#spyware

LIVE

#ProyectoPegasus: Las revelaciones sobre el software espía de NSO Group utilizado para vigilar a activistas y periodistas


#ProyectoPegasus: Las revelaciones sobre el software espía de NSO Group utilizado para vigilar a activistas y periodistas

Según una investigación reciente, el malware Pegasus, desarrollado por la empresa israelí NSO Group, ha sido utilizado para violar los derechos humanos. Así lo dio a conocer Proyecto Pegasus, una investigación colaborativa en la que participaron más de 80 periodistas de 17 organizaciones de medios de comunicación, coordinados a través de Forbidden Stories –organización social francesa orientada al periodismo de investigación– y Amnistía Internacional. Allí, se establece que el software de NSO Group facilitó el ataque a activistas, defensores de derechos humanos, periodistas y figuras políticas.

De acuerdo a los datos recabados, más de 50 mil números de teléfono habrían sido vigilados en todo el mundo por medio del software. Este es utilizado para interceptar un dispositivo, permitiendo acceder a mensajes, correos electrónicos, contactos telefónicos, micrófono y cámara.

A partir de los antecedentes entregados por medios como The Guardian yThe Washington Post, se identificó la presencia de la compañía de vigilancia en países como México, Arabia Saudí, Azerbaiyán, Bahréin, Emiratos Arabes, Hungría, India, Kazajistán, Marruecos, Ruanda y Togo.

En Latinoamérica, el principal foco es México. La investigación sobre el uso de Pegasus en este país, determinó que más de 15 mil teléfonos fueron intervenidos entre 2016 y 2017, durante el gobierno de Enrique Peña Nieto. Asimismo, se identificó a 25 periodistas como víctimas de espionaje, entre los que se encontraba Cecilio Pineda, asesinado en 2017.


Foto: CC:BY (Kieran Lamb) - SA

yahoo-geddon: UPDATED 12/20/2019Update To Earlier Warning About Virus Alerts In Verizon’s GetMyDat

yahoo-geddon:

UPDATED 12/20/2019

Update To Earlier Warning About Virus Alerts In Verizon’s GetMyData YahooGroups! Data

After more testing, here is what we have learned.Verizon’s “GetMyData” (GMD) files will be flagged by antivirus software in two main areas:

  • Messages.zip
  • Files.zip

The flags are handled differently for Messages vs. Files, and depending on your virus software, the flags may result in some - or all - of your groups data being deleted - even the uninfected files.

What to do? 

Read the latest update out the Google Doc (link)

We offer streamlined suggestions and an offer to help.

************************************************ 

 December 19, 2019

Both the Yahoo Gedden and Archive Teams are doing more testing. There is malicious HTML code buried inside some of the mbox messages...how and when (or even if)  it could be activated is still a question. There is no question however, that the GMD Files.zip contain questionable items which most virus programs seem capable of detecting and deleting. 

The bigger problem is that while some virus programs don’t even see the ‘bad code’ inside the mbox files, others do and they are triggered to either delete the entire mbox (thousands of uninfected messages are deleted) or even worse, the entire GMD file (all the downloaded Groups).

 We plan to reach out to Wilson (PG Offline) to confirm our thinking that the downloaded PG Offline emails in of themselves are not a problem,. However, PG Offline was set to download attachments and of course people used it to download files and photos and links (HTML).  In any event users should scan their PG Offline folders first (which are usually stored in C:\Users\XXXX\AppData\Local\PG Offline 4 

Check back at the Google Doc for updates:  (link)

************************************************

December 18, 2019

Please check your Verizon YahooGroups! data downloads for virus, trojan and spyware. Verizon offers “Get My Data” downloads of Yahoo Group email messages, links and files. They maycontain security risks for desktop users (Windows and Mac Users)

Those who downloaded their Groups using third party tools like PGOffline and Python - you may also be impacted if you downloaded attachments, files, links or photos. PGOffline automatically includes attachments along with messages. And some of the messages themselves might have buried malicious HTML code so even if so you only downloaded messages, please scan your PGOffline database and download folders.

***Please follow these suggestions at your own risk. When in doubt, contact your virus software manufacturer.***** (link to more info)

Reblogging for the streamlined suggestions and an offer of help.


Post link
UPDATED 12/20/2019 Update To Earlier Warning About Virus Alerts In Verizon’s GetMyData YahooGroups!

UPDATED 12/20/2019

Update To Earlier Warning About Virus Alerts In Verizon’s GetMyData YahooGroups! Data

After more testing, here is what we have learned.Verizon’s “GetMyData” (GMD) files will be flagged by antivirus software in two main areas:

  • Messages.zip
  • Files.zip

The flags are handled differently for Messages vs. Files, and depending on your virus software, the flags may result in some - or all - of your groups data being deleted - even the uninfected files.

What to do? 

Read the latest update in Google Doc (link)

We offer streamlined suggestions and an offer to help.

************************************************ 

 December 19, 2019

Both the Yahoo Gedden and Archive Teams are doing more testing. There is malicious HTML code buried inside some of the mbox messages...how and when (or even if)  it could be activated is still a question. There is no question however, that the GMD Files.zip contain questionable items which most virus programs seem capable of detecting and deleting. 

The bigger problem is that while some virus programs don’t even see the ‘bad code’ inside the mbox files, others do and they are triggered to either delete the entire mbox (thousands of uninfected messages are deleted) or even worse, the entire GMD file (all the downloaded Groups).

 We plan to reach out to Wilson (PG Offline) to confirm our thinking that the downloaded PG Offline emails in of themselves are not a problem,. However, PG Offline was set to download attachments and of course people used it to download files and photos and links (HTML).  In any event users should scan their PG Offline folders first (which are usually stored in C:\Users\XXXX\AppData\Local\PG Offline 4 

Check back at the Google Doc for updates:  (link)

************************************************

December 18, 2019

Please check your Verizon YahooGroups! data downloads for virus, trojan and spyware. Verizon offers “Get My Data” downloads of Yahoo Group email messages, links and files. They maycontain security risks for desktop users (Windows and Mac Users)

Those who downloaded their Groups using third party tools like PGOffline and Python - you may also be impacted if you downloaded attachments, files, links or photos. PGOffline automatically includes attachments along with messages. And some of the messages themselves might have buried malicious HTML code so even if so you only downloaded messages, please scan your PGOffline database and download folders.

***Please follow these suggestions at your own risk. When in doubt, contact your virus software manufacturer.***** (link to more info)


Post link

Rogues And Spyware: Pegasus Strikes In Spain

Rogues And Spyware: Pegasus Strikes In Spain

Weapons, lacking sentience and moral orientation, are there to be used by all. Once out, these creations can never be rebottled. Effective spyware, that most malicious of surveillance tools, is one such creation, available to entities and governments of all stripes. The targets are standard: dissidents, journalists, legislators, activists, even the odd jurist.
Pegasus spyware, the fiendishly…


View On WordPress

loading