The trial in this case is ongoing. Saudis put Palestinians on trial over vague claims . These targeted digital attacks against two Moroccan HRDs are symptomatic of a larger pattern of reprisals against HRDs and dissident voices being carried out by Moroccan authorities.   |   It was founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio. Amnesty International is calling on the Moroccan authorities to drop the charges against Monjib and his co-defendants. The link between Warner and Omri Lavie, an ex-Israeli intelligence officer and one of the three founders of NSO Group (NSO stands for Niv, Shalev, and Omri, the first names of the three founders) lies in Warner’s longtime confidant, current business partner, and the former manager of his family’s investment office, Nicholas Perrins. ]biz and infospress[. This visit was followed by a redirect to the same domain, but provided with additional arguments: hxxps://bun54l2b67.get1tn0w.free247downloads[.]com:30495/szev4hz#048634787343287485982474853012724998054718494423286. While analysing the iPhone of Maati Monjib, who we confirmed above was targeted with NSO Group’s Pegasus spyware using malicious SMS links, we observed some suspicious traces which we believe are indicative of some peculiar exploitation attempts. This is increasingly making it difficult for HRDs and activists to exercise their rights to freedom of expression and association, and peaceful assembly. In this case, the attackers cleverly crafted the attack to appear like a flood of automated spam SMS messages with the same text, and offering the malicious link as a way to stop receiving them. With the revelations detailed in this report, it has become increasingly obvious that NSO Group’s claims and its human rights policy are an attempt to whitewash rights violations caused by the use of its products. Morocco has been connected to multiple cases of surveillance abuse over the past decade, ranging from the targeting of human rights organizations with Hacking Team’s spyware to a string of more recent cases in which NSO Group’s Pegasus spyware was used to target civil society within Morocco … The browser first attempted an unencrypted connection to The links contained in such messages closely resemble the URLs involved in the network injection attacks: Both links are composed of rather generic domain names, followed by a 7-9 random alphanumeric string. (I?�6�M�q�Q����\�7000vtt0d0H4�50yt0x0� I&� CF3�#�R� "#�:;:%:�:��1c�8��E�X ��P�G,S���1�`����x�q�9���LJL�a����V��u�`������{�'������4#� m��9q�ff`�愇�#�^u�*FS� � l� As he visited, his phone was being monitored and hijacked, and Safari was automatically directed to an exploitation server which then attempted to silently install spyware. NSO Group spyware used against Moroccan journalist after company pledged to respect human rights; Inc. Co. comments. Espionnage: le Royaume du Maroc serait un client de Circles, filiale de l’Israélien NSO Group Aux côté de 24 pays au monde, le Maroc a été cité comme client potentiel pour les produits de l’entreprise Circles, filiale de le la société israélienne NSO, dans une nouvelle enquête du … Dans ce rapport, elle affirme toujours en employant le conditionnel que le téléphone de l’historien Maati Mounjib aurait fait … Amnesty International has discovered that since at least October 2017, HRDs from Morocco have been targeted with the infamous “Pegasus“ spyware produced by the Israeli company ‘NSO Group’. Earlier this month, the NSO Group also released its Human Rights Policy. Otherwise, we'll assume you're OK to continue. We believe this is a symptom of a network injection attack generally called “man-in-the-middle” attack. If we ever discover that our products were misused in breach of such a contract, we will take appropriate action.”, Nouveau à temara La 1 ère fois à Bd Fouarate Apparts avec jardin ,grandes piscines & Salle sport + 2 piscines chauffées 7/7 6000/m2. After about 30 seconds, Maati Monjib again tried to access Yahoo, this time by searching “ mail“ on Google and then eventually being directed to the right location where he then read his email. Amnesty International claims that Israeli firm NSO Group’s spyware was used in a sustained campaign by Morocco’s government to spy on Moroccan journalist Omar Radi, with one attack occurring days after NSO pledged to prevent its technology from being used in human rights abuses. He is an important voice on issues of freedom of expression in Morocco. Une fois ce postulat vide établi, il est devenu déterminant pour Amnesty de relier «NSO Group» au Maroc, malgré l’aveu préliminaire de cette ONG, sur le fait «qu’elle ne dispose d’aucune preuve sur l’achat, par Rabat, de cette technologie». Technology developed by Israeli cyber security company NSO Group was used by the Moroccan government to spy on journalist Omar Radi, a critic of Morocco's human rights record, Amnesty International said on Monday. Currently, we do not have sufficient information to conclusively attribute these suspected network injection attacks to NSO Group’s products or services. Mexico, Morocco, and Thailand were also singled out for torture, murders, disappearances and other abuses by government agencies and security forces. Amnesty International has uncovered targeted digital attacks against two prominent Moroccan Human Rights Defenders (HRDs) using NSO Group’s Pegasus spyware. SMS messages delivered to them carried links that pointed to malicious websites previously connected to NSO Group. You can use this tool to change your cookie settings. According to our research, these targeted attacks have been ongoing since at least 2017. ]com/y7wdcd8z, Urgent le livre sur Donald Trump s est arrache dans toutes les librairies une version arabe est disponible gratuitement sur le lien hxxp://tinyurl[.]com/y87hnl3o. We confirmed Maati Monjib had already been targeted with NSO Group’s Pegasus spyware via malicious SMS messages. Oct 10, 2019 | CYBERSCOOP Hackers potentially working on behalf of a foreign government have targeted Moroccan human rights advocates with malicious software built by NSO Group, a controversial spyware vendor, according to Amnesty International. This charge was leveled simply for promoting a mobile application for citizen journalism that protected users’ privacy. NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphones. Le Maroc et 44 autres pays sont les clients de NSO qui a créé Pegasus, un logiciel utilisé pour pirater des comptes WhatsApp. Permissions Maati Monjib, 57, is a historian and a columnist, co-founder of the NGO Freedom Now (dedicated to protecting the rights of journalists and writers), and co-founder and a leading member of the Moroccan Association for Investigative Journalism (AMJI). Another domain we found in SMS messages sent to Moroccan HRDs, revolution-news[. In addition to SMS messages, we identified what appear to be network injection attacks against a HRD’s mobile network also aimed at installing spyware. En octobre 2019, Amnesty International a publié un premier rapport sur l’utilisation d’un logiciel espion produit par l’entreprise israélienne NSO Group en vue de cibler des défenseurs des droits humains marocains, Maati Monjib et Abdessadak El Bouchattaoui. NSO Group, entreprise israélienne commercialisant sa technologie pour combattre la pandémie de COVID-19, a favorisé une intense campagne menée par le Maroc pour espionner le journaliste marocain Omar Radi, a révélé Amnesty International dans un nouveau rapport d’enquête rendu public lundi 22 juin.On ne peut manifestement pas faire confiance à NSO Group. The journalist, Omar Radi, was targeted by surveillance software capable of tracking texts, calls, emails, camera, and more — just days after NSO Group, the Israeli surveillance software company, … 0522647000 STOPSMS: hxxps://stopsms[. This even applies to very practical things like arranging meetings or a dinner downtown. ]co/nBBJBIP, فاجعة الصويرة تسقط أول المسؤولين أمام القضاء hxxps://infospress[. These were carried out through SMS messages carrying malicious links that, if clicked, would attempt to exploit the mobile device of the victim and install NSO Group’s Pegasus spyware. Cookie Statement NSO Group Technologies est une entreprise israélienne de sécurité informatique fondée en 2010 par Niv Carmi, Omri Lavie, et Shalev Hulio [1].Elle est implantée à Herzelia en Israël et est constituée de deux cents employés. The targeting of Radi came at a time when he was being repeatedly harassed by the Moroccan government between January 2019 and January 2020. He is a part of the legal defence team for people imprisoned for participating in the social justice protests in the Hirak El-Rif across 2016 and 2017. As laid out in the UN Guiding Principles on Business and Human Rights, the NSO Group and their primary investor, the UK-based private equity firm Novalpina Capital, should urgently take pro-active steps to ensure that they do not cause or contribute to human rights abuses within their global operations, and to respond to any human rights abuses when they do occur. Der Name NSO GmbH (Netzwerk Systemadministration und Onlineservices) hat uns über 16 Jahre treu begleitet. While there are significant legal and contractual constraints concerning our ability to comment on whether a particular government agency has licensed our products, we are taking these allegations seriously and will investigate this matter in keeping with our policy. Amnesty International suspects that the NSO Group may also be behind these network injection attacks. ]co, which seems to impersonate Hmizate, an e-commerce company from Morocco. Radi was targeted by a series of network injection attacks, which allowed attackers to intercept and manipulate targets’ internet traffic, Amnesty International said. They are not tools to surveil dissidents or human rights activists. Soyez au Rendez-vous sur notre site :hxxp://tinyurl[. Additional evidence found on the phone reinforces this suspicion. They could be imprisoned for up to five years if found guilty. These revelations are particularly significant in a context where Moroccan authorities are increasingly using repressive provisions from penal codes and security laws to criminalise and discredit human rights defenders and activists for exercising their rights to freedom of expression, association, and peaceful assembly. If you are talented and passionate about human rights then Amnesty International wants to hear from you. endstream endobj 409 0 obj <. Amnesty International is calling on the Moroccan authorities to quash the conviction against him. NSO Group has repeatedly said it only sells its technology to governments. These messages, described as “Enhanced Social Engineering Message(s)“ (ESEM) in leaked NSO Group‘s documentation, attempt to lure victims to click on the contained link, which would then trigger an attempt of exploitation of the phone and the consequent silent installation of the Pegasus spyware on the device. In June 2018 Amnesty International documented the targeting of an Amnesty staff member and a Saudi HRD using NSO Group‘s Pegasus. 408 0 obj <> endobj Two domain names from links delivered to Maati Monjib and Abdessadek El Bouchattaoui, stopsms[. (Note: with each attempt, the redirected URL would change slightly with different subdomains, port number, and URI.). Once the phone is exploited and Pegasus is installed, it begins contacting the operator’s command and contr… The targeting of Maati Monjib and Abdessadak El Bouchattaoui, simply for carrying out human rights work, is unlawful according to principles laid out in international human rights law. Amnesty International can reveal that the two targets are Maati Monjib, an academic and activist working on issues of freedom of expression, and Abdessadak El Bouchattaoui, a human rights lawyer involved in the legal defence of protestors in a social justice movement in Hirak El-Rif that took place across 2016 and 2017. Pour ne plus recevois nos SMS : hxxp://stopsms[. If an investigation identifies actual or potential adverse impacts on human rights we are proactive and quick to take the appropriate action to address them. That’s why contracts with all of our customers enable the use of our products solely for the legitimate purposes of preventing and investigating crime and terrorism. We believe it was a deliberate clean-up executed by the spyware in order to remove traces that could lead to the identification of the vulnerabilities actively exploited. 0 NSO Group, entreprise israélienne commercialisant sa technologie pour combattre la pandémie de COVID-19, a favorisé une intense campagne menée par le Maroc pour espionner le journaliste marocain Omar Radi, a révélé Amnesty International dans un nouveau rapport d’enquête rendu public lundi 22 juin. Privacy Policy It employed almost 500 people as of 2017, and is based in Herzliya, near Tel Aviv, Israel. The messages containing malicious links were sent to him during what he recalls was the peak of the Hirak El-Rif movement and the subsequent repression by the Moroccan security forces. ]com/y93yg2sc, Nhar lekbir c'est le vendredi 24 Novembre ! endstream endobj startxref Our analysis of Maati Monjib’s phone showed that, on one occasion, all these crash files were wiped a few seconds after one of these Safari redirections happened. In this case, because the targeted device is an iPhone, connecting through a mobile line only, a potential vantage point could be a rogue cellular tower placed in the proximity of the target, or other core network infrastructure the mobile operator might have been requested to reconfigure to enable this type of attack. […] Additionally, a similar network injection capability was briefly described in a document named "Pegasus – Product Description" – apparently written by NSO Group – that was found in the 2015 leak of the competing Italian spyware vendor, Hacking Team. Whenever an application crashes, iPhones store a log file keeping traces of what precisely caused the crash. This has had a detrimental impact on his activism and daily life.