>
<p>MGM Resorts didn’t respond to a request for comment but said on Tuesday that “Our resorts, including dining, entertainment and gaming, are currently operational.” <a href="https://www.engadget.com/the-morning-after-hacking-a-vegas-casino-may-just-take-a-single-phone-call-111525161.html" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
</div>
<hr />
<blockquote>
<h1 class="HedAndDek_headline-D19MOidHYLI-">Caesars Entertainment Paid Millions to Hackers in Attack</h1>
</blockquote>
<blockquote><p><strong><span style="color: #ff0000;"><em>Hackers stole data, extorted company, people familiar said</em></span></strong></p></blockquote>
<blockquote><p><strong><span style="color: #ff0000;"><em>Caesars breach came in weeks before MGM announced cyberattack</em></span></strong></p></blockquote>
<hr />
<header class="sc-1efpnfq-1 blDizU">
<h1 class="sc-1efpnfq-0 hYHgdi">Young hackers are sticking up Las Vegas casinos for hefty ransoms</h1>
</header>
<h2 class="sc-1xcxnn7-0 hmwaaf js_regular-subhead">Both MGM and Caesar&#8217;s Entertainment were hacked by a group named “Scattered Spider” in recent weeks. Caesar&#8217;s even paid a ransom</h2>
<p class="sc-77igqf-0 fnnahv">A bunch of hackers aged between 19 and 22 are bringing the Las Vegas Strip’s casino-hotels to their knees.</p>
<p class="sc-77igqf-0 fnnahv">A group dubbed “Scattered Spider” by cybersecurity researchers paralyzed the systems of MGM Resorts International this week. MGM, a $14 billion hospitality and entertainment giant, disclosed its “cybersecurity issue” in a Sep. 12 regulatory filing.</p>
<p class="sc-77igqf-0 fnnahv">Although MGM claims to have dealt with the issue, social media posts say that everything from slot machines to hotel communication systems have been inoperable at MGM venues in Las Vegas for four days. Check-in lines are growing, room access cards and ATMs won’t work, and people are unable to use food, beverage, and free play credits. Regressing to the past, to use manual cash payouts and physical room keys, is proving slow and clunky. (One tiny silver lining: free parking.)</p>
<p class="sc-77igqf-0 fnnahv">MGM is investigating the matter, and as is the FBI. Moody’s, the rating agency, warned that the breach, which highlights MGM’s heavy reliance on tech, could affect its credit rating negatively.</p>
<h2 id="h126531" class="sc-1bwb26k-1 WsFUC">Hospitality giant of interest: Caesar’s Entertainment</h2>
<p class="sc-77igqf-0 fnnahv">A Bloomberg report revealed that another casino operator, the $12 billion Caesar’s Entertainment, had been the victim of a similar cyberattack in recent weeks. The hackers, who threatened to leak its data, demanded $30 million in ransom; Caesar’s paid roughly half. In this case too, the hackers belonged to “Scattered Spider,” thought by cybersecurity analysts to be made up of young hackers in the US and the UK.</p>
<p class="sc-77igqf-0 fnnahv">Hackers demanded a ransom from MGM as well, two anonymous sources told Fortune. But it remains unclear how much was requested and which systems the company was locked out of.</p>
<h2 id="h126532" class="sc-1bwb26k-1 WsFUC"><strong>Quotable: Scattered Spider’s modus operandi</strong></h2>
<blockquote class="sc-8hxd3p-0 eIwGTt" data-type="BlockQuote">
<p class="sc-77igqf-0 fnnahv">“Although members of the group may be less experienced and younger than many of the established multifaceted extortion/ransomware groups and nation state espionage actors, they are a serious threat to large organizations in the United States. Many members are native English speakers and are incredibly effective social engineers.”</p>
<p class="sc-77igqf-0 fnnahv"><em>—</em><em>Charles Carmakal</em><em>, chief technology officer at Mandiant Intelligence, a part of </em><em>Google Cloud</em><em>, in a Sep. 15 LinkedIn post</em></p>
</blockquote>
<h2 id="h126533" class="sc-1bwb26k-1 WsFUC"><strong>How Scattered Spider hacked MGM and Caesers</strong></h2>
<p class="sc-77igqf-0 fnnahv">Scattered Spider uses social engineering to gather login credentials or one-time-password (OTP) codes, which helps bypass multi-factor authentication, according to a January blogpost by the security research firm CrowdStrike. The group has previously targeted telecom and business process outsourcing (BPO) companies to perform SIM swaps, which can then be used in phishing attacks to steal data and extort ransoms.</p>
<p class="sc-77igqf-0 fnnahv">In the case of Caesar’s, the hackers breached an outside IT vendor first to subsequently gain access to the company’s network, two people familiar with the matter told Bloomberg.</p>
<p class="sc-77igqf-0 fnnahv">With MGM, a short telephonic exchange and some collaboration with a ransomware-as-a-service group called ALPHV, also known as BlackCat, was all it took. In April 2022, America’s cyber defense agency issued an alert noting that ALPHV had “compromised at least 60 entities worldwide.”</p>
<p class="sc-77igqf-0 fnnahv">“All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk,” VX-Underground, a malware research group, posted on X. “A company valued at $33,900,000,000 was defeated by a 10-minute conversation.”</p>
<p class="sc-77igqf-0 fnnahv">The white-hat hacker Rachel Tobac, who uses similar attack methods in her work by posing as an internal teammate, wrote on LinkedIn that organizations are less equipped to deal with phone-based attacks than email. It works for three reasons, according to Tobac: “lack of verification protocols, easy spoofing, compensation tied to how fast they handle requests.”</p>
<h2 id="h126534" class="sc-1bwb26k-1 WsFUC">By the digits: The impact of the MGM hack</h2>
<p class="sc-77igqf-0 fnnahv"><strong>$13 million:</strong> The revenue that MGM’s Las Vegas Strip properties bring in daily on average, calculated based on the the $1.2 billion in revenue these hotel rooms and casinos earned for in the quarter ended June 30</p>
<p class="sc-77igqf-0 fnnahv"><strong>30:</strong> The number of hotel and gaming venues that MGM operates around the world, with a dozen on the Vegas Strip. The websites for MGM’s biggest resorts, including MGM Grand, Mandalay Bay, Bellagio, Aria, and The Cosmopolitan, have been inaccessible for days</p>
<p class="sc-77igqf-0 fnnahv"><strong>6,852:</strong> The number of rooms at the MGM Grand, the world’s single largest hotel</p>
<p class="sc-77igqf-0 fnnahv"><strong>$6.99:</strong> The ATM fees that guests were charged to withdraw cash, when they wanted to keep playing during the hack, and when credit card machines had stopped working</p>
<h2 id="h126535" class="sc-1bwb26k-1 WsFUC">Charted: Las Vegas’ hacked casino-hotels stocks dropped</h2>
<aside class="sc-1ucrg8x-0 fiYofE embed-inset embed-inset--show-overlay"><iframe id="datawrapper-chart-Tq6yC" class="datawrapper-embed" src="https://datawrapper.dwcdn.net/Tq6yC/1/" width="620" height="400" scrolling="no" data-src="https://datawrapper.dwcdn.net/Tq6yC/1/" data-mce-fragment="1"></iframe></aside>
<h2 id="h126536" class="sc-1bwb26k-1 WsFUC">One more thing: Casinos are ideal cyberattack victims</h2>
<p class="sc-77igqf-0 fnnahv">Casino cyberattacks aren’t uncommon. The Hard Rock Hotel and Casino was breached twice in 2015 and 2016, when hotel guest names, card numbers, expiration dates, and CVV codes were stolen. In 2019, the personal data of roughly 10 million MGM guests was published on a Russian hacking forum.</p>
<p class="sc-77igqf-0 fnnahv">In fact, casinos are prime targets for financially motivated crimes because their cybersecurity isn’t top-notch and hackers are “more likely to get paid because they’re disrupting casino operations,” Allan Liska, an intelligence analyst at the security firm Recorded Future, told Reuters. “Casinos around the world should be on heightened alert because ransomware groups love it when they get this kind of attention, so we will likely see copycats.” <a href="https://qz.com/young-hackers-are-sticking-up-las-vegas-casinos-for-hef-1850837238" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<h1 class="single-article__title">Groups linked to Las Vegas cyber attacks are prolific criminal hacking gangs</h1>
<div class="single-article__excerpt">A breach of two Las Vegas casino operators is shining a spotlight on the Scattered Spider and ALPHV hacking groups.</div>
<div>
<header class="single-article__header ">
<div class="single-article__cover-wrap">
<figure class="single-article__cover"><img loading="lazy" decoding="async" class="single-article__cover-image wp-post-image" src="https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?w=1041" sizes="(max-width: 1041px) 100vw, 1041px" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg 1920w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=300,195 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=768,498 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=1024,664 1024w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=1536,996 1536w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=600,389 600w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=259,168 259w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=520,337 520w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=1041,675 1041w, https://cyberscoop.com/wp-content/uploads/sites/3/2023/09/GettyImages-928434478.jpeg?resize=1300,843 1300w" alt="The exterior of Ceasars Palace Hotel &amp; Casino is viewed on March 2, 2018 in Las Vegas, Nevada. (Photo by George Rose/Getty Images)" width="1041" height="675" /><figcaption>The exterior of Ceasars Palace Hotel &amp; Casino is viewed on March 2, 2018 in Las Vegas, Nevada. (Photo by George Rose/Getty Images)</figcaption></figure>
</div>
</header>
<div class="single-article__content">
<div class="single-article__content-inner has-drop-cap">
<p>Apair of criminal hacking groups have been linked with attacks in recent weeks on two prominent Las Vegas hotel and casino operators that has left one struggling to resume operations and prompted another to reportedly pay a multimillion dollar ransom payment.</p>
<p>The attacks on MGM Resorts and Caesars Entertainment have resulted in widespread outages at MGM properties, and according to a Wall Street Journal report, forced Caesars to pay roughly half of a $30 million ransom demand.</p>
<p>Exactly who is behind the attacks remains unclear, but two hacking groups have been linked with the breaches:ALPHV and Scattered Spider. A person claiming to be a member of the latter told CyberScoop that their group was responsible for the attack on MGM but denied responsibility for the breach of Caesars. Earlier this week VX-Underground, a well-known online malware research repository, wrote on the social media platform X that an ALPHV representative said they were behind the MGM hack.</p>
<p>Late Thursday, ALPHV claimed responsibility for the attack on MGM in a statement on its website. It is unclear whether Scattered Spider’s claim of responsibility for the breach of MGM is false or whether overlaps between the two groups mean that members of both hacking collectives were involved in the breach of MGM. The Scattered Spider member who spoke with CyberScoop described their group as a well-known affiliate of ALPHV.</p>
<p>In a Thursday regulatory filing, Caesars confirmed that the company had identified “suspicious activity in its information technology network resulting from a social engineering attack on an outsourced IT support vendor” used by the company. The attackers gained a copy of “among other data, our loyalty program database, which includes driver’s license numbers and/or social security numbers for a significant number of members in the database,” the company said.</p>
<p>Caesars said it took steps “to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result,” the company reported, in what may have been a veiled reference to the reported ransomware payment.</p>
<p>Neither Caesars nor MGM responded to multiple requests for comment. The FBI acknowledged that it was investigating the incidents Thursday but declined to comment further.</p>
<p>As of Thursday, MGM appears to be continuing to struggle to recover from the attack. The company’s website remains down, and reports on social media show digital slot machines in MGM casinos bearing error messages.</p>
<p>The member of Scattered Spider who spoke with CyberScoop said that negotiations with MGM were ongoing but would not disclose the terms of any demands. The individual claimed that stolen data included customer information, sexual abuse incident reports and other corporate records. The individual’s claims could not be independently verified.</p>
<p>“If MGM decide they want to discuss if they paid or how much is completely up to them, if they decide they want to pay the money we assure them their systems wont [sic] be breached again,” the person said in an online chat.</p>
<p>The two groups — Scattered Spider and ALPHV — linked to the attacks on the two casino operators are a set of aggressive online criminal groups with well-documented history of carrying out ransomware attacks.</p>
<p>Scattered Spider is the name given to a financially motivated hacking group by private industry researchers. The group was likely behind a “massive phishing campaign” targeting Okta, the U.S.-based authentication firm, which led to follow-on attacks against users of the Signal messaging app, Twilio and Cloudflare, cybersecurity firm Group-IB reported in August 2022.</p>
<p>Scattered Spider has been active since May 2022, and has mostly attacked telecommunications and business process outsourcing organizations until recently, when it began targeting other sectors, including critical infrastructure, according to an Aug. 17 analysis from cybersecurity firm Trellix.</p>
<p>The group “heavily relies on email and SMS phishing attacks and have also been observed attempting to phish other users within an organization once they’ve gained access to employee databases,” according to a May 2023 Mandiant analysis.</p>
<div class="ad ad--inline_1 ">
<div class="ad__inner">
<div id="ap_inline_3" class="ad__embed" data-loadad="0" data-google-query-id="CIKxrP2NrIEDFRvbuAgdroUIFA">
<div id="google_ads_iframe_/18430785/sng_cyberscoop/ap_inline_3_0__container__">Charles Carmakal, Mandiant’s chief technology officer<strong>,</strong> called Scattered Spider “one of the most prevalent and aggressive threat actors impacting organizations in the United States today.” The group’s members may be “less experienced and younger” than more established criminal hacking groups, but they are “native English speakers and are incredibly effective social engineers,” Carmakal added, referring to the practice of tricking or persuading a person with access to a particular company or network to provide access to someone not authorized to have it.</div>
</div>
</div>
</div>
<p>The exact relationship between Scattered Spider and ALPHV is difficult to determine. Scattered Spider is considered a distinct, financially-motivated cybercrime group that has demonstrated connections to the ALPHV ransomware operation by using some of its tooling, experts say. ALPHV is a well-known ransomware operation, also known as BlackCat, and was perhaps the first entity to operate ransomware using the RUST language in the wild. <a href="https://cyberscoop.com/las-vegas-mgm-caesars-cyber-attack/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__heading_3__1kDhc heading__base__2T28j heading__heading_3__3aL54 article-header__title__3Y2hh" data-testid="Heading">MGM Resorts breached by &#8216;Scattered Spider&#8217; hackers: sources</h1>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-0">SAN FRANCISCO/WASHINGTON, Sept 13 (Reuters) &#8211; A hacking group named Scattered Spider brought down the systems of the $14 billion gaming giant MGM Resorts International (MGM.N) this week, two sources familiar with the matter said, as U.S. law enforcement officials started a probe into the breach.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-1">Several MGM systems remained paralyzed for a third straight day after it said on Monday it had shut some of them to contain a &#8220;cybersecurity issue.&#8221; The company, which operates over 30 hotel and gaming venues around the world including in Macau and Las Vegas, said it was investigating the incident.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-2">A Bloomberg report separately said another casino operator, Caesars Entertainment, had been hacked and paid ransom to hackers who threatened to leak its data in recent weeks, citing two people familiar with the mater.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-3">Shares of Caesars Entertainment and MGM both fell on Wednesday.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-4">The cause and the full impact of the breaches was not immediately clear, although social media posts showed slot machines and systems down at MGM venues in Las Vegas.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-5">Two sources familiar with the matter told Reuters the hacking group Scattered Spider was behind it. Identified by analysts last year, this group uses social engineering to lure users into giving up their login credentials or one-time-password (OTP) codes to bypass multi-factor authentication, the security firm Crowdstrike said in a blog post in January.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-6">It is &#8220;one of the most prevalent and aggressive threat actors impacting organizations in the United States today,&#8221; Charles Carmakal, chief technology officer at Alphabet Inc&#8217;s (GOOGL.O) Mandiant Intelligence said in a post on LinkedIn on Wednesday, following reports about the MGM breach.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-7">&#8220;Although members of the group may be less experienced and younger than many of the established multifaceted extortion/ransomware groups and nation state espionage actors, they are a serious threat to large organizations in the U.S.,&#8221; he added.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-8">Scattered Spider, also known as UNC3944, has hit telecom and business process outsourcing (BPO) companies in the past, but more recently also targeted critical infrastructure organizations, according to analyst reports.</p>
<div class="article-body__element__2p5pI"></div>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-9">&#8220;They leverage tradecraft that is challenging for many organizations with mature security programs to defend against,&#8221; Carmakal said.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-10">The FBI said on Wednesday it was investigating the incident, but did not elaborate. The rating agency Moody&#8217;s warned the breach could negatively impact MGM&#8217;s credit rating.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-11">Such attacks are typical hallmarks of ransomware incidents in which extortionists encrypt victims&#8217; computer systems and demand ransoms in digital currency.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-12">Analysts say casinos are prime targets of financially-motivated cybercrimes.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-13">&#8220;They&#8217;re more likely to get paid because they&#8217;re disrupting casino operations,&#8221; said Allan Liska, intelligence analyst at the security firm Recorded Future.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-14">&#8220;Casinos around the world should be on heightened alert because ransomware groups love it when they get this kind of attention, so we will likely see copycats.&#8221;</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-15">Moody&#8217;s analysts said in a report that the incident &#8220;highlights key risks related to (MGM&#8217;s) business operations&#8217; heavy reliance on technology and the operational disruption caused when systems need to go offline or are inoperable.&#8221;</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-16">Messages seeking further comment from MGM and the U.S. cybersecurity watchdog agency CISA were not immediately returned. MGM Resorts&#8217; website was &#8220;currently unavailable,&#8221; according to a holding message posted to the group&#8217;s homepage.</p>
<p class="text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD" data-testid="paragraph-17">&#8220;Our investigation is ongoing and we are working diligently to determine the nature and scope of the matter,&#8221; MGM said in a post on the social media website X on Monday. <a href="https://www.reuters.com/technology/moodys-says-breach-mgm-is-credit-negative-disruption-lingers-2023-09-13/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<hr />
<h1 id="maincontent" class="headline__text inline-placeholder" data-editable="headlineText">Caesars and MGM grapple with hacks as cybersecurity in Vegas is under scrutiny</h1>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_3E2EB4B2-F930-0101-2D01-94905CA5F3A7@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="on">Hackers stole Social Security numbers and driver’s license numbers from a “significant number” of loyalty program customers of Caesars Entertainment, the hospitality and casino giant said Thursday.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_C5CB5BC1-8AE5-E503-7D33-94978A4717A9@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">The disclosure comes as another big Las Vegas brand, MGM Resorts, is recovering from its own apparent cyberattack in which guests on Monday reported being unable to make room charges and access their rooms with their digital keys.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_50AB78A4-E2BD-8F7D-0DAD-9497B3B6D7E0@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">The pair of hacks has put a spotlight on the computer defenses of the multibillion-dollar casino and hospitality business in Las Vegas, which are ripe targets for cybercriminals to extort.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_74D8CF21-0F7C-40B1-5D7A-9497EDC81CA2@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">Caesars Entertainment, which owns famous hotel-casinos such as Caesars Palace, confirmed on September 7 that the hackers had stolen a copy of the customer loyalty program database, in a filing with the Securities and Exchange Commission. The hackers broke into computer systems via “a social engineering attack” on an IT support contractor, according to the filing.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_232998A5-C835-5322-42D3-94993DE6AB1C@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="on">“We have taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result,” Caesars Entertainment said. The company did not immediately respond to CNN’s questions as to what steps were taken and whether they included paying a ransom.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_B6D360EF-DB6E-D2EF-F896-94995AA7DECD@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="on">For its part, MGM Resorts has repeatedly referred to a “cybersecurity issue” in describing the disruption to some of its computer systems, but the incident has the hallmarks of a cyberattack.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_C0EF9D32-D605-3E01-722A-9499719867B1@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">“We continue to work diligently to resolve our cybersecurity issue while addressing individual guest needs promptly,” MGM Resorts said in a statement on Thursday morning. The company said on Monday, when news of the incident broke, that it had shut down certain computer systems to protect its data.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_33025138-A741-AAD8-3A72-9499836FB743@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">MGM Resorts did not respond to multiple requests for comment from CNN this week on how it was dealing with the apparent hack.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_42D1EE57-483D-C110-38D6-9499A21381E8@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">An FBI spokesperson said the bureau was investigating the cybersecurity incident at MGM Resorts but declined further comment, citing an ongoing investigation.</p>
<h2 id="scattered-spider-considered-a-serious-threat" class="subheader" data-editable="text" data-uri="cms.cnn.com/_components/subheader/instances/paragraph_304AF4A8-742E-85BE-8960-94C8C2FA9DD5@published" data-component-name="subheader" data-article-gutter="true">Scattered Spider considered a ‘serious threat’</h2>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_BB75FD42-26D5-DA8C-3AFD-9499B54C265D@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">It’s unclear who exactly was responsible for the cyberattacks. But a cybercriminal group known in the industry as Scattered Spider has been targeting casinos and hotels in recent weeks, according to Mandiant Consulting, a Google-owned cybersecurity firm.</p>
<p data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_BB75FD42-26D5-DA8C-3AFD-9499B54C265D@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">Members of the hacking group “may be less experienced and younger” than many of the established cybercriminal gangs and state-backed cyber-espionage teams, but “they are a serious threat to large organizations in the United States,” said Charles Carmakal, Mandiant Consulting’s chief technology officer.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_0353CA75-CE23-BFD2-B8A4-9499E0F3D007@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="on">Some of the members of the group appear to be based in the United States and the United Kingdom, according to Carmakal and other sources interviewed by CNN. Bloomberg News reported on Wednesday that Scattered Spider was responsible for the pair of cyberattacks on Caesars Entertainment and MGM Resorts.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_7361BD15-2B61-2AD0-0DC2-949756185217@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">Reports that the hackers had used social-engineering techniques in which, for example, they pose as an IT support employee to gain access to an organization, raised concerns for cybersecurity experts.</p>
<p class="paragraph inline-placeholder" data-uri="cms.cnn.com/_components/paragraph/instances/paragraph_3A29F670-8D37-AA7A-9EBC-949EC3BBDFCC@published" data-editable="text" data-component-name="paragraph" data-article-gutter="true" data-analytics-observe="off">“Most organizations focus on email-based threats in their technical tools and protocols,” Rachel Tobac, CEO of SocialProof Security, a social-engineering prevention firm, told CNN. “Many [organizations] are not yet equipped with the social engineering prevention protocols necessary to catch and stop a phone-based attacker in the act.” <a href="https://www.cnn.com/2023/09/14/business/caesars-mgm-casino-cyberattack/index.html" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="caas-subheadline">
<div class="caas-figure-with-pb">
<h1 class="headline"><span style="color: #ff0000;">MGM cyberattack</span> <span style="color: #0000ff;">continues</span> to <span style="color: #ff0000;">create chaos</span> for <span style="color: #0000ff;">Vegas operations</span>; <span style="color: #ff0000;">SEC notified</span></h1>
<h2 class="sub-headline"><span style="color: #0000ff;">MGM Resorts International website remains down</span></h2>
<p>MGM Resorts International in Nevada confirmed a recent cyberattack in a Wednesday filing with the Securities and Exchange Commission (SEC).</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desk-ad-lb2" class="ad gam" data-ad-lz="1" data-ad-init="1" data-google-query-id="CMHkytWlrIEDFTAxRAgdogMCag" data-ad-slot-rendered="1" data-rendered-size="1x1">
<div id="google_ads_iframe_/4145/fbn/desk/art/mkt/lb2_0__container__">The Las Vegas-based company experienced a computer system outage on Monday that affected operations at headquarters as well as its properties and websites.</div>
</div>
</div>
<blockquote><p><span style="color: #ff0000;"><em><strong>MGM RESORTS EXPERIENCES &#8216;CYBERSECURITY ISSUE&#8217; IMPACTING OPERATIONS, PROMPTS INVESTIGATION</strong></em></span></p></blockquote>
<p>&#8220;MGM Resorts recently identified a cybersecurity issue affecting certain of the company’s systems,&#8221; an MGM spokesperson said in a statement. &#8220;Promptly after detecting the issue, we began an investigation with assistance from leading external cybersecurity experts. We also notified law enforcement and are taking steps to protect our systems and data, including shutting down certain systems. Our investigation is ongoing, and we are working diligently to resolve the matter. The company will continue to implement measures to secure its business operations and take additional steps as appropriate.&#8221;</p>
<p>On Monday, FOX 5 in Las Vegas reported that one of the company’s properties, the Bellagio Las Vegas, confirmed that the computer systems were down at all resorts and that all computer-based operations were forced to go manual.</p>
<div class="inline image-ct">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/343/192/iStock-1148767529.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/686/384/iStock-1148767529.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/672/378/iStock-1148767529.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/1344/756/iStock-1148767529.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/931/523/iStock-1148767529.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/1862/1046/iStock-1148767529.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/720/405/iStock-1148767529.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/1440/810/iStock-1148767529.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img decoding="async" src="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2021/03/931/523/iStock-1148767529.jpg?ve=1&amp;tl=1" alt="MGM" /></picture></div>
<div class="caption">
<p>This view shows the MGM Grand in Las Vegas. (iStock / iStock)</p>
</div>
</div>
<p>Personnel at the resort also said the outage affected credit card machines at the properties.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desk-ad-lb3" class="ad gam" data-ad-lz="1" data-ad-init="1" data-google-query-id="CJPZttelrIEDFeGN7gEdXYgMeQ" data-ad-slot-rendered="1" data-rendered-size="1x1">
<div id="google_ads_iframe_/4145/fbn/desk/art/mkt/lb3_0__container__">When visiting mgmresorts.com, a page comes up that says, &#8220;The MGM Resorts website is currently unavailable,&#8221; followed by an apology as well as numbers to make reservations, reach out to member services or call a concierge. On social media, the company posted a statement about the technical issues the company is facing.</div>
</div>
</div>
<div class="inline image-ct">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/343/192/MGM-Getty.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/686/384/MGM-Getty.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/672/378/MGM-Getty.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/1344/756/MGM-Getty.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/931/523/MGM-Getty.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/1862/1046/MGM-Getty.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/720/405/MGM-Getty.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/1440/810/MGM-Getty.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img decoding="async" src="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/08/931/523/MGM-Getty.jpg?ve=1&amp;tl=1" alt="MGM Grand casino resort Las Vegas" /></picture></div>
<div class="caption">
<p>MGM Resorts International in Las Vegas confirmed a recent cyberattack in a Wednesday filing with the Securities and Exchange Commission. (Ethan Miller / File / Getty Images)</p>
</div>
</div>
<p>MGM did not immediately respond to inquiries from Fox Digital about the cybersecurity outage. The company operates <a href="https://www.foxbusiness.com/category/travel" target="_blank" rel="noopener">19 resorts</a> with more than 40,000 rooms around the world, including the MGM Grand, Mandalay Bay, Luxor and New York-New York in Las Vegas as well as the Borgata in Atlantic City, New Jersey, and more. <a href="https://www.foxbusiness.com/markets/mgm-cyber-attack-continues-create-chaos-vegas-operations-sec-notified" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WiPhone, A Phone for Hackers and Makers</title>
		<link>https://goodshepherdmedia.net/wiphone-a-phone-for-hackers-and-makers/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 17:11:38 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[A Phone for Hackers]]></category>
		<category><![CDATA[A Phone for Hackers and Makers]]></category>
		<category><![CDATA[A Phone for Hackers Makers]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[phone hacking]]></category>
		<category><![CDATA[Wi Phone]]></category>
		<category><![CDATA[WiPhone]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=14747</guid>

					<description><![CDATA[WiPhone, A Phone for Hackers and Makers Here Introducing an all-new WiPhone, A Phone for Hackers and Makers. Moreover, WiPhone is a VoIP mobile phone designed to be easily modified, repurposed, and adapted. Basically, It’s designed to enable hackers by making it easy to extend and modify the electronics and software. Something typical phones are not good [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>WiPhone, A Phone for Hackers and Makers</h1>
<p><iframe title="Crowdfunding Video - ESP32 WiPhone" width="640" height="360" src="https://www.youtube.com/embed/Xxi0X3o1RHA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Here Introducing an all-new WiPhone, A Phone for Hackers and Makers. Moreover, WiPhone is a VoIP mobile phone designed to be easily modified, repurposed, and adapted.</p>
<p>Basically, It’s designed to enable hackers by making it easy to extend and modify the electronics and software. Something typical phones are not good for. However, WiPhone is also a VoIP mobile phone. It uses WIFI to make HD voice calls, for free. Though, This means that there is no required service contract.</p>
<p>Additionally, WiPhone solves these problems and gives hackers, makers, and engineers the tool we all wish our phones could be. However, It is direct access to I/O, an easy to program ESP32 processor. However,  All the basics are already set up the user interface, power management, and on/off the circuit, working code.</p>
<p>Furthermore, you also can get straight to work building projects, not setting up the boring parts like power management again and again. Though, No rats nest of wires or ugly stack of dev boards just to get the basic functionality.</p>
<p>WiPhone Tech Specs:</p>
<table width="400">
<tbody>
<tr>
<td width="64">Screen</td>
<td width="336">320 x 240</td>
</tr>
<tr>
<td>Size</td>
<td>120mm x 50mm x 12mm</td>
</tr>
<tr>
<td>Weight</td>
<td>80g</td>
</tr>
<tr>
<td>Battery</td>
<td>700 mAh, 8 hours talk/1 week standby time</td>
</tr>
</tbody>
</table>
<hr />
<h1 id="h:what-is-the-wiphone" class="page-anchor">What is the WiPhone?</h1>
<p><iframe title="WI Phone - Phone For Hackers ??? Hindi" width="640" height="360" src="https://www.youtube.com/embed/rqFVHzSsRgA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>WiPhone is a unique, minimal phone.</p>
<p>It&#8217;s designed to enable hackers by making it easy to extend and modify the electronics and software. Something typical phones are not good for.</p>
<p>WiPhone is also a VoIP mobile phone. It uses WIFI to make HD voice calls, for free. This means that there is no required service contract &#8211; and it&#8217;s yours for life.</p>
<h1 id="h:for-hackers" class="page-anchor">For Hackers:</h1>
<div class="template asset" contenteditable="false" data-alt-text="WiPhone: Business In The Front, Party In The Back" data-caption="WiPhone: Business In The Front, Party In The Back" data-id="24546391">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/546/391/725b922e3013bb3a34f7a47a698de795_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553612832&amp;gif-q=50&amp;q=92&amp;s=11b031c0ac1f3e79b9b547ef1ede3191" alt="WiPhone: Business In The Front, Party In The Back" data-src="https://ksr-ugc.imgix.net/assets/024/546/391/725b922e3013bb3a34f7a47a698de795_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553612832&amp;gif-q=50&amp;q=92&amp;s=11b031c0ac1f3e79b9b547ef1ede3191" data-airgap-id="160" /><figcaption class="px2">WiPhone: Business In The Front, Party In The Back</figcaption></figure>
</div>
<h1 id="h:yet-so-stylish-and-s" class="page-anchor"> Yet So Stylish And Sophisticated!</h1>
<div class="template asset" contenteditable="false" data-alt-text="WiPhone: Perfect for both hardware hacking AND trips to the business factory." data-caption="WiPhone: Perfect for both hardware hacking AND trips to the business factory." data-id="24222197">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/222/197/f69493d004457b84ab711290b0491dfe_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551220707&amp;gif-q=50&amp;q=92&amp;s=3225d407f6e2cfb48eda680d3c27187c" alt="WiPhone: Perfect for both hardware hacking AND trips to the business factory." data-airgap-id="161" /><figcaption class="px2">WiPhone: Perfect for both hardware hacking AND trips to the business factory.</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24255856">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/255/856/dd773d9ebcbb57151e57cffd48719f57_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551456235&amp;gif-q=50&amp;q=92&amp;s=3677d8f5ba63877fb13fb63dc1cba318" alt="" data-airgap-id="162" /></figure>
</div>
<h1 id="h:wiphone-pro-with-cle" class="page-anchor"> WiPhone Pro with Clear Front Face:</h1>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24251782">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/251/782/fd58066bbd5bd5642dd879a5d4d4dd96_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551425726&amp;gif-q=50&amp;q=92&amp;s=ff1135719f24b54823fda1669c3bcf8a" alt="" data-airgap-id="163" /></figure>
</div>
<p><a href="https://www.kickstarter.com/projects/2103809433/wiphone-a-phone-for-hackers-and-makers" target="_blank" rel="noopener">source</a></p>
<h1 id="h:smartphones-are-a-li" class="page-anchor">Smartphones Are A Little Too Smart</h1>
<p>What&#8217;s the best platform you can imagine for electronics hacking?</p>
<p>It should probably be adaptable, powerful, and programmable. Small and portable would be nice. Maybe with a durable case? What about a built in user interface with things like an LCD screen and button panel? A battery and built-in charging system? Wireless connectivity?</p>
<p>Hey&#8230; we just described a mobile phone!</p>
<p>But why aren&#8217;t people building more projects based on their smartphones? Well, there are a few issues:</p>
<ul>
<li>no electrical connectors to directly connect to the outside world</li>
<li>no way to easily control the low level hardware, like processor output pins</li>
<li>opaque development environment and huge IDE</li>
<li>not designed for easy disassembly, repair, or modification</li>
</ul>
<h1 id="h:enter-wiphone" class="page-anchor">Enter WiPhone:</h1>
<p><iframe title="Wiphone" width="640" height="360" src="https://www.youtube.com/embed/UFpWSblVyhw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24255271">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/255/271/b31d8c4e2aa7767626622438c8387ab6_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551453727&amp;gif-q=50&amp;q=92&amp;s=60ac17fdb31424a6f1ca9117cab7d4a2" alt="" data-airgap-id="164" /></figure>
</div>
<p>&nbsp;</p>
<p>WiPhone solves these problems and gives hackers, makers, and engineers the tool we all wish our phones could be. Nice package, direct access to I/O, an easy to program ESP32 processor. All the basics are already set up: user interface, power management and on/off circuit, working code.</p>
<p>You can get straight to work building <span class="bold">your</span> project, not setting up the boring parts like power management again and again. And once you&#8217;re done it&#8217;s durable and looks great. No ratsnest of wires or ugly stack of dev boards just to get the basic functionality.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24229542">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/229/542/c40e0be8c36c5213706c407564860e68_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551275978&amp;gif-q=50&amp;q=92&amp;s=1fb3665207d872a01f0149f4411ce9c7" alt="" data-airgap-id="165" /></figure>
</div>
<p>Modern smartphones are more and more a tool we don&#8217;t own, but instead one we&#8217;re only allowed to carry around. One that serves the interests of various tracking networks, corporate boards, and government organizations. You don&#8217;t own it, it owns you. It tracks you, serves you ads, and sucks away your time with mindless dopamine hits. <span class="bold">We want a phone that&#8217;s back in our control, optimized for our convenience</span>.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24544306">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/544/306/de2e13e8060894347c6e9c18c9049064_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553601806&amp;gif-q=50&amp;q=92&amp;s=21330f469ea046b89091ac367c4378f6" alt="" data-airgap-id="166" /></figure>
</div>
<p>&nbsp;</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24252142">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/252/142/3cd5e50c8b8a6427adb8afe55d893ac0_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551429044&amp;gif-q=50&amp;q=92&amp;s=b0b9086239fdfe041426b2fe8ee28674" alt="" data-airgap-id="167" /></figure>
</div>
<h1 id="h:free-calling-no-hack" class="page-anchor">Free Calling! No Hacking Required!</h1>
<p>WiPhone is different beast from most smartphones these days. WiPhone uses the existing WiFi around you to make HD Voice calls. For free. Buy it once and it&#8217;s yours.</p>
<p>Works on most broadband WiFi networks (including most home WiFi connections). No service contract required, and you can even upgrade the firmware or expand the hardware to do things it wasn&#8217;t originally intended for.</p>
<h1 id="h:what-is-this-magical" class="page-anchor">What Is This Magical Free Calling You Speak of? Tell me more&#8230;</h1>
<p>Free calling starts with a SIP account. SIP stands for Session Initiation Protocol, and it&#8217;s a standard way to make call over the internet. VoIP is a related term that you may have heard of. There are commercial services that provide SIP/VoIP accounts, and some of them have free accounts. Most consumers use VoIP apps like Skype and Whatsapp, but we can still use the underlying technology directly. After the campaign we&#8217;ll spend more time testing services to make our software and instructions work as seamlessly as possible.</p>
<p>Step 1: Get a SIP account (many different ways to do this, but we wrote up a simple <a href="https://docs.google.com/document/d/1uPa_2V09S3YnJV_ouEUT19nDvY82nd5PcWwRDm2ayhY/edit?usp=sharing" target="_blank" rel="noopener">how-to</a> that might get you started).</p>
<p>Step 2: Log in on your WiPhone using the credentials from your SIP account (user name, password, and server):</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24513831">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/513/831/d1dcbd2c61c9729cf514cead81b2af06_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553356372&amp;gif-q=50&amp;q=92&amp;s=ad45f1b0273373250e07e5128ec77ed7" alt="" data-src="https://ksr-ugc.imgix.net/assets/024/513/831/d1dcbd2c61c9729cf514cead81b2af06_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553356372&amp;gif-q=50&amp;q=92&amp;s=ad45f1b0273373250e07e5128ec77ed7" data-airgap-id="168" /></figure>
</div>
<p>Step 3: Make a Call:</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24541699">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/541/699/4bdbec0ee2d667864d5e3225013ad6af_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553578318&amp;gif-q=50&amp;q=92&amp;s=488d481066e71a4783f5a0975b7d86f9" alt="" data-src="https://ksr-ugc.imgix.net/assets/024/541/699/4bdbec0ee2d667864d5e3225013ad6af_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553578318&amp;gif-q=50&amp;q=92&amp;s=488d481066e71a4783f5a0975b7d86f9" data-airgap-id="169" /></figure>
</div>
<p>That&#8217;s it!</p>
<p><span class="text-italic">Note: we&#8217;re still working through compatibility with various SIP providers since many of them implement the standard in various ways. Once the WiPhones ship we&#8217;ll update our getting started instructions to use the servers we find to be most reliable.</span></p>
<p>&nbsp;</p>
<h2 id="h:what-people-are-sayi" class="page-anchor">What people are saying about WiPhone:</h2>
<p>“This is a great cross over between what people know (phones) and what people really want to do (hack).&#8221; -Nathan Seidle, Sparkfun Founder</p>
<p>“The WiPhone is a really rather neatly put together project.” -Alasdair Allan, Hackster.io</p>
<p>“If you want a phone that respects your right to repair, this is the project to look at.” -Brian Benchoff, Hackaday.com</p>
<p>“So excited by this project I tried to make one myself” -Random Guy On Our YouTube Channel</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24543472">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/543/472/4cb761f641f0009d022cd69a54f4c397_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553595797&amp;gif-q=50&amp;q=92&amp;s=3f82b07a069401df8f7c078a95abb7ef" alt="" data-airgap-id="170" /></figure>
</div>
<p>&nbsp;</p>
<h1 id="h:first-class-expansio" class="page-anchor">First Class Expansion Capabilities</h1>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24541911">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/541/911/3861b2e7c7dfdf688b7bbc718b92151c_original.png?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553580000&amp;gif-q=50&amp;lossless=true&amp;s=d669c40de6e0da86d72904b200e7e533" alt="" data-airgap-id="171" /></figure>
</div>
<p>WiPhone is expandable through daughter boards. The whole back of the phone is a replaceable panel that accepts a standard 1.6mm thickness PCB, which you can use to add whatever functionality you like.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24545020">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/545/020/239cb3957a5e27694d899dec89c2f183_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553606165&amp;gif-q=50&amp;q=92&amp;s=33ac0a3bc4add4a010f2ce56acbfda88" alt="" data-src="https://ksr-ugc.imgix.net/assets/024/545/020/239cb3957a5e27694d899dec89c2f183_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553606165&amp;gif-q=50&amp;q=92&amp;s=33ac0a3bc4add4a010f2ce56acbfda88" data-airgap-id="172" /></figure>
</div>
<p>&nbsp;</p>
<div class="template asset" contenteditable="false" data-alt-text="Daughterboard PCB Design, Keepout Areas" data-caption="Daughterboard PCB Design, Keepout Areas" data-id="24531375">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/531/375/ba6a85f2b43253a185a4e16151f6cd09_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553523496&amp;gif-q=50&amp;q=92&amp;s=bba564de1873e9b3b463d622c51f8ac9" alt="Daughterboard PCB Design, Keepout Areas" data-src="https://ksr-ugc.imgix.net/assets/024/531/375/ba6a85f2b43253a185a4e16151f6cd09_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553523496&amp;gif-q=50&amp;q=92&amp;s=bba564de1873e9b3b463d622c51f8ac9" data-airgap-id="173" /><figcaption class="px2">Daughterboard PCB Design, Keepout Areas</figcaption></figure>
</div>
<p><span class="bold">Some Examples</span></p>
<p>We made a WiPhone into an RC car:</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24545000">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/545/000/0d6bfaae0497cf0b7c6d0660f0406bbe_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553606039&amp;gif-q=50&amp;q=92&amp;s=06603bd79d14fe6b6cc48dd010a2c210" alt="" data-src="https://ksr-ugc.imgix.net/assets/024/545/000/0d6bfaae0497cf0b7c6d0660f0406bbe_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553606039&amp;gif-q=50&amp;q=92&amp;s=06603bd79d14fe6b6cc48dd010a2c210" data-airgap-id="174" /></figure>
</div>
<p>And we also made the coolest way to ever to answer a phone:</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24544793">
<figure><img decoding="async" class="fit js-lazy-image" src="https://ksr-ugc.imgix.net/assets/024/544/793/c528bbec359944e4a2a8b1801018dcde_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553604903&amp;gif-q=50&amp;q=92&amp;s=1adf9204c1b6b67a26eece41a76a30e4" alt="" data-src="https://ksr-ugc.imgix.net/assets/024/544/793/c528bbec359944e4a2a8b1801018dcde_original.gif?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553604903&amp;gif-q=50&amp;q=92&amp;s=1adf9204c1b6b67a26eece41a76a30e4" data-airgap-id="175" /></figure>
</div>
<p>The daughterboard headers have power, digital I/O, and all the common embedded busses like SPI, I2C, and UART.</p>
<h1 id="h:easy-development" class="page-anchor"> <span class="bold">Easy Development</span></h1>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24529712">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/529/712/7d12ba1dfe13cc7c3ef1533453d3665c_original.png?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553512065&amp;gif-q=50&amp;lossless=true&amp;s=59ec16ec20dd3e229d8ce14c275aadb9" alt="" data-airgap-id="176" /></figure>
</div>
<p>Develop in Arduino/C++ or Python. We&#8217;ll also provide basic tutorials covering how to write to the screen, connect to the hardware, save data to memory, etc.  We&#8217;ll let you give us feedback on what&#8217;s most important to you.</p>
<h1 id="h:no-mess-prototyping" class="page-anchor">No-Mess Prototyping</h1>
<div class="template asset" contenteditable="false" data-alt-text="Build Your Prototype Right On The Back Of The Phone" data-caption="Build Your Prototype Right On The Back Of The Phone" data-id="24241686">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/241/686/8c3708d5a0f83859bc663253c3a94ab8_original.jpg?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1551361066&amp;gif-q=50&amp;q=92&amp;s=bfcff3e1c6f3691fb40091b6c92f50a9" alt="Build Your Prototype Right On The Back Of The Phone" data-airgap-id="177" /><figcaption class="px2">Build Your Prototype Right On The Back Of The Phone</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24544472">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/544/472/4dc09cb787144151c1021ad2ed368eac_original.png?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553602904&amp;gif-q=50&amp;lossless=true&amp;s=b24ac9d1cc51fab5a82fcc72e893ca7d" alt="" data-airgap-id="178" /></figure>
</div>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<h1 id="h:note-based-on-the-ba" class="page-anchor">Note: Based on the backer survey, we&#8217;ll prioritize adding a cellular radio (LTE), and secure communications after the campaign. Back now to get first access to the new hardware as it becomes available.</h1>
<p>See the relevant <a href="https://www.kickstarter.com/projects/2103809433/wiphone-a-phone-for-hackers-and-makers/posts/2480089" target="_blank" rel="noopener">Project Update</a> for details.</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<p>We have big plans for the WiPhone, but we also need to start off on solid footing. We&#8217;ve set a relatively low funding goal of $40k that will let us cover the costs to finish production of the phones themselves and not much more. That way we can get phones in the hands of people that want them.</p>
<p>But there&#8217;s a lot of potential waiting to be unlocked. If we reach $100k of phones, we&#8217;ll have enough of a cushion to thoroughly test the design and ultimately deliver a better product. It will also allow us to start taking on extra work. If we reach $100k we&#8217;ll start letting backers choose stretch goals.</p>
<p>Some stretch goals would add software features to the WiPhone itself. Others will be to take on design and production of daughterboards and other accessories.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="24544626">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/024/544/626/a3aa4450abe695ae88e859e9f531abe1_original.png?ixlib=rb-4.0.2&amp;w=680&amp;fit=max&amp;v=1553603824&amp;gif-q=50&amp;lossless=true&amp;s=a2a908ca9d9bf8347193d3b1cb663b24" alt="" data-airgap-id="179" /></figure>
</div>
<ul>
<li> <span class="bold">Wireless Firmware Updates:</span>Wireless firmware updates will allow you to easily upgrade your firmware.</li>
<li> <span class="bold">Integrated Python Interpreter: </span>Currently we&#8217;ll ship the WiPhone with a separate firmware that allows running MicroPython apps. This stretch goal would allow us to merge the Python interpreter into the main phone firmware to run user apps directly within the phone firmware.</li>
<li> <span class="bold">Remote Desktop: </span>View and control your WiPhone through a webpage.</li>
<li> <span class="bold">Encrypted Communications: </span>Add secure communication to calls and messages</li>
<li> <span class="bold">Threaded Messaging: </span>Add an advanced view to text messages for a more modern chat experience</li>
<li> <span class="bold">Additional Colors: </span>Add some variety to the clear/gray options we have now for face colors.</li>
<li> <span class="bold">Advanced Tutorials: </span>Deeper tutorials than the basic ones we&#8217;ll ship for the basic campaign. We could go step-by-step through writing a complete app, using the phone to build an entire project, or designing a daughterboard from scratch. We&#8217;ll let you give us feedback on what&#8217;s most important to you.</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-14748 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout.jpg" alt="" width="812" height="513" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout.jpg 2337w, https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout-400x253.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout-1024x648.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout-768x486.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout-1536x971.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2023/06/pinout-2048x1295.jpg 2048w" sizes="(max-width: 812px) 100vw, 812px" /></p>
<article id="post-351574" class="post-351574 post type-post status-publish format-standard has-post-thumbnail hentry category-crowd-funding tag-crowd-funding tag-crowdfunding tag-kickstarter tag-wiphone">
<header class="entry-header">
<h1 class="entry-title">PHONE FOR HACKERS LAUNCHES A CROWDFUNDING CAMPAIGN</h1>
<div class="entry-meta"><span class="entry-date">April 3, 2019</span> by Brian Benchoff 26 Comments</div>
</header>
<div class="entry-content">
<p>Based on the WiFi / Bluetooth wunderchip, clad in a polycarbonate frame, and looking like something that would be an amazing cell phone for 2005, the WiPhone is now available on Kickstarter.</p>
<p>We’ve seen the WiPhone before, and it’s an interesting set of features for what is effectively an ESP32 board with some buttons and a screen. It’s become something of a platform, with expansion daughterboards for LTE, LoRa, a camera, a Bus Pirate, and a programmable NFC/RFID doohickey. If you’ve longed for the day of big ‘ol Nokia brick phones, want to hack your phone, but don’t really care about actually having cellular connectivity, this is something that’s right up your alley.</p>
<p>Although the WiPhone looks like a usable product that was designed by someone with a sense of design, it still is Open Source. You can build your own, and there are dozens of expansion boards that will plug into the back of the WiPhone for prototyping, experimentation, and RGB Gaming LEDs. There’s no cellular modem on the WiPhone, though; for calls you’ll have to turn to SIP or VoIP apps.</p>
<p>Considering how difficult it is to source a cellular modem in small quantities and the desire for a cell phone that respects your Right to Repair, we’ve got to hand it to the WiPhone for creating something people want. It gets even better when you consider this looks more like a product than the 3D printed pieces of electronic cruft we usually see, and we’re happy to see this crowdfunding campaign just passed its goal and is completely funded.</p>
</div>
<footer class="entry-footer"><span class="cat-links">Posted in Crowd Funding</span><span class="tags-links">Tagged Crowd Funding, crowdfunding, kickstarter, WiPhone</span></footer>
</article>
<article id="post-344213" class="post-344213 post type-post status-publish format-standard has-post-thumbnail hentry category-crowd-funding tag-crowd-funding tag-wiphone">
<div class="entry-featured-image"></div>
<div class="entry-mobile-image"></div>
<header class="entry-header">
<h1 class="entry-title">THE WIFI PHONE THAT RESPECTS YOUR RIGHT TO REPAIR</h1>
<div class="entry-meta"><span class="entry-date">February 6, 2019</span> by Brian Benchoff 49 Comments</div>
</header>
<div class="entry-content">
<p>Phones are getting increasingly more complex, more difficult to repair, and phone manufacturers don’t like you tinkering with their stuff. It’s a portable version of a John Deere tractor in your pocket, and Apple doesn’t want you replacing a battery by yourself. What if there was a phone that respected your freedom? That’s the idea behind the WiPhone, and soon it’s going to be be a crowdfunding campaign. Yes, you will soon be able to buy a phone that respects your freedom.</p>
<p>We took a look at the WiPhone a few months ago, and the idea was solid: make a simple, cheap, handheld device based on the ESP32 WiFi/Bluetooth wonder microcontroller. There are a few other various bits of electronic ephemera for scanning the buttons, an audio codec, and a speaker driver, but the basics of the build are just an LCD and ESP32. The entire idea of this phone is to make calls through WiFi, and given the state of VoIP, it’s a marketable product.</p>
<p>Astute readers may notice that the WiPhone doesn’t have a cellular modem. Yes, this is true, but putting a baseband in a small, low-volume project is incredibly hard. You’re limited to 2G if you don’t want to deal with Broadcom or Qualcomm, and they’re not going to be interested in you if you’re not moving a hundred thousand units, anyway. Also, you’ve got service plans to deal with, multi-country radios, and you’re probably next to a trusted WiFi network right now, anyway.</p>
<p>The WiPhone is designed to be hackable, with daughter boards that turn it into a rainbow or RC car, and easy to assemble. It’s also going to be a crowdfunding campaign at the end of the month. If you want a phone that respects your right to repair, this is the project to look at, even if you don’t need a cellular modem all the time.</p>
</div>
<footer class="entry-footer"><span class="cat-links">Posted in Crowd Funding</span><span class="tags-links">Tagged Crowd Funding, WiPhone</span></footer>
</article>
<article id="post-321932" class="post-321932 post type-post status-publish format-standard has-post-thumbnail hentry category-wireless-hacks tag-esp-32 tag-feature-phone tag-nokia-brick tag-open-source tag-open-source-cellphone tag-smartphone tag-wiphone">
<div class="entry-featured-image"></div>
<div class="entry-mobile-image"></div>
<header class="entry-header">
<h1 class="entry-title">THIS HACKABLE PHONE MAKES WIFI CALLS.</h1>
<div class="entry-meta"><span class="entry-date">August 24, 2018</span> by Brian Benchoff 24 Comments</div>
</header>
<div class="entry-content">
<p>Over the years, we’ve seen dozens of projects that sell themselves as an ‘Open Source’ cellphone, a hackable cellphone, or some other confabulation of a microcontroller, screen, and a cellular module. The WiPhone is not one of these projects. That’s not to say it’s not an Open Source phone that’s intended to be hackable. No, this is a DIY phone that doesn’t make cellular calls, because this is a phone that only works with SIP and VoIP apps. It’s a WiPhone, and something a lot of us have been waiting for.</p>
<p>The hardware for this WiFi enabled phone is extremely minimal, but there are some interesting tricks up its sleeve. Instead of letting the main microcontroller handle capturing all the button presses, the team behind the WiPhone are using a SN7326 key-scan controller. This cheap part is able to scan 64 buttons, although there are only 25 buttons on the phone. The audio board is a  WM8750BL, a cheap codec with a stereo microphone interface and a 400 mW speaker driver. The display is a simple SPI TFT, and apart from the microcontroller, that’s about it.</p>
<p>But it’s the microcontroller that makes it, and for that we turn to the incredible ESP-32. This chip has enough power to play Doom, be a Game Boy, and in this case, make and receive calls from a VoIP provider, scan and connect to WiFi networks, and yes, it can even play snake.</p>
<p>While this is just about the simplest phone you can imagine, and it only works where there’s a WiFi network, a device like this could be invaluable. And really, these days how far are you from a WiFi network you’re already connected to anyway? <a href="https://hackaday.com/tag/wiphone/" target="_blank" rel="noopener">source</a></p>
</div>
</article>
<p>&nbsp;</p>
<hr />
<h2>First Class Expansion Capabilities &#8211; People Like The WiPhone Hack It Like It&#8217;s Yours</h2>
<div class="container-fluid">
<div class="row py-3">
<div class="left-column col-10 col-sm-9 content">
<section>WiPhone is built for hacking, not for some big corporation&#8217;s bottom line. Complete disassembly in less than a minute, using only 6 screws. The operating system firmware is easily modified, and simple enough to be understood entirely by one motivated person.Not only is WiPhone capable of completely free calling, it&#8217;s <em>also</em> an open source, self-contained Arduino development platform. Unlike most other dev boards it comes in a nice package, with a battery, power supply, and on/off circuitry. Once your project is done, instead of an eyesore of tangled wires and stacked boards, it&#8217;s compact and visually appealing.<video autoplay="autoplay" loop="loop" width="300" height="150" data-mce-fragment="1"></video></section>
<section>
<div class="section-heading text-center">
<h2>A Phone You Can Own</h2>
<p class="text-muted">(Not One That Owns You)</p>
</div>
<div class="row">
<div class="col-lg-8 my-auto">
<div class="container-fluid">
<div class="row">
<p>Modern smartphones are more and more a tool we don&#8217;t own, but instead one we&#8217;re only allowed to carry around. One that serves the interests of various tracking networks, corporate boards, and government organizations. You don&#8217;t own it, it owns you. It tracks you, serves you ads, and sucks away your time with mindless dopamine hits. <b>We want a phone that&#8217;s back in our control, optimized for our convenience</b>. <a href="https://wiphone.io/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Which one is better: Flipper One or Flipper Zero for Wi-Fi hacking?</title>
		<link>https://goodshepherdmedia.net/which-one-is-better-flipper-one-or-flipper-zero-for-wi-fi-hacking/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 22 Jan 2023 05:33:43 +0000</pubDate>
				<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[how to check security]]></category>
		<category><![CDATA[Pen Test]]></category>
		<category><![CDATA[preventing blackmail]]></category>
		<category><![CDATA[preventing extrortion]]></category>
		<category><![CDATA[preventing loss]]></category>
		<category><![CDATA[preventing theft]]></category>
		<category><![CDATA[stopping a hack]]></category>
		<category><![CDATA[stopping a hacker]]></category>
		<category><![CDATA[testing protocols]]></category>
		<category><![CDATA[Testing your network]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=10906</guid>

					<description><![CDATA[Which one is better: Flipper One or Flipper Zero for Wi-Fi hacking? Pen Test Tool for Securing Network, Wifi, Bluetooth, NFC Signals  Securing Communications within a secure zone Whether you are a hacker just starting out or you have been at it for a while, the debate over which hacking device is better — Flipper [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title" style="text-align: center;">Which one is better: Flipper One or Flipper Zero for Wi-Fi hacking?</h1>
<blockquote>
<h2 style="text-align: center;"><em><span style="color: #ff0000;">Pen Test Tool <span style="color: #000000;">for</span> <span style="color: #0000ff;"><span style="color: #008000;">Securing</span> Network<span style="color: #000000;">, Wifi</span></span></span><span style="color: #ff0000;"><span style="color: #0000ff;"><span style="color: #000000;">, </span></span></span><span style="color: #ff0000;"><span style="color: #0000ff;"><span style="color: #000000;">Bluetooth</span></span></span><span style="color: #ff0000;"><span style="color: #0000ff;"><span style="color: #000000;">, </span></span></span><span style="color: #ff0000;"><span style="color: #0000ff;"><span style="color: #000000;">NFC Signals </span></span><br />
<span style="color: #0000ff;"><span style="color: #008000;">Securing</span> Communications <span style="color: #000000;">within a</span> <span style="color: #008000;">secure zone</span></span></span></em></h2>
</blockquote>
<p>Whether you are a hacker just starting out or you have been at it for a while, the debate over which hacking device is better — Flipper One vs Flipper Zero, is one that is sure to spark some debate. The bottom line is that both of these devices have their advantages and disadvantages, so which one you choose really depends on your specific needs. In this blog post, we will take a closer look at both devices and help you decide which is best for you.</p>
<p>After the successful launch of Flipper One, many people have been asking about its successor – Flipper Zero. So which is better? Let’s take a look at their features and find out!</p>
<h2 class="has-secondary-color has-text-color"><strong>What is Flipper One?</strong></h2>
<p>Flipper One is a USB Wi-Fi adapter that can be used for hacking. It is designed to be small and portable, making it easy to take with you wherever you go. In short, Flipper One is a Wi-Fi hacking device that allows you to hack any Wi-Fi network without knowing the password. It is a small, portable device that can be used to get into any locked network in just a few seconds.</p>
<p><a href="https://flipperzero.one/one" target="_blank" rel="noreferrer noopener">Flipper One</a> was created by two security experts who were tired of being locked out of their own networks. They realized that there had to be a better way to break into Wi-Fi networks without having to guess passwords, so they created this little device that does the job for you.</p>
<p>Now anyone can hack into any Wi-Fi network with ease using the Flipper One Wi-Fi hacking device. This tiny device is also very affordable, making it an ideal choice for anyone who wants to gain access to locked networks without having to spend a lot of money.</p>
<p>P.S. we have a definitive guide of <a href="https://digitalnomadhardware.com/pwnagotchi-vs-flipper-zero/">Pwnagotchi vs Flipper Zero</a>, although both of them have legends of their own, you are welcome to look deeper into each of them.</p>
<h3 class="has-primary-color has-text-color"><strong>Key features</strong></h3>
<p>1. Attack both 2.4GHz and 5GHz Wi-Fi networks</p>
<p>2. Monitor and attack Wi-Fi clients</p>
<p>3. Deauthenticate clients from access points</p>
<p>4. Captures packets in promiscuous mode</p>
<p>5. Supply power via a USB port</p>
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10909" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-2-edited-1024x576.png" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-2-edited-1024x576.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-2-edited-300x169.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-2-edited-768x432.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-2-edited.png 1080w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
<h3 class="has-text-color"><strong>Advantages</strong></h3>
<p>1. The Flipper One Wi-Fi hacking device is small and discreet, making it easy to conceal and use inconspicuously.</p>
<p>2. It is also very fast and easy to set up – you can be up and running in minutes.</p>
<p>3. It provides high-quality Wi-Fi connections, even in areas with poor signal strength.</p>
<p>4. Furthermore, it is affordable and easy to use, making it a great choice for anyone on a budget.</p>
<p>5. Finally, Flipper One comes with a 100% satisfaction guarantee, ensuring that you are completely happy with your purchase.</p>
<h3 class="has-text-color"><strong>Disadvantages</strong></h3>
<p>1. Increased signal interference – Flipper One Wi-Fi hacking device can create a lot of signal interference, which can interfere with the performance of other wireless devices in the area.</p>
<p>2. However, its use in intercepting and decrypting data also makes it more vulnerable to viruses and malware than other wireless devices.</p>
<p>3. It should also be noted that while it can be used for legitimate purposes, it can also be used for malicious intent by hackers seeking to access sensitive information.</p>
<p>4. Can be difficult to configure and use – The Flipper One Wi-Fi hacking device can be difficult to configure and use, especially for beginners. It’s important to read the instructions carefully before using this device.</p>
<h2 class="has-secondary-color has-text-color"><strong>What is Flipper Zero?</strong></h2>
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10910" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-3-edited-1024x576.png" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-3-edited-1024x576.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-3-edited-300x169.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-3-edited-768x432.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-3-edited.png 1080w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
<p><a href="https://flipperzero.one/" target="_blank" rel="noreferrer noopener">Flipper Zero</a> is a Wi-Fi hacking device that exploits vulnerabilities in WPA/WPA2 security protocols to allow users to access other people’s Wi-Fi networks without their permission. It does this by brute force attacking the Wi-Fi network’s password until it finds the right one.</p>
<p>While Flipper Zero is certainly effective in breaking into secured Wi-Fi networks, it’s also essential to note that using such a device can be illegal in some cases. So if you’re thinking of using Flipper Zero to hack into someone’s Wi-Fi network, be sure to check your local laws first!</p>
<h3 class="has-primary-color has-text-color"><strong>Key Features</strong></h3>
<p>1. The Flipper zero Wi-Fi hacking device is very easy to use. It’s a small, portable gadget that you can take with you wherever you go.</p>
<p>2. It has a long range and can hack into any Wi-Fi network from up to 500 feet (0.15 km) away.</p>
<p>3. The Flipper zero Wi-Fi hacking device is very fast and can crack even the most complex passwords in just a few seconds.</p>
<p>4. The device is completely undetectable and cannot be traced or tracked by any security software or system.</p>
<p>5. Furthermore, the device comes with a lifetime warranty, providing protection for your investment.</p>
<h3 class="has-text-color"><strong>Advantages</strong></h3>
<p>1. The Flipper Zero Wi-Fi hacking device is user-friendly, requiring only a few clicks to control.</p>
<p>2. Its small and discreet design allows for easy concealment.</p>
<p>3. It is incredibly fast and can hack into any Wi-Fi network in just a matter of seconds.</p>
<p>4. It is very reliable and has never let me down so far.</p>
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10911" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1-1-edited-1024x576.png" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1-1-edited-1024x576.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1-1-edited-300x169.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1-1-edited-768x432.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1-1-edited.png 1080w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
<p>5 The customer support is excellent, and they are always available to help you if you encounter any problems while using the device.</p>
<h3 class="has-text-color"><strong>Disadvantages</strong></h3>
<p>There are a few potential disadvantages of using the Flipper Zero Wi-Fi hacking device.</p>
<ol>
<li>First, it’s possible that law enforcement or other government agencies may find a use for such a device and try to restrict or ban its use.</li>
<li>Second, it’s possible that hackers or other malicious individuals could find ways to exploit the vulnerabilities in the Flipper Zero device, compromising the security of networks and data.</li>
<li>Finally, there is always some risk that using any kind of hacking device could result in fines or imprisonment if caught.</li>
</ol>
<h2 class="has-secondary-color has-text-color">Flipper one vs Flipper zero</h2>
<p>There are many key differences when it comes to Flipper One vs Flipper Zero that you should be aware of before making your purchase. First and foremost, Flipper Zero is a Bluetooth-only device, which means that it cannot be used to hack into networks that are not within close proximity. Flipper One, on the other hand, can be used to hack into both Wi-Fi and Bluetooth networks.</p>
<p>Secondly, Flipper Zero can only be used to crack passwords up to 8 characters in length, while Flipper One can crack passwords up to 12 characters in length. Lastly, Flipper One is equipped with an advanced encryption system that makes it much more difficult for hackers to detect its presence on your network. If you’re looking for the most secure Wi-Fi hacking device available, Flipper One is the better choice.</p>
<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10912" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1024x328.png" alt="" width="640" height="205" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-1024x328.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-300x96.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1-768x246.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/My-project-1.png 1080w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
<h2 class="has-secondary-color has-text-color"><strong>Which device is better for specific purposes?</strong></h2>
<p>Some factors that might help you decide include the range of the device, the type of security it can penetrate, and how easy it is to use.</p>
<p>Flipper One is a good choice for those who need a device with a wide range. It can penetrate most types of security and is relatively easy to use. Flipper Zero is good for those who require a device with a short range or who are looking for greater penetration power. It can penetrate even the most secure networks, but may be more difficult to use than Flipper One.</p>
<h2><strong>Conclusion</strong></h2>
<p>So, which is the best Wi-Fi hacking device? The Flipper Zero or the Flipper One? In our opinion, the Flipper Zero is better because it is easier to use and has longer battery life. Plus, it comes with a money-back guarantee if you’re not satisfied with your purchase. If you want to be able to hack into any Wi-Fi network in no time at all, we recommend purchasing the Flipper Zero.</p>
<p>&nbsp;</p>
<div class="entry-meta"><span class="byline"><span class="screen-reader-text">Posted by</span><span class="author vcard"><a class="url fn n" href="https://digitalnomadhardware.com/author/abdullah/">Muhammad Abdullah</a></span></span></div>
<div><a href="https://digitalnomadhardware.com/flipper-one-vs-flipper-zero/" target="_blank" rel="noopener">source</a></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Making of the First Computer Virus</title>
		<link>https://goodshepherdmedia.net/the-making-of-the-first-computer-virus/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:37:36 +0000</pubDate>
				<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Computer Virus]]></category>
		<category><![CDATA[First]]></category>
		<category><![CDATA[First Computer Virus]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[The Brain Computer Shop]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9511</guid>

					<description><![CDATA[The Making of the First Computer Virus — The🧠Brain Computer Shop &#8211; Pakistan &#160; Amjad Alvi is remembered for writing the first free-range PC virus that went viral in an age before the internet. But he’s done so much more. The first call came late one winter night. A journalist working for a university magazine [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="mceTemp"></div>
<h1 style="text-align: center;">The Making of the First Computer Virus —</h1>
<h2 style="text-align: center;">The<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" />Brain Computer Shop &#8211; Pakistan</h2>
<p>&nbsp;</p>
<div class="row tabletRow">
<div id="t2">
<h3 class="article-description ">Amjad Alvi is remembered for writing the first free-range PC virus that went viral in an age before the internet. But he’s done so much more.</h3>
</div>
</div>
<p dir="ltr">The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy.</p>
<p dir="ltr">“Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.</p>
<p dir="ltr">“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system.</p>
<p dir="ltr">“How the hell did she come across it?” he wondered.</p>
<p dir="ltr">That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan.</p>
<p dir="ltr">It was an era before the internet came to be what we know it as today. Connections between computers were largely limited to scientists and a few research organisations in the United States, Europe and Japan.</p>
<p dir="ltr">Most IBM personal computers ran on MS-DOS and data was stored on 5.25-inch floppy disks, which could store 160 kilobyte of files. It was on one such disk that Amjad had copied the ‘Brain Virus’ or, the Pakistani Brain, which became the first viral computer infestation the world had seen.</p>
<p dir="ltr">Somehow a copy of that floppy found its way to the United States.</p>
<p dir="ltr">The self-replicating virus that automatically copied onto the disks spread like wildfire. Students came across it on disks in the universities of Pittsburgh, Pennsylvania, Delaware and George Washington University.</p>
<p dir="ltr">It slowed systems at the Providence Journal-Bulletin newspaper and popped up in trading terminals in Hong Kong. Users found it on their personal computers in places as far as Australia.</p>
<p dir="ltr">Some <a href="http://www.pirp.harvard.edu/pubs_pdf/bransco/bransco-i89-3.pdf" target="_blank" rel="noopener">estimates</a> suggest that between 1986 and 1989, the Brain Virus hit more than 100,000 computers — 10,000 of them at Washington DC’s Georgetown University alone.</p>
<p dir="ltr">Everyone knew the name of the culprit because Amjad had put his address and phone number in between the code along with this message:</p>
<p dir="ltr">“WELCOME TO DUNGEON&#8230;Beware of this Virus&#8230;Contact Us for Vaccination”</p>
<figure class="content-image">
<p><figure id="attachment_9519" aria-describedby="caption-attachment-9519" style="width: 960px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-9519" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1.jpg" alt="The Pakistani Brain was a sophisticated BOOT virus, which would load onto the PC before the operating system. (TRTWorld)" width="960" height="586" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1-300x183.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1-768x469.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /><figcaption id="caption-attachment-9519" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">The Pakistani Brain was a sophisticated BOOT virus, which would load onto the PC before the operating system. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Brain was a benign virus as it wasn’t written to erase data or damage hardware. However, within a few months it opened the floodgates for newer variants and copycats which applied the same logic as Amjad’s to infiltrate computers and cause widespread damage.</p>
<p dir="ltr">Viral computer infestations jumped tenfold from 3,000 in the first two months of 1988 to around 30,000 in its last two months, a US-based software trade organisation noted at the time.</p>
<p dir="ltr">“We were just showing off our skills to each other and trying to identify vulnerability in the DOS system. I didn’t think it would become so big,” says Amjad.</p>
<p dir="ltr">But big it became. In September 1988, the Alvi brothers were featured in a <em>Time</em> magazine cover story and tech historians still regard their virus as one of the most sophisticated of its time.</p>
<p dir="ltr">No history of computer viruses is complete without mention of the Pakistani Brain. It was the Brain that gave the idea to some programmers to write the first anti-virus software.</p>
<p dir="ltr">Among the people who were awed by the novelty of its code was a software engineer named John McAfee, the eccentric US millionaire and guru of the anti-virus industry. And he called the Alvi brothers geniuses.</p>
<p dir="ltr">“I read a story in San Jose Mercury News and I go ‘how the hell did they do that?’&#8221;</p>
<p dir="ltr">“Nobody had ever thought about using software to act like bacteria and viruses. That’s a genius idea,” he told <em>TRT World</em> in a recent Skype interview.</p>
<p dir="ltr">McAfee, who at the time was running a computer firm Interpath, studied Brain and wrote a programme to counter it.</p>
<p dir="ltr">“I posted it on my electronic bulletin board and two weeks later I had a million users.”</p>
<p dir="ltr">That’s how the famed McAfee, the first commercial antivirus software, was born.</p>
<p dir="ltr">But how did two Pakistanis from Lahore, famous for its food and hospitality, come up with the idea in the first place? How did a young man with no formal education in information technology and no mentor to guide him figure out a complex process to infiltrate computers undetected?</p>
<p dir="ltr"><strong>The boy who bunked school </strong></p>
<p dir="ltr">When it’s time to have fun, most boys in Lahore head to their rooftops to fly kites. Others would go out to play Pakistan’s most popular sport, street-cricket. Amjad Alvi, however, stayed in his room and tinkered with electronic gadgets.</p>
<p dir="ltr">Born in 1962 in a middle-income family, Amjad was the second-youngest of Muhammad Farooq Alvi’s six children. Senior Alvi was a medical doctor who encouraged his kids from an early age to read books and magazines.</p>
<figure class="content-image">
<p><figure id="attachment_9516" aria-describedby="caption-attachment-9516" style="width: 684px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9516" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902.jpg" alt="Amjad Alvi with his brothers at the small workshop that he set up at his father's clinic. (TRTWorld)" width="684" height="482" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902-300x211.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902-768x541.jpg 768w" sizes="(max-width: 684px) 100vw, 684px" /><figcaption id="caption-attachment-9516" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">Amjad Alvi with his brothers at the small workshop that he set up at his father&#8217;s clinic. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>“My father wanted me to become a fighter pilot. When I was 10 years old he bought me two books. One was about airplanes and the other about electronic experiments. I just got into electronics,” Alvi explains.</p>
<p dir="ltr">He vividly recalls the first time he took details and sketches from a how-to book to put together a crystal radio.</p>
<p dir="ltr">“It needed a coil, a gang capacitor, a diode and a headphone. It didn’t need a battery. You just give it earth, attach a long antenna and it catches local transmission,” he told <em>TRT World</em>.</p>
<p dir="ltr">“Same thing prisoners of war made during WWII to know what was happening outside.”</p>
<p dir="ltr">From improvised radios, Amjad moved on to experimenting with walkie-talkies and music synthesisers that involved the use of transistors.</p>
<p dir="ltr">“OC-72. I still remember the transistor number. Finding the components was not always easy.”</p>
<p dir="ltr">Often after school he would scavenge through the narrow lanes of Lahore’s Hall Market where scores of stores sell parts ranging from capacitors to electric switches.</p>
<p dir="ltr">In the 1970s it was a struggle to find electronic parts and even more difficult to get a hold of the right instruction manuals. That’s where the Alvi siblings were lucky.</p>
<p dir="ltr">They had a library membership of the British Council, an initiative of the United Kingdom to impart education in mostly developing countries. That gave Amjad access to journals such as Wireless World and Practical Electronics.</p>
<p dir="ltr">“They didn’t allow you to take anything home from the library. I spent hours copying the descriptions and drawings.”</p>
<p dir="ltr">He often bunked school to come to the library. “That didn’t go down well with my parents once they found out. I was banned from visiting the library for a while.”</p>
<p dir="ltr">In his own words, Amjad was “always a third class student” and failed a calculus exam in college. The method he used to solve an integration problem didn’t go down well with his evaluator. It was not that he didn’t know the answer, he just did it in another way.</p>
<p dir="ltr">Students were supposed to attempt the question based on the standard course book. Amjad relied on a reference from an American book he had come across at the library.</p>
<p dir="ltr">Why else would he fail, he wondered. After all, he never forgot his fifth grade teacher at Saint Andrews school, Miss Benjamin, telling the class on their first day: “Mathematics is the mother of all sciences.”</p>
<p dir="ltr">If you knew that, if you knew the logic that goes into solving a problem, if you had learned about the flip flop in electronic circuitry on your own and you also had a computer, then the possibilities to make things were endless, he says.</p>
<p dir="ltr">“Do you see what I mean by that? With limited resources in Pakistan where it’s difficult to get hold of components, if you had a computer and a bit of imagination, you can do anything.&#8221;</p>
<figure class="content-image">
<p><figure id="attachment_9514" aria-describedby="caption-attachment-9514" style="width: 545px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9514" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211.jpg" alt="John McAfee wrote the antivirus programme after coming across Pakistani Brain in the 1980s. (Getty Images)" width="545" height="375" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211-300x207.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211-768x529.jpg 768w" sizes="(max-width: 545px) 100vw, 545px" /><figcaption id="caption-attachment-9514" class="wp-caption-text"></span> <span style="color: #ff6600;">John McAfee wrote the antivirus programme after coming across Pakistani Brain in the 1980s. (Getty Images)</span></figcaption></figure></figure>
<p>&nbsp;</p>
<p><strong>Love at first sight</strong></p>
<p dir="ltr">Amjad eventually completed his masters in physics from University of Punjab. But having read everything about computers from all the magazines he could get his hands on, he fell in love with the machines.</p>
<p dir="ltr">In the early 80s he came across an advertisement in a newspaper about a local distributor who was selling Sinclair computers.</p>
<p dir="ltr">The Sinclair ZX80 was launched in 1980 by a British company, Science of Cambridge. Though it wasn’t the first personal computer and left users annoyed over its display issues, it came with a price tag of 99 pounds or around $230, the cheapest personal computer to hit the stores.</p>
<p dir="ltr">“That was my first computer. A good thing about it was that it was sold as a do-it-yourself kit. So you’d get to know the ins and outs of the computer,” says Amjad.</p>
<p dir="ltr">Like elsewhere in the world, personal computers such as the IBMs, Commodore 64, RadioShack and Atari were slowly becoming common in Pakistan. Yet there were just a handful of technicians who knew how to repair them.</p>
<p dir="ltr">That’s where Amjad put his electronic know-how to use and carved out a niche market for himself. He opened a makeshift computer repair shop within the premises of his father’s clinic in mid-80s. The business was named Brain Services.</p>
<p dir="ltr">“We’d say Amjad was a brainy kid. That’s how the name stuck,” says Basit, who was 17 at the time.</p>
<p dir="ltr">Very soon the distributors of Sinclair and other brands were referring broken computers to Amjad. “I still have the logs — the record of the computers I serviced. I made good money with that.”</p>
<figure class="content-image">
<p><figure id="attachment_9520" aria-describedby="caption-attachment-9520" style="width: 534px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9520" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005.jpg" alt="The Sinclair ZX80 was cheap and one of its stripped-down version could be assembled by hand. (Getty Images)" width="534" height="383" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005-300x215.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005-768x550.jpg 768w" sizes="(max-width: 534px) 100vw, 534px" /><figcaption id="caption-attachment-9520" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">The Sinclair ZX80 was cheap and one of its stripped-down version could be assembled by hand. (Getty Images)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Over the years, while the story of Brain virus has been told many times, the narrative has missed some key points. Amjad was a pioneer in key IT-related developments in Pakistan.</p>
<p dir="ltr">In 1987, he set up a shop in Singapore to buy monitors, power supply units, processors and motherboards from different companies and assembled them as clones, making Brain among the first suppliers of custom-made computers.</p>
<p dir="ltr">The availability of clones helped many people buy their first computers as they cost much less than branded machines, which were out of reach of many Pakistanis.</p>
<p dir="ltr">Along the way, Amjad honed his programming skills, reading ever-more advanced books and articles in professional journals, mostly to work on mathematical functions.</p>
<p dir="ltr">The first programme to make him money was one designed to convert measuring units. Jewellers and goldsmiths in Lahore had electronic scales which displayed weight in grams and milligrams. But in their daily dealings they relied on Indian units of tola, ratti, and masha.</p>
<p dir="ltr">“I didn’t design the system. I took the idea from somewhere and then built the electronic interface including the port and everything myself,” he said.</p>
<p dir="ltr">By the early 1990s, Brain Services had transformed into Brain NET. Amjad, Basit and their elder brother, Shahid, pitched in whatever capital they had to expand the enterprise. The obvious transition to make was to Bulletin Board Services, which were a sort of an online community before the arrival of the World Wide Web.</p>
<p dir="ltr">They also introduced Pakistan’s first email service around that time. However, the potential customers, who were mostly factory owners, were content with fax machines.</p>
<p dir="ltr">“Our customers would often say, ‘We don’t need to send any communication outside the country, so why bother with email?’ So we built servers and nodes in all the major cities and laid a domestic communication infrastructure. It worked,” says Amjad.</p>
<figure class="content-image">
<p><figure id="attachment_9517" aria-describedby="caption-attachment-9517" style="width: 660px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9517" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957.jpg" alt="Even before he became famous as a co-author of the Pakistani Brain, Amjad was traveling to other countries to buy components for his clone computers. (TRTWorld)" width="660" height="463" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957-300x210.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957-768x538.jpg 768w" sizes="(max-width: 660px) 100vw, 660px" /><figcaption id="caption-attachment-9517" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">Even before he became famous as a co-author of the Pakistani Brain, Amjad was traveling to other countries to buy components for his clone computers. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Brain Net would eventually become one of the first internet service providers in Pakistan.</p>
<p dir="ltr">But what Amjad is remembered for is the computer virus.</p>
<p dir="ltr"><strong>The making of the Brain</strong></p>
<p dir="ltr">The jury is still out on the question of who wrote the first computer virus.</p>
<p dir="ltr">Most researchers say it was Richard Skrenta who in 1982 as a 15-year-old high school student pranked his friends with Elk Cloner, probably the first self-replicating programme.</p>
<p dir="ltr">Elk Cloner spread via gaming disks, which Skrenta, who is now a tech entrepreneur, loaned to his friends. It slowed down their Apple IIs or abruptly shut the systems.</p>
<p dir="ltr">The moniker, virus, was conceived a year later in 1983 by professor Len Adleman for a programme that his student <a href="http://all.net/books/virus/part5.html" target="_blank" rel="noopener">Fred Cohen</a> wrote.</p>
<p dir="ltr">Cohen demonstrated the ability of his code at a security conference in Pennsylvania. That virus, which could spread through bulletin boards, was able to give Cohen control of a mainframe computer within minutes. His experiment is well <a href="https://www.wired.com/2009/11/1110fred-cohen-first-computer-virus/" target="_blank" rel="noopener">documented</a>.</p>
<p dir="ltr">There’s also Creeper and the famous Core War game from the mid-1970s, which was famously <a href="http://www.koth.org/info/akdewdney/First.htm" target="_blank" rel="noopener">featured</a> in <em>Scientific American </em>and gave the world a peek into what the rogue programmes can do.</p>
<p dir="ltr">Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit.</p>
<p dir="ltr">In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “<a href="http://content.time.com/time/specials/packages/article/0,28804,1839579_1839578_1839526,00.html" target="_blank" rel="noopener">Cookie</a>”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away.</p>
<p dir="ltr">Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes.</p>
<p dir="ltr">If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself.</p>
<p dir="ltr">“Initially DOS didn’t give you the option of multitasking. Then they included a new procedure in the code called Terminate and Stay Resident, which basically allowed you to push a programme to the background and pull it back without terminating it,” said Amjad.</p>
<figure class="content-image">
<p><figure id="attachment_9518" aria-describedby="caption-attachment-9518" style="width: 640px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-large wp-image-9518" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-949x1024.jpg" alt="Some experts say it was Richard Skrenta who wrote the first computer virus in early 1980s. (AP)" width="640" height="691" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-949x1024.jpg 949w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-278x300.jpg 278w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-768x829.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012.jpg 960w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption id="caption-attachment-9518" class="wp-caption-text"><span style="color: #ff6600;">Some experts say it was Richard Skrenta who wrote the first computer virus in early 1980s. (AP)</span></figcaption></figure><figcaption></figcaption></figure>
<p>Brain was a BOOT Sector Virus and loaded onto the computer from the infected floppy when it was switched on — without the user ever finding out.</p>
<p dir="ltr">What made Brain unique was its ability to load into the computer even before the operating system.</p>
<p dir="ltr">“It was seen as sophisticated for its time by the use of relocation of the boot sector rather than overwriting it, and by marking the moved boot sector as unavailable on the disk,” Gene Spafford, a cyber security expert, told <em>TRT World</em>.</p>
<p dir="ltr">The Brain in its original form was not meant to erase data or even slow down machines. It was simply a way for Amjad and his brother to keep track of who was using their software.</p>
<p dir="ltr">“An NGO wanted us to write a patient management programme. But they were paying us very little. So I copied Brain on to their floppy and explicitly told them not to give it to anyone,” says Amjad.</p>
<p dir="ltr">Despite his warning the infected floppy was apparently shared, copied and the virus started to move and take on a life of its own.</p>
<p dir="ltr">Brain was quickly followed by far more lethal programmes and the Alvi brothers moved on to focus on their internet service and telecommunication applications.</p>
<p dir="ltr">McAfee doesn’t believe that Elk Cloner or Cohen’s virus were the first. He made a fortune from McAfee AntiVirus and was estimated to be worth $100 million before the 2007 financial crash.</p>
<p dir="ltr">He has done a lot over the years — built mansions in the US, tried to make natural antibiotics, ran a cybersecurity firm and ventured into the business of cryptocurrencies.</p>
<p dir="ltr">But his view on the Brain hasn’t altered.</p>
<p dir="ltr">“(The) first virus was the Pakistani Brain. Trust me. There were no viruses before. The word had not even been invented. No one was discussing it or writing about it or considering it. It was not an idea that could come into your brain if you had not seen it.”</p>
<div class="article-source">by <a href="https://www.trtworld.com/author/saadhasan">SAAD HASAN</a> Source: <a href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" target="_blank" rel="noopener">TRT World</a></div>
<div></div>
<div></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div>
<div id="nomobile">
<div class="container">
<div class="thumb tright">
<div class="thumbinner">
<h1 id="firstHeading" class="firstHeading" lang="en"><img loading="lazy" decoding="async" class="size-large wp-image-9521 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-1024x440.png" alt="" width="640" height="275" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-1024x440.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-300x129.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-768x330.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805.png 1140w" sizes="(max-width: 640px) 100vw, 640px" />Brain PC Virus</h1>
<p><i><b>updated:</b> May 1st, 2022</i></p>
<div class="thumbcaption">
<div>Brain; written in 1983;<sup id="cite_ref-Dooley_2018_p._217_1-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Dooley_2018_p._217-1">[1]</a></sup> released in 1986. Detected in 1986 or 1987. It inspired the creation of over 1,000 different viruses.<sup id="cite_ref-PC_Mag_p._32_2-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-PC_Mag_p._32-2">[2]</a></sup> It was also the first virus to cause a pandemic.<sup id="cite_ref-Elzembely_Aysha_2022_p._272_3-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Elzembely_Aysha_2022_p._272-3">[3]</a></sup></div>
</div>
</div>
</div>
<ul>
<li><b>Virus</b>—Brain <small>(aka <i>&#8220;Pakistani&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Pakistani Brain&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;BRAIN&#8221;</i>,<sup id="cite_ref-Tipton_Nozaki_2016_p._259_5-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Nozaki_2016_p._259-5">[5]</a></sup><i>&#8220;(c)BRAIN&#8221;</i>,<sup id="cite_ref-Tipton_Nozaki_2016_p._259_5-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Nozaki_2016_p._259-5">[5]</a></sup><i>&#8220;Pakistani Flu&#8221;</i>, <i>&#8220;Basit&#8221;</i>, <i>&#8220;Lahore&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Ashar&#8221;</i><sup id="cite_ref-Tipton_Krause_2003_p._1268_4-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Y.C.1.E.R.P.&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Ohio&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Den Zuk&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Venezualan&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Search&#8221;</i><sup id="cite_ref-Tipton_Krause_2003_p._1268_4-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Nipper&#8221;</i>,<sup id="cite_ref-Grimes_2001_p._6_6-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup><i>&#8220;Clone&#8221;</i><sup id="cite_ref-Grimes_2001_p._6_6-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup> and <i>&#8220;Dungeon&#8221;</i><sup id="cite_ref-Grimes_2001_p._6_6-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup>)</small> was the world&#8217;s first PC virus (<small>although it is argued it isn&#8217;t the first generic <i>computer</i> virus ever; as it isn&#8217;t entirely clear based on the definition—the other contenders being <i>&#8220;Elk Cloner&#8221;</i> and <i>&#8220;Creeper&#8221;</i><sup id="cite_ref-Willems_2019_p._3_7-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Willems_2019_p._3-7">[7]</a></sup></small>). This is why some have stated <i>&#8220;[t]he Brain virus of 1986 is often identified erroneously as the <b>first virus ever discovered.</b>..although Brain was the first PC virus&#8221;</i>.<sup id="cite_ref-Burkey_Breakfield_2000_p._349_8-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-8">[8]</a></sup> What is clear—besides being the <b>first PC virus</b>—Brain was also the <b>first stealth virus</b>.<sup id="cite_ref-Burkey_Breakfield_2000_p._349_8-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-8">[8]</a></sup><sup id="cite_ref-Burkey_Breakfield_2000_p._349-350_9-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-350-9">[9]</a></sup><sup id="cite_ref-10" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-10">[n. 1]</a></sup><sup id="cite_ref-Ferbrache_2012_p._11_11-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ferbrache_2012_p._11-11">[10]</a></sup><sup id="cite_ref-12" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-12">[n. 2]</a></sup>
<ul>
<li>Brain was the first virus to pass from PC to PC.<sup id="cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Contesti_Andre_Henry_Goins_2007_p._380-13">[11]</a></sup> And unlike previous viruses, Brain was the <b>first to cause a virus pandemic</b>.<sup id="cite_ref-Elzembely_Aysha_2022_p._272_3-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Elzembely_Aysha_2022_p._272-3">[3]</a></sup> In 1990, it was reported that 7% of all reported infection incidents were caused by Brain.<sup id="cite_ref-Ferbrache_2012_p._11_11-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ferbrache_2012_p._11-11">[10]</a></sup> More damaging was the fact that between the release of Brain in 1986 and 1992, over 1,000 different viruses were born,<sup id="cite_ref-PC_Mag_p._32_2-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-PC_Mag_p._32-2">[2]</a></sup> many likely inspired by the success of Brain.</li>
<li>However, there exists contradictory information on how damaging Brain was; some have claimed it harmless, others that it&#8217;s damage is minimal,<sup id="cite_ref-Gregg_2008_p._261_14-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> whereas others still have stated it could delete vast swathes of information.<sup id="cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Pieprzyk_Hardjono_Seberry_2003_p._611-15">[13]</a></sup><sup id="cite_ref-Computerworld_p._10_16-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Computerworld_p._10-16">[14]</a></sup> Others still yet say it only damaged the floppy disks it was found on.<sup id="cite_ref-Salomon_2010_p._138_17-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Salomon_2010_p._138-17">[15]</a></sup> These contradictions can&#8217;t really be explained, as it seems to have depended on the individual machine.</li>
</ul>
</li>
<li>The virus spread from Lahore, Pakistan, where it was found on expensive and popular software floppy disks sold cheaply to tourists (<small>another source states it was given to one of the writers of the virus&#8217;s friend, who had been given it on a disk and who had taken it to the US</small><sup id="cite_ref-Edgar_2002_p._225_18-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup>).<sup id="cite_ref-Salomon_2010_p._138_17-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Salomon_2010_p._138-17">[15]</a></sup> The virus was first created in 1983,<sup id="cite_ref-Dooley_2018_p._217_1-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Dooley_2018_p._217-1">[1]</a></sup> although some state 1986<sup id="cite_ref-Stavroulakis_Stamp_2010_p._527_19-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Stavroulakis_Stamp_2010_p._527-19">[17]</a></sup><sup id="cite_ref-Journal_of_Information_Ethics_1995_p._51_20-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Journal_of_Information_Ethics_1995_p._51-20">[18]</a></sup> (this was also the year the writers were also first contacted<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup><sup id="cite_ref-22" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-22">[n. 3]</a></sup>); others say it was first detected on October 22nd, 1987 by the University of Delaware<sup id="cite_ref-Feudo_1992_p._97_23-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Feudo_1992_p._97-23">[20]</a></sup><sup id="cite_ref-24" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-24">[n. 4]</a></sup> where it had rendered 1% of it&#8217;s disks unusable and destroyed one students thesis,<sup id="cite_ref-Edgar_2002_p._225_18-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup> and also had the <i>&#8220;unwanted side effect&#8221;</i> of accidentally overwriting parts of some of the disks it entered.<sup id="cite_ref-Edgar_2002_p._225_18-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup>
<ul>
<li>This subsequently inspired <i>Time Magazine</i> to cover the virus in their article <i>&#8220;Invasion of the Data Snatchers!&#8221;</i>,<sup id="cite_ref-Edgar_2002_p._225_18-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup> which brought Brain (and other viruses) into mainstream infamy.</li>
</ul>
</li>
</ul>
<div class="thumb tleft">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>This image shows where the cylinder, head (also known as <i>&#8220;side&#8221;</i>) and sector are on a disk.<sup id="cite_ref-Paul_Sheer_.282002.29._25-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Paul_Sheer_.282002.29.-25">[21]</a></sup></div>
</div>
</div>
</div>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<ul>
<li>Brain was a virus that was ingenious in many ways; for instance it&#8217;s code was surprisingly larger than the boot sector itself (despite it being a boot sector virus—it would be similar to having a human hosting a virus several times their size),<sup id="cite_ref-Gregg_2008_p._261_14-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> so how it hid there (and for how long) was an incredulous feat. In fact in 1992, the National Computer Security Association (NCSA) stated in their <i>&#8220;Executive Guide to Computer Viruses&#8221;</i> that it was <i>&#8220;one of the best written viruses ever&#8221;</i>.<sup id="cite_ref-Ritstein_1992_p._8_26-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> In order to understand the level of complexity involved in it&#8217;s design, the nature of the boot sector itself must be explored, and it&#8217;s relationship with the rest of the system on the hard disk (the latter is where computer information is stored).
<ul>
<li>A boot sector is a part of the computer that the BIOS checks when a system is being started up (it is the first sector found on a disk, and is located at cylinder 0, head 0, sector 1).<sup id="cite_ref-Gregg_2008_p._261_14-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> A system that boots looks for this file to execute what is known as the boot process.<sup id="cite_ref-Gregg_2008_p._261_14-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> When found, important files core to the operation of a computer load up (such as <i>io.sys</i>, <i>command.com</i>, <i>config.sys</i> and <i>autoexec.bat</i>).<sup id="cite_ref-Gregg_2008_p._261_14-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup></li>
<li>The virus&#8217;s writers got around the size limitation by storing the first 512 bytes (0.5 Kb) of the code in the boot sector,<sup id="cite_ref-Gregg_2008_p._261_14-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> and then stored the rest of the code in six different areas on a 360K floppy disk<sup id="cite_ref-Ritstein_1992_p._8_26-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> (at the time the floppy disks—which were 5.25 inches in size—could store 160 Kb of information<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>).<sup id="cite_ref-Gregg_2008_p._261_14-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> The boot sector has always been 512 bytes, and only in 2011 did it change to 4096 bytes (~4 Kb).<sup id="cite_ref-Clarke_Tryfonas_2011_p._70_27-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Clarke_Tryfonas_2011_p._70-27">[23]</a></sup></li>
</ul>
</li>
<li>The virus operated by taking over the boot sector in the disk.<sup id="cite_ref-Ritstein_1992_p._8_26-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> It moved the original boot sector to another location, and marked it as <i>&#8220;bad&#8221;</i> in the file allocation table (also known as <i>&#8220;FAT&#8221;</i>) of the disk.<sup id="cite_ref-Ritstein_1992_p._8_26-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> This causes the DOS to ignore it entirely (it neither shows it as a directory or attempts to write to it or erase or overwrite it).<sup id="cite_ref-Ritstein_1992_p._8_26-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> However the virus itself will still redirect all requests the computer makes to the original boot sector (hence masking the viruses location).<sup id="cite_ref-Ritstein_1992_p._8_26-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> In this way the virus is said to <i>&#8220;firmly&#8221;</i> stay in control of the machine.<sup id="cite_ref-Ritstein_1992_p._8_26-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> Additionally, any uninfected disk that accesses the infected machine will become infected.<sup id="cite_ref-Ritstein_1992_p._8_26-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> The virus also relabels the diskette to read <i>&#8220;(c)Brain&#8221;</i>.<sup id="cite_ref-Ritstein_1992_p._8_26-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup></li>
</ul>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
<div class="thumb tright">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>The message that has since become legendary in computing history.</div>
</div>
</div>
</div>
<ul>
<li>One of the curious aspects of the virus is that it is the only virus in history where the authors explicitly stated their name and address in the code.<sup id="cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Price_Waterhouse_.28Firm.29_1989_p._5-28">[24]</a></sup><sup id="cite_ref-29" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-29">[n. 5]</a></sup><sup id="cite_ref-Schnoll_2004_p._38_30-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Schnoll_2004_p._38-30">[25]</a></sup> Indeed, as well as carrying out the functions described above, the virus comes with a message which has since become legendary amongst computer historians; it reads <small><i><b>&#8220;Welcome to the Dungeon (c) 1986 Basit &amp; Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,443248,280530. Beware of this VIRUS&#8230;. Contact us for vaccination&#8230;&#8230;&#8230;&#8230; $#@%$@!!&#8221;</b></i></small>.<sup id="cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Mikko_Hypponen_.28Unknown_Date2.29.-31">[26]</a></sup> The first person to contact them was a journalist in the winter of 1986.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>
<ul>
<li>Between 1986 and 1989 the virus was estimated to have hit 100,000 machines worldwide.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> It could be found in the universities of the US, trading terminals in Hong Kong and as far away as Australia.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> In 1991 it had infected over 250,000 computers.<sup id="cite_ref-RussellGangemi1991_32-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-RussellGangemi1991-32">[27]</a></sup> This was all the more amazing considering <i>&#8220;[c]onnections between computers were largely limited to scientists and a few research organisations in the United States, Europe and Japan&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> This promptly inspired John McAfee (1945—2021) to write the world&#8217;s first antivirus software programme, <i>VirusScan</i>.<sup id="cite_ref-McAfeeHistory_33-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-McAfeeHistory-33">[28]</a></sup> He later sold it to Intel many years later for US$7.6 billion dollars.<sup id="cite_ref-bbcnewsjohnmcafeedead_34-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-bbcnewsjohnmcafeedead-34">[29]</a></sup>
<ul>
<li>Interestingly, when questioned on whether Elk Cloner or Brain (or indeed others) was the first actual virus, McAfee emphasised <i>&#8220;(The) first virus was the Pakistani Brain. Trust me. There were no viruses before. The word had not even been invented. No one was discussing it or writing about it or considering it. It was not an idea that could come into your brain if you had not seen it&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> Indeed his view <i>&#8220;hasn’t altered&#8230;[he] doesn’t believe that Elk Cloner or Cohen’s virus were the first&#8221;</i> as some claim.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup></li>
</ul>
</li>
</ul>
</li>
</ul>
<div class="thumb tleft">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>Floppy disks were a popular means of storage in the 1980s/1990s. Japan&#8217;s Tokyo government still used them until 2021.<sup id="cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Hanako_Montgomery_.28November_29th.2C_2021.29.-35">[30]</a></sup> Brain stopped spreading after the introduction of 5.25&#8243; floppy disks vs 3.5&#8243; type.</div>
</div>
</div>
</div>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<ul>
<li>The virus was created by Amjad Alvi (b. 1962<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>) and Basit Alvi (b. 1969), though it was largely Amjad&#8217;s idea.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-9" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> The idea grew out of an interest in tinkering around with bits of code,<sup id="cite_ref-36" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-36">[n. 6]</a></sup> but the push was when the brothers were commissioned to design a programme (a heart monitor according to Norton,<sup id="cite_ref-norton_37-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-norton-37">[31]</a></sup> but according to the brothers it was a patient management programme<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-10" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>) that they truly became motivated enough to put it out into the wild. They were worried their work would be pirated by their client (who also wasn&#8217;t paying them enough) despite being explicitly told not to do so.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-11" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> Accordingly, <i>&#8220;[d]espite his warning the infected floppy was apparently shared, copied and the virus started to move and take on a life of its own&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-12" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>
<ul>
<li>Ironically, despite their creation arising out of their frustrations with piracy, the brothers themselves pirated software. According to <i>Time</i>, <small><i>&#8220;[t]he irony is that the Alvi brothers were selling pirated software themselves—programs that “cost several hundred dollars in the U.S., for as little as $1.50 each.” And they even laced some of the pirated copies of the software they were selling with viruses as well—but only&#8230;to foreigners&#8221;</i></small>.<sup id="cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">[32]</a></sup> They eventually stopped selling contaminated software in 1987.<sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">[33]</a></sup> The virus&#8217;s spread itself was also stopped when the 3.5 inch floppies it was usually found on were replaced with the newer 5.25 inch types.<sup id="cite_ref-Moore_2014_p._39_40-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Moore_2014_p._39-40">[34]</a></sup></li>
<li>The brothers justified it by quite openly stating; <i>&#8220;[w]hen Pakistanis came in for, say, Lotus 1-2-3, they were sold clean, uncontaminated copies. But foreigners, particularly Americans, were given virus-ridden versions. Why the special treatment for outsiders? The brothers’ somewhat confused rationalization hinges on a loophole in Pakistani law. According to Basit, copyright protection in Pakistan does not extend to computer software. Therefore, he says, it is not illegal for local citizens to trade in bootleg disks; technically, they are not engaged in software piracy. Then why infect American buyers? ‘Because you are pirating,’ says Basit. ‘You must be punished&#8217;”&#8221;</i>.<sup id="cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">[32]</a></sup><sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291-41">[35]</a></sup><sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">[33]</a></sup> Their business is still in operation today.<sup id="cite_ref-contactusbrain_42-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-contactusbrain-42">[36]</a></sup><sup id="cite_ref-43" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-43">[n. 7]</a></sup></li>
</ul>
</li>
</ul>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
<div class="floatright"></div>
</div>
</div>
<h2><span id="Sources" class="mw-headline">Sources</span></h2>
<h3><span id="Footnotes" class="mw-headline">Footnotes</span></h3>
<div class="reflist4">
<div>
<p>&nbsp;</p>
<div class="reflist columns references-column-count references-column-count-3">
<ol class="references">
<li id="cite_note-10"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-10">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus introduced the concept of stealth to the computing public. A stealth virus hides the changes that it makes to an infected system. For example, if a full-stealth virus infects the boot sector of a diskette, a reading of that boot sector on an infected system will return the original contents of the boot sector, not the virus code. Similarly, changes to the amount of free memory or to the length of infected files can be disguised. After the stealth virus, the next technical innovations in viruses were encryption and polymorphism&#8221;</i>.</span>
<ol>
<li>Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</li>
</ol>
</li>
<li id="cite_note-12"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-12">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The virus was also the first case of limited camouflage being employed. When the virus was active in memory no alteration of the boot sector (from its standard value) could be detected&#8221;</i>.</span>
<ol>
<li>Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</li>
</ol>
</li>
<li id="cite_note-22"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-22">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy. “Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system. “How the hell did she come across it?” he wondered. That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-24"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-24">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus was the first virus to infect computer systems in the United States . It was first detected at the University of Delaware in Newark in October 1987&#8221;</i>.</span>
<ol>
<li>Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</li>
</ol>
</li>
<li id="cite_note-29"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-29">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;It is the only virus yet discovered that includes the valid names addresses and phone numbers of the original perpetrators&#8221;</i>.</span>
<ol>
<li>Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</li>
</ol>
</li>
<li id="cite_note-36"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-36">^</a> <span class="reference-text"><b>Quote:</b><i>&#8220;Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit. In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “Cookie”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away. Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes. If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-43"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-43">^</a> <span class="reference-text">Their website is still active as of April 28th, 2022.</span>
<ol>
<li><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</li>
</ol>
</li>
<li id="cite_note-44"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-44">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus introduced the concept of stealth to the computing public. A stealth virus hides the changes that it makes to an infected system. For example, if a full-stealth virus infects the boot sector of a diskette, a reading of that boot sector on an infected system will return the original contents of the boot sector, not the virus code. Similarly, changes to the amount of free memory or to the length of infected files can be disguised. After the stealth virus, the next technical innovations in viruses were encryption and polymorphism&#8221;</i>.</span>
<ol>
<li>Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</li>
</ol>
</li>
<li id="cite_note-45"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-45">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The virus was also the first case of limited camouflage being employed. When the virus was active in memory no alteration of the boot sector (from its standard value) could be detected&#8221;</i>.</span>
<ol>
<li>Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</li>
</ol>
</li>
<li id="cite_note-46"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-46">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy. “Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system. “How the hell did she come across it?” he wondered. That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-47"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-47">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus was the first virus to infect computer systems in the United States . It was first detected at the University of Delaware in Newark in October 1987&#8221;</i>.</span>
<ol>
<li>Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</li>
</ol>
</li>
<li id="cite_note-48"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-48">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;It is the only virus yet discovered that includes the valid names addresses and phone numbers of the original perpetrators&#8221;</i>.</span>
<ol>
<li>Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</li>
</ol>
</li>
<li id="cite_note-49"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-49">^</a> <span class="reference-text"><b>Quote:</b><i>&#8220;Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit. In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “Cookie”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away. Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes. If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-50"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-50">^</a> <span class="reference-text">Their website is still active as of April 28th, 2022.</span>
<ol>
<li><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</li>
</ol>
</li>
</ol>
</div>
<p>&nbsp;</p>
</div>
</div>
<h3><span id="References" class="mw-headline">References</span></h3>
<div class="reflist4">
<div>
<p>&nbsp;</p>
<div class="reflist columns references-column-count references-column-count-3">
<ol class="references">
<li id="cite_note-Dooley_2018_p._217-1">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-3"><sup>d</sup></a> <span class="reference-text">Dooley, J.F. (2018). <i><a class="external text" href="https://books.google.co.uk/books?id=q61qDwAAQBAJ&amp;pg=PA217&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjLtPLGxtX2AhWQY8AKHQl8B4w4KBDoAXoECAsQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms</a></i>. History of Computing. Springer International Publishing. p. 217. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783319904436">ISBN 978-3-319-90443-6</a>.</span></li>
<li id="cite_note-PC_Mag_p._32-2">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-3"><sup>d</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=a2YTCyIAwwIC&amp;pg=PP32&amp;dq=Brain+PC+virus&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAQQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">PC Mag</a></i>. March 31st, 1992. Ziff Davis, Inc. p. 32. ISSN 0888-8507.</span></li>
<li id="cite_note-Elzembely_Aysha_2022_p._272-3">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-3"><sup>d</sup></a> <span class="reference-text">Elzembely, H.A.I.; Aysha, E.E.D. (2022). <i><a class="external text" href="https://books.google.co.uk/books?id=IwZlEAAAQBAJ&amp;pg=PA272&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAMQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Arab and Muslim Science Fiction: Critical Essays</a></i>. Critical Explorations in Science Fiction and Fantasy. McFarland, Incorporated, Publishers. p. 272. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781476685236">ISBN 978-1-4766-8523-6</a>.</span></li>
<li id="cite_note-Tipton_Krause_2003_p._1268-4">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-17"><sup>r</sup></a> <span class="reference-text">Tipton, H.F.; Krause, M. (2003). <i><a class="external text" href="https://books.google.co.uk/books?id=96BbTjHBpOQC&amp;pg=PA1268&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgFEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Information Security Management Handbook, Fifth Edition</a></i>. Taylor &amp; Francis. p. 1268. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203325438">ISBN 978-0-203-32543-8</a>.</span></li>
<li id="cite_note-Tipton_Nozaki_2016_p._259-5">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-3"><sup>d</sup></a> <span class="reference-text">Tipton, H.F.; Nozaki, M.K. (2016). <i><a class="external text" href="https://books.google.co.uk/books?id=0S_3DwAAQBAJ&amp;pg=PA259&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Information Security Management Handbook, Volume 6</a></i>. CRC Press. p. 259. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781439893159">ISBN 978-1-4398-9315-9</a>.</span></li>
<li id="cite_note-Grimes_2001_p._6-6">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-5"><sup>f</sup></a> <span class="reference-text">Grimes, R.A. (2001). <i><a class="external text" href="https://books.google.co.uk/books?id=1HYlDwAAQBAJ&amp;pg=PA6&amp;dq=first+and+only+virus+name+and+address+brain&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwj6hIaNk9z2AhWxQEEAHVCnA1YQ6AF6BAgJEAI#v=onepage&amp;q=first%20and%20only%20virus%20name%20and%20address%20brain&amp;f=false" rel="nofollow">Malicious Mobile Code: Virus Protection for Windows</a></i>. O&#8217;Reilly Media. p. 6. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781491994719">ISBN 978-1-4919-9471-9</a>.</span></li>
<li id="cite_note-Willems_2019_p._3-7">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Willems_2019_p._3_7-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Willems_2019_p._3_7-1"><sup>b</sup></a> <span class="reference-text">Willems, E. (2019). <i><a class="external text" href="https://books.google.co.uk/books?id=dcOWDwAAQBAJ&amp;pg=PA3&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Cyberdanger: Understanding and Guarding Against Cybercrime</a></i>. Springer International Publishing. p. 3. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783030045319">ISBN 978-3-030-04531-9</a>.</span></li>
<li id="cite_note-Burkey_Breakfield_2000_p._349-8">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-3"><sup>d</sup></a> <span class="reference-text">Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</span></li>
<li id="cite_note-Burkey_Breakfield_2000_p._349-350-9">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349-350_9-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349-350_9-1"><sup>b</sup></a> <span class="reference-text">Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</span></li>
<li id="cite_note-Ferbrache_2012_p._11-11">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-3"><sup>d</sup></a> <span class="reference-text">Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</span></li>
<li id="cite_note-Contesti_Andre_Henry_Goins_2007_p._380-13">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-1"><sup>b</sup></a> <span class="reference-text">Contesti, D.L.; Andre, D.; Henry, P.A.; Goins, B.A.; Waxvik, E.; Tipton, H.F. (2007). <i><a class="external text" href="https://books.google.co.uk/books?id=Jt1meI49yTwC&amp;pg=PA380&amp;dq=brain+pc+virus+1984&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjhr5bcj9X2AhURXsAKHQiaDSQQ6AF6BAgIEAI#v=onepage&amp;q=brain%20pc%20virus%201984&amp;f=false" rel="nofollow">Official (ISC)2 Guide to the SSCP CBK</a></i>. (ISC)2 Press. CRC Press. p. 380. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203331576">ISBN 978-0-203-33157-6</a>.</span></li>
<li id="cite_note-Gregg_2008_p._261-14">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-13"><sup>n</sup></a> <span class="reference-text">Gregg, M. (2008). <i><a class="external text" href="https://books.google.co.uk/books?id=V5CiOVGr-JoC&amp;pg=PA261&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAgQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Build Your Own Security Lab: A Field Guide for Network Testing</a></i>. Wiley. p. 261. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780470379486">ISBN 978-0-470-37948-6</a>.</span></li>
<li id="cite_note-Pieprzyk_Hardjono_Seberry_2003_p._611-15">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-1"><sup>b</sup></a> <span class="reference-text">Pieprzyk, J.; Hardjono, T.; Seberry, J. (2003). <i><a class="external text" href="https://books.google.co.uk/books?id=NH-m8L0R3rYC&amp;pg=PA611&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAsQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Fundamentals of Computer Security</a></i>. Monographs in theoretical computer science. Springer Berlin Heidelberg. p. 611. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783540431015">ISBN 978-3-540-43101-5</a>.</span></li>
<li id="cite_note-Computerworld_p._10-16">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Computerworld_p._10_16-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Computerworld_p._10_16-1"><sup>b</sup></a> <span class="reference-text">Alexander, Michael (November 13th, 1989). <i><a class="external text" href="https://books.google.co.uk/books?id=_8Id5on7xmkC&amp;pg=PA10&amp;dq=Brain+PC+virus&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAIQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Computerworld</a></i>. IDG Enterprise. p. 10. ISSN 0010-4841.</span></li>
<li id="cite_note-Salomon_2010_p._138-17">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-3"><sup>d</sup></a> <span class="reference-text">Salomon, D. (2010). <i><a class="external text" href="https://books.google.co.uk/books?id=vyyoPz9OKfcC&amp;pg=PA138&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwi5vPTYw9X2AhXLYcAKHYghAE84HhDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Elements of Computer Security</a></i>. Undergraduate Topics in Computer Science. Springer London. p. 138. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780857290069">ISBN 978-0-85729-006-9</a>.</span></li>
<li id="cite_note-Edgar_2002_p._225-18">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-7"><sup>h</sup></a> <span class="reference-text">Edgar, S.L. (2002). <i><a class="external text" href="https://books.google.co.uk/books?id=CWLyryduwMYC&amp;pg=PA225&amp;dq=brain+virus+detected+1987&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwj54vqYyNX2AhXbPsAKHX1NDkMQ6AF6BAgDEAI#v=onepage&amp;q=brain%20virus%20detected%201987&amp;f=false" rel="nofollow">Morality and Machines: Perspectives on Computer Ethics</a></i>. Computer Ethics Series. Jones and Bartlett Publishers. p. 225. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780763717674">ISBN 978-0-7637-1767-4</a>.</span></li>
<li id="cite_note-Stavroulakis_Stamp_2010_p._527-19">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Stavroulakis_Stamp_2010_p._527_19-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Stavroulakis_Stamp_2010_p._527_19-1"><sup>b</sup></a> <span class="reference-text">Stavroulakis, P.; Stamp, M. (2010). <i><a class="external text" href="https://books.google.co.uk/books?id=I-9P1EkTkigC&amp;pg=PA527&amp;dq=brain+virus+%22created+in+1986%22&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwi75YG767X3AhXLbMAKHUHrBjY4ChDoAXoECAgQAg#v=onepage&amp;q=brain%20virus%20%22created%20in%201986%22&amp;f=false" rel="nofollow">Handbook of Information and Communication Security</a></i>. Handbook of Information and Communication Security. Springer Berlin Heidelberg. p. 527. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783642041174">ISBN 978-3-642-04117-4</a>.</span></li>
<li id="cite_note-Journal_of_Information_Ethics_1995_p._51-20">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Journal_of_Information_Ethics_1995_p._51_20-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Journal_of_Information_Ethics_1995_p._51_20-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=NTIPAQAAMAAJ&amp;q=brain+virus+%22created%22+1986&amp;dq=brain+virus+%22created%22+1986&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwirtfmB67X3AhVPQ0EAHR2sDbw4HhDoAXoECAgQAg" rel="nofollow">Journal of Information Ethics</a></i>. Vol. 4-5; Vol. 4. McFarland &amp; Company. 1995. p. 51. Retrieved 2022-04-28.</span></li>
<li id="cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-17"><sup>r</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-18"><sup>s</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-19"><sup>t</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-20"><sup>u</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-21"><sup>v</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-22"><sup>w</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-23"><sup>x</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-24"><sup>y</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-25"><sup>z</sup></a> <span class="reference-text">Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</span></li>
<li id="cite_note-Feudo_1992_p._97-23">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Feudo_1992_p._97_23-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Feudo_1992_p._97_23-1"><sup>b</sup></a> <span class="reference-text">Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</span></li>
<li id="cite_note-Paul_Sheer_.282002.29.-25">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Paul_Sheer_.282002.29._25-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Paul_Sheer_.282002.29._25-1"><sup>b</sup></a> <span class="reference-text">Paul Sheer (2002). <i><a class="external text" href="https://www.physics.udel.edu/~bnikolic/teaching/phys660/RUTE/rute/node22.html#SECTION002211000000000000000" rel="nofollow">19. Partitions, File Systems, Formatting, Mounting</a></i>. University of Delaware. <i><a class="external text" href="https://web.archive.org/web/20210425184043/https://www.physics.udel.edu/~bnikolic/teaching/phys660/RUTE/rute/node22.html" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/hmZlM" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Ritstein_1992_p._8-26">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-17"><sup>r</sup></a> <span class="reference-text">Ritstein, C. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=iXBXgPqwkJIC&amp;pg=PA8&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwjAvc_Z4_zTAhXnIJoKHSuXA5sQ6AEIMTAC#v=onepage&amp;q=%22one%20of%20the%20best%20written%20viruses%20ever%22&amp;f=false" rel="nofollow">Executive Guide to Computer Viruses</a></i>. Diane Publishing Company. p. 8. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781568062518">ISBN 978-1-56806-251-8</a>.</span></li>
<li id="cite_note-Clarke_Tryfonas_2011_p._70-27">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Clarke_Tryfonas_2011_p._70_27-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Clarke_Tryfonas_2011_p._70_27-1"><sup>b</sup></a> <span class="reference-text">Clarke, N.; Tryfonas, T. (2011). <i><a class="external text" href="https://books.google.co.uk/books?id=k6pGAwAAQBAJ&amp;pg=PA70&amp;dq=boot+sector+size+512&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjB9fiyr9j2AhVMQUEAHc_aCxIQ6AF6BAgDEAI#v=onepage&amp;q=boot%20sector%20size%20512&amp;f=false" rel="nofollow">Proceedings of the Sixth International Workshop on Digital Forensics and Incident Analysis (WDFIA 2011)</a></i>. University of Plymouth. p. 70. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781841022857">ISBN 978-1-84102-285-7</a>.</span></li>
<li id="cite_note-Price_Waterhouse_.28Firm.29_1989_p._5-28">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-1"><sup>b</sup></a> <span class="reference-text">Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</span></li>
<li id="cite_note-Schnoll_2004_p._38-30">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Schnoll_2004_p._38_30-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Schnoll_2004_p._38_30-1"><sup>b</sup></a> <span class="reference-text">Schnoll, S. (2004). <i><a class="external text" href="https://books.google.co.uk/books?id=jhrCcsDnTKwC&amp;pg=PA38&amp;dq=Brain+%22only+virus%22+name+and+address&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjP57O-8rX3AhXGilwKHeS4BywQ6AF6BAgIEAI#v=onepage&amp;q=Brain%20%22only%20virus%22%20name%20and%20address&amp;f=false" rel="nofollow">Microsoft Exchange Server 2003 Distilled</a></i>. The Addison-Wesley Microsoft Technology Series (in Danish). Addison-Wesley. p. 38. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780321245922">ISBN 978-0-321-24592-2</a>.</span></li>
<li id="cite_note-Mikko_Hypponen_.28Unknown_Date2.29.-31">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-1"><sup>b</sup></a> <span class="reference-text">Mikko Hypponen (Unknown Date). <i><a class="external text" href="https://campaigns.f-secure.com/brain/virus.html" rel="nofollow">BRAIN Searching for the first PC virus in Pakistan</a></i>. F-Secure. <i><a class="external text" href="https://web.archive.org/web/20171023214516/https://campaigns.f-secure.com/brain/virus.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved October 23rd, 2017.</span></li>
<li id="cite_note-RussellGangemi1991-32">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-RussellGangemi1991_32-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-RussellGangemi1991_32-1"><sup>b</sup></a> <span class="reference-text">Deborah Russell; G. T. Gangemi (1991). <i><a class="external text" href="https://books.google.co.uk/books?id=BtB1aBmLuLEC&amp;pg=PA7&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwjip4P67PzTAhXlYZoKHSB9DfU4ChDoAQhWMAk#v=onepage&amp;q=computer%20Brain%20virus&amp;f=false" rel="nofollow">Computer Security Basics</a></i>. &#8220;O&#8217;Reilly Media, Inc.&#8221;. p. 7. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780937175712">ISBN 978-0-937175-71-2</a>.</span></li>
<li id="cite_note-McAfeeHistory-33">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-McAfeeHistory_33-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-McAfeeHistory_33-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=YcPvV893aXgC&amp;pg=PA1032&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwiX1uj97PzTAhWJB5oKHcAJCnE4FBDoAQhMMAc#v=onepage&amp;q=computer%20Brain%20virus&amp;f=false" rel="nofollow">Inventors and Inventions</a></i>. Marshall Cavendish. 2008. p. 1032. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780761477679">ISBN 978-0-7614-7767-9</a>.</span></li>
<li id="cite_note-bbcnewsjohnmcafeedead-34">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-bbcnewsjohnmcafeedead_34-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-bbcnewsjohnmcafeedead_34-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://www.bbc.co.uk/news/world-europe-57589822" rel="nofollow">John McAfee: Anti-virus creator found dead in prison cell</a></i>. June 23rd, 2021. BBC News. <i><a class="external text" href="https://web.archive.org/web/20220323104236/https://www.bbc.com/news/world-europe-57589822" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/C1VJF" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Hanako_Montgomery_.28November_29th.2C_2021.29.-35">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-1"><sup>b</sup></a> <span class="reference-text">Hanako Montgomery (November 29th, 2021). <i><a class="external text" href="https://www.vice.com/en/article/bvnnm3/japan-floppy-disks-tokyo-meguro" rel="nofollow">It’s 2021, and Tokyo Authorities Are Finally Phasing Out Floppy Disks</a></i>. VICE. <i><a class="external text" href="https://web.archive.org/web/20220323160800/https://www.vice.com/en/article/bvnnm3/japan-floppy-disks-tokyo-meguro" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/rRg51" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-norton-37">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-norton_37-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-norton_37-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://us.norton.com/internetsecurity-malware-when-were-computer-viruses-first-written-and-what-were-their-original-purposes.html#" rel="nofollow">When Were Computer Viruses First Written, and What Were Their Original Purposes?</a></i>. Norton. <i><a class="external text" href="https://web.archive.org/web/20220323154401/https://us.norton.com/internetsecurity-malware-when-were-computer-viruses-first-written-and-what-were-their-original-purposes.html" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/0NBKb" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-3"><sup>d</sup></a> <span class="reference-text">Doug Aamoth (January 19th, 2011). <i><a class="external text" href="https://techland.time.com/2011/01/19/happy-birthday-jerk-first-pc-virus-born-25-years-ago/" rel="nofollow">Happy Birthday, Jerk: First PC Virus Born 25 Years Ago</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20210418095344/https://techland.time.com/2011/01/19/happy-birthday-jerk-first-pc-virus-born-25-years-ago/" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/E419J" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-3"><sup>d</sup></a> <span class="reference-text">Philip Elmer-Dewitt; Ross H. Munro (September 26th, 1988). <i><a class="external text" href="http://www.time.com/time/magazine/article/0,9171,968490-2,00.html" rel="nofollow">Technology: You Must Be Punished (Page 2)</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20110306002734/http://www.time.com/time/magazine/article/0,9171,968490-2,00.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Moore_2014_p._39-40">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Moore_2014_p._39_40-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Moore_2014_p._39_40-1"><sup>b</sup></a> <span class="reference-text">Moore, R. (2014). <i><a class="external text" href="https://books.google.co.uk/books?id=fyqgBAAAQBAJ&amp;pg=PA39&amp;dq=brain+3.5+inch+5.25+inch+floppy&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjOhcqAy972AhWHQkEAHbEhBmcQ6AF6BAgHEAI#v=onepage&amp;q=brain%203.5%20inch%205.25%20inch%20floppy&amp;f=false" rel="nofollow">Cybercrime: Investigating High-Technology Computer Crime</a></i>. Taylor &amp; Francis. p. 39. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781317522973">ISBN 978-1-317-52297-3</a>.</span></li>
<li id="cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291-41">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-1"><sup>b</sup></a> <span class="reference-text">Philip Elmer-Dewitt; Ross H. Munro (September 26th, 1988). <i><a class="external text" href="https://time.com/time/magazine/article/0,9171,968490-1,00.html" rel="nofollow">Technology: You Must Be Punished (Page 1)</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20110224005538/https://time.com/time/magazine/article/0,9171,968490-1,00.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-contactusbrain-42">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-contactusbrain_42-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-contactusbrain_42-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</span></li>
</ol>
</div>
</div>
</div>
</div>
<p><a href="http://materiaislamica.com/index.php/Brain_PC_Virus" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
