Pegasus spyware deployed on iPhones in Mexico
Citizen Lab, a cyber analyst based in Canada, disclosed its most recent findings, which indicate that last year NSO Group’s “customers” deployed 16 zero-click exploits – system defense breaches that can be used to attack without luring a target into clicking on a malicious link – against civilian targets worldwide.
Most notable among the victims tracked by Citizen Lab were two employees of the Centro Prodh, a local human rights group that has reportedly been persecuted for investigating mass disappearances of protestors in Mexico.
Jorge Santiago Aguirre, Centro Prodh’s head, and Maria Luisa Rodriguez, its international coordinator, were targeted by the Pegasus spyware, which has been sold by its owner NSO around the world, including to the governments of 14 EU countries.
“Our research collaboration led to the identification of two human rights defenders working at Centro Prodh whose devices were infected with Pegasus spyware,” said Citizen Lab, adding that Aguirre and Rodriguez both consented to be named in its report.
The FINDMYPWN exploit was used to infect devices belonging to Aguirre and Rodriguez, respectively between June 22 and July 13, and September 24 and 29.
This exploit is identified by Citizen Lab as “NSO Group’s second 2022 zero-click” designed to go after iOS15 devices by targeting an iPhone’s Find My and iMessage features. Read More…