CPJ Safety Advisory: Pegasus spyware used to target journalists, civil society

Mexican journalist Carmen Aristegui holds her mobile phone during a press conference in Mexico City in 2017 about governments using spyware to target journalist. (AFP/Alfredo Estrella)

Mexican journalist Carmen Aristegui holds her mobile phone during a press conference in Mexico City in 2017 about governments using spyware to target journalist. (AFP/Alfredo Estrella)

[EDITOR’S NOTE: See CPJ’s updated safety advisory here.]

In a report published on September 18, Citizen Lab said it had detected Pegasus, a spyware created for mobile devices, in over 45 countries. Pegasus, which transforms a cellphone into a mobile surveillance station, could have been deployed against a range of journalists and civil society actors in Mexico, Saudi Arabia, Bahrain, Morocco, Togo, Israel, the U.S., and the United Arab Emirates, the report found.

In Other Languages

Researchers have previously identified a number of major Pegasus campaigns, including one against investigative journalists in Mexico, and another against human rights workers in Saudi Arabia. The spyware’s presence in 45 countries raises significant implications for journalists, both in terms of their own security as well as the safety of their sources.

The spyware gives the attacker the ability to monitor, record, and collect existing and future data from the phone. This includes calls and information from messaging applications and real-time location data. The spyware is able to remotely activate the camera and microphone to surveil the target and their surroundings.

Pegasus is designed to be installed on phones running Android, BlackBerry OS, and iOS without alerting the target to its presence. Journalists will likely only know if their phone has been infected if the device is inspected by a tech expert.

Pegasus can be installed in a number of ways. Journalists should be aware of these methods and take appropriate steps to protect them and their sources.

Spear-phishing attacks

Attackers create tailor-made messages that are sent to a specific journalist. These messages convey a sense of urgency and contain a link or a document which the journalist is encouraged to click on. The messages come in a variety of forms, including SMS, email, through messaging apps such as WhatsApp or via messages on social media platforms. Once the journalist has clicked on the link, then the spyware is installed on their phone.

Research by Citizen Lab and Amnesty International found that messages tend to take the following forms:

The suspect messages may also arrive from unknown numbers.

Attackers can target personal and work phones. To better protect themselves and their sources, journalists should:

Physically installed by an adversary

Pegasus can also be installed on your phone if an adversary gains physical access to the device. To reduce risk:

If you believe your phone is infected by Pegasus immediately stop using that phone and purchase another one. You should leave the suspected device in a place that does not compromise you or your surroundings. If you have access to tech support through a media organization, contact them immediately for assistance. If you are a freelance journalist or a journalist that does not have access to tech support, contact the Access Now Helpline.

CPJ is working alongside our partners to understand the full scope of the threat Pegasus poses to journalists. If you have received a suspicious message and believe you may have been targeted by Pegasus, please forward the message to phishtank@cpj.org. This information will be handled confidentially.

For more information on technology security we encourage journalists to review the CPJ’s Security Guide’s Chapter on Technology Security and see the digital safety information included in our Resource Center.

With thanks to Citizen Lab for valuable insight.

Exit mobile version