In a recent report by Access Now, it has been revealed that around three dozen journalists, lawyers, and human rights workers in Jordan have allegedly fallen victim to targeted surveillance by the authorities. 

The Israeli NSO Group's Pegasus spyware is implicated in what is described as a broad crackdown on press freedoms and political participation.

Scope of Attacks and Targets

NSO Group's Pegasus Spyware Targets At Least 35 Critics Tied to Jordan
(Photo: FlyD from Unsplash)
In a recent report, almost three dozen human rights workers in Jordan are under the crosshairs of Israel's NSO Group through Pegasus spyware.

The findings suggest that members of civil society, including at least one American citizen residing in Jordan, have been targeted by the powerful spyware between 2019 and September 2023. 

According to The Guardian, the attacks appear to be staggeringly widespread, affecting journalists, political activists, civil society actors, and human rights lawyers.

Related Article: iPhone Spyware Threat: Kaspersky Recommends this Method to Detect Pegasus Spyware

NSO's Pegasus is a Potent Cyberweapon

NSO's Pegasus, when successfully deployed, allows operators to take full control of a mobile device. This includes access to emails, phone calls, encrypted messages on platforms like Signal or WhatsApp, and even the ability to turn the phone into a remote listening device by manipulating its microphone.

NSO's Response and Compliance

In response to the Access Now report, NSO stated that it adheres to all laws and regulations, selling its products only to vetted intelligence and law enforcement agencies. 

Moreover, the spyware maker company says that its technologies are used for preventing crime and terror attacks. NSO, regulated by the Israeli Ministry of Defence, asserts that it is investigating all credible claims of misuse.

Named Individuals and Organizations

Thirteen individuals, including Adam Coogle of Human Rights Watch, Hiba Zayadin (HRW's senior researcher for Jordan and Syria), Manal Kasht (founder of Shabbat), and Alaa Al-Hiyari (Jordanian lawyer and political activist), were among those reportedly targeted. Additionally, at least 16 journalists, including Rana Sabbagh and Lara Dihmis, both associated with the Organised Crime and Corruption Reporting Project, were allegedly subject to surveillance between 2020 and 2023.

Unconfirmed Culprits and Suspicions

Access Now's report, corroborated by the Citizen Lab at the University of Toronto, did not definitively attribute the attacks to the Jordanian government. However, suspicions have loomed since January 2022 when prominent Jordanian human rights lawyer Hala Ahed was first confirmed as a victim of Pegasus spyware.

"Pegasus spyware is enabling a colossal erosion of privacy and civic space in Jordan," Marwa Fatafta, MENA policy and advocacy director at Access Now told Bloomberg.

She added that the recent incident adds to the "long list of human rights abuses facilitated by NSO Group around the world."

NSO's Negotiations with Jordan

Axios previously reported that NSO was in negotiations to license its products to the Jordanian government starting in late 2020. The report suggested that Jordanian intelligence services used these products to surveil terror groups and opposition activists critical of King Abdullah II.

Users targeted by Pegasus became aware of the surveillance when notified by Apple. Those who kept their phones in Apple's lockdown security mode successfully avoided being hacked.

Types of Attacks Documented

The documented cases involved both zero-click attacks, where users don't need to click any button, and one-click attacks, where Pegasus users deliver malicious links through sophisticated social engineering attacks.

At this point, the Jordanian embassy in Washington DC has not responded to requests for comments on the allegations and concerns raised in the Access Now report.

Read Also: US Blacklists 2 European Spyware Companies Controlled by a Former Israeli General

Joseph Henry

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion