The public has known for years that governments around the world use software developed by an Israeli cyber-arms company to spy on journalists, opposition politicians, and activists. Investigative journalists published a series of bombshell reports in July 2021 about the widespread abuse of Pegasus, a powerful tool marketed exclusively to state clients for use against only the grisliest criminals. Earlier this summer, Meduza learned that the iPhone of our co-founder and publisher, Galina Timchenko, was infected with Pegasus mere hours before she joined a private conference in Berlin attended by colleagues in the exiled Russian independent media. This is the first confirmed case of a Pegasus attack against a Russian journalist. With help from experts at Access Now and Citizen Lab, Meduza reports what we know about this notorious spyware, how it’s been used in Europe, and which states might have spent millions of dollars to hijack Ms. Timchenko’s phone.


Galina Timchenko hurried to Meduza’s Riga newsroom on June 23. She’d just gotten a call from Alexey, the head of Meduza’s technical division, telling her to come in immediately. His voice was unusually stern, and he didn’t explain the urgency. “He simply spoke in such a way that I understood it as an order,” Timchenko later recalled. “It was clear that something had happened.”

En route to the office, Timchenko wondered if one of her passwords wasn’t secure or if she’d clicked on any suspicious hyperlinks. “I thought I’d done something wrong,” she says.

Alexey was waiting for her at the doorstep. He silently pointed at her bag, which held her phone and computer. “I can’t say anything just yet,” he informed her. “We’re looking into it.” He then took Timchenko’s iPhone and MacBook.

The notification sent to Timchenko did not identify the state in question.

She says she put the message out of her mind after sharing it with Meduza’s technical team. Galina Timchenko has grown accustomed to such warnings. The Russian authorities have tried to hack or destroy her newsroom’s infrastructure for years. Meduza has weathered denial-of-service attacks and countless phishing attempts. Russia’s federal censor now even blocks the website outright.

Experts at Access Now and Citizen Lab collected the data from Timchenko’s devices and performed what they call “a rapid COVID test.” The results were quick indeed, revealing that her smartphone was infected with the spyware Pegasus on February 10, 2023. This gave the hackers total access to Timchenko’s iPhone: its microphone, cameras, and memory. The attackers could see the device’s entire contents, including Timchenko’s home address, her scheduled meetings, her photographs, and even her correspondence in encrypted instant messengers. Pegasus lets you see a device’s screen directly, reading messages as they are written. It lets you download every email, text, image, and file.

Pegasus and NSO Group

States pay “tens of millions of dollars, if not more,” for access to Pegasus, Citizen Lab senior researcher John Scott-Railton told Meduza.

Even researchers in this field aren’t sure what it costs to hack a single device using Pegasus. The spyware is more a service than anything; each NSO Group contract permits so many “simultaneous infections,” says Natalia Krapiva, Access Now’s tech-legal counsel. “For example, a client state can buy a package with 20 infections, which means it can have 20 people under surveillance at one time.”

Speaking to The Washington Post in July 2021, NSO Group co-founder Omri Lavie said attacks on journalists by his clients are “horrible,” but he argued that the main problem is a lack of regulation. “This is the price of doing business,” he explained. “Somebody has to do the dirty work.”

As soon as the Pegasus infection was confirmed, Meduza’s management locked itself in Timchenko’s office for an emergency meeting. “We were all terrified,” Alexey recalls, “but we pretended we weren’t.”

Meduza editor-in-chief Ivan Kolpakov, who was traveling then, joined the meeting by teleconference. He was visibly at a loss and kept listing aloud what could have leaked: corporate passwords and correspondence, bank account balances, the names of Meduza staff, and — most dangerously — the identities of Meduza’s collaborators inside Russia. 

It was soon clear, however, that it was impossible to assess what had been compromised. “They got everything,” Kolpakov recalls. “Everything they wanted.”

Those at the meeting say Meduza’s technical director was the only one who remained calm, but he remembers it differently: “I sat there, plugging my ears, and I tried to write out a checklist for Galya: new password, new device, new Apple ID, new SIM card.” Timchenko tried at first to “laugh it off,” says Alexey, but eventually she burst into tears:

The most unpleasant questions came from Ivan: “What documents were you working with on your iPhone? Did you activate two-factor authentication everywhere?” I already felt like I’d been stripped naked in the town square. Like someone had reached into my pocket. Like I was dirty somehow. I wanted to wash my hands! And then my partner and best friend starts interrogating me as if I’d put everyone at risk. It really hurt… But I’d have demanded the same if I were in his shoes. Ivan was just very nervous.

Citizen Lab collected “forensic artifacts” from Timchenko’s iPhone showing that the device was infected with Pegasus on February 10, 2023. 

As managers crowded into Galina Timchenko’s office and scrambled to assess the worst intrusion in Meduza’s history, another event back in Russia suddenly demanded the newsroom’s complete attention: a mercenary leader shot down several helicopters, seized a military base, and announced a “march on Moscow.” It was June 23, 2023, and the Pegasus hack silently took a backseat to Yevgeny Prigozhin’s mutiny as Meduza mobilized its newsroom to cover the breaking story.

When the senior staff could later contemplate the possible reasons for Timchenko’s Pegasus infection, the date of the infiltration (February 10, 2023) wasn’t immediately significant to managers. But it should have been.

On February 11, one day after Pegasus hijacked Timchenko’s iPhone, she and Kolpakov joined other representatives of Russia’s exiled independent media in Berlin at a confidential seminar organized by the Redkollegia journalistic prize committee. Media managers and lawyers attended the private conference to discuss the legal aspects of operating in Russia under the conditions of total state censorship and the mass persecution of journalists and activists. Just two weeks earlier, Russia’s Prosecutor General formally outlawed Meduza’s reporting, designating the outlet an “undesirable organization.” Timchenko recalls that colleagues meeting in Germany expected the same thing would happen to them before long.

“My first thought was the Russian state and the Russian intelligence agencies, of course,” recalls Timchenko. “Who else cares about me?”

The attack against Galina Timchenko is the first confirmed case of Pegasus being used against a Russian journalist. Natalia Krapiva at Access Now confessed to Meduza that she’s actually somewhat comforted to see the spyware surface here because researchers have tested the phones of nearly two dozen journalists and activists from Russia and found all manner of malware but never Pegasus. “I was afraid that [they] were being tracked by something we couldn’t detect,” she explained. “The first confirmed case was shocking, thrilling, and a relief all at once. Now, at least, we have a thread to pull.”

Much of Citizen Lab’s work is devoted to searching for the servers needed to run Pegasus. “It’s a service, and NSO Group sells access to it,” says Krapiva. “When it signs a contract, the company sends a whole team to the client state to organize training sessions on how to run the tool. All this requires technical infrastructure, and Citizen Lab is constantly trying to monitor it.”

Scott-Railton told Meduza that his team looks not just for the infrastructure used in attacks but also for what’s needed to extract data. “In other words,” he explained, “[we look for] all the servers where the information collected from infected devices ends up.”

“We do not see evidence of Russia using NSO’s product, but that doesn’t mean we know everything,” says John Scott-Railton at Citizen Lab.

A spokesperson for NSO Group told Meduza that the company’s technologies “are only sold to allies of the U.S. and Israel, particularly in Western Europe, for the sole purpose of fighting crime and terror, aligned with the global interests of U.S. national security and governmental law enforcement agencies.”

“After hundreds of victims, we have concluded that the internal review process either doesn’t exist or exists only for show,” says Natalia Krapiva at Access Now. “When a Human Rights Watch employee was infected, NSO responded to all the questions in just a few lines: ‘Thank you, we found nothing with our current customers. Goodbye.’ Of course, they said nothing about what their past clients could have done. It’s all gaslighting.”

As far as researchers know, however, neither Kazakhstan nor Azerbaijan has ever executed a Pegasus attack in Europe, and Timchenko was in Germany when the infection occurred. 

Natalia Krapiva says clients need a bonus package to use Pegasus beyond their borders: “We believe that different NSO customers can purchase different types of licenses. Some buy the rights to hack only within their country. Others buy the rights to infect a large number of countries. We still don’t understand a lot about these secret contracts, but infections outside a client’s state likely require special permission.”

However, experts at Citizen Lab have never observed Riga using Pegasus against targets outside Latvia’s borders, and Galina Timchenko was in Berlin when her phone was compromised. (Whom exactly Riga has infected with Pegasus remains unknown.)

Latvia’s State Security Service told Meduza that it “does not possess information related to possible attack against Galina Timchenko’s smartphone.” The agency declined to answer Meduza’s other questions (including questions about whether the country uses Pegasus against journalists, Russian citizens, or targets on the territories of other European countries), citing the classified nature of information about its operations.

“I’m absolutely shocked we’re seriously discussing that a European state could have done this,” says Ivan Kolpakov, Meduza’s editor-in-chief. “I’m probably naive, but this seemed impossible to me. The consequences could be devastating, and this concerns not just the news media in exile but the media in Europe generally. If such software could be installed on the phone of a journalist from Russia, who knows what’s stopping European intelligence agencies from infecting any journalist at all.”

“I can’t reconstruct the logic of European intelligence agencies that might have installed Pegasus, and I don’t want to make assumptions,” says Galina Timchenko. “Moving forward, we’ll act in accordance with what our lawyers advise. I won’t be silent.” 

NSO Group declined to answer Meduza’s questions about whether it knew of the attack on Timchenko and which of its clients might have staged the intrusion. The company’s spokesperson also did not say if it is aware of cases in which Pegasus has been used against journalists in European countries or against Russian nationals, or if NSO Group knows of situations where one E.U. member state spied on a target in another E.U. member state.

In any case, NSO Group admits no responsibility for the attack on Timchenko. The company’s spokesperson stressed that the firm “investigates all credible allegations of misuse” but did not say if NSO is prepared to conduct an internal investigation into the use of Pegasus against Meduza’s co-founder and publisher.

Today, Ms. Timchenko carries two phones: a new one she bought after the intrusion and the formerly infected gadget (Citizen Lab confirmed that Pegasus is no longer installed on the device). She says she decided to keep it as a souvenir. “There’s nothing on it except messages with my hairdresser and manicurist,” she says. “Let it be. It will remind me to keep looking over my shoulder.”

Given the enormous cost of using Pegasus, Timchenko is still confounded that someone infected her with the spyware. “Just what were they planning to find? They put me under a magnifying glass, hoping to catch something… Go ahead and watch, you creeps! Feast your eyes.”

Since June 2023, experts have analyzed the phones of several dozen Meduza employees. It’s still unknown what specific information Timchenko’s attackers were after. This ambiguity worries Meduza’s technical director, Alexey, more than anyone.

“Until I know the motive, I have to expect the worst,” says Alexey. “I deal with our security not just in a technical but in the broadest sense of the word: every day, I think through how they’re going to kill us and bring us down. Surveillance, harassment, threats — I’ve already considered all these scenarios and experienced them myself, in a sense. As for Pegasus, until we have more details, we can’t rule out that Russia could have ordered the infection and that this spying could have the most serious consequences, right up to somebody being eliminated.”

Timchenko, meanwhile, says she hasn’t yet contemplated such consequences of being watched through Pegasus. “I already look back wherever I go and watch for anyone following me in a car. Meduza’s founders have always lived like this,” she says. “If they want to do it, they’ll do it.”


CREDITS

This article was originally published on September 13, 2023. It has been reposted here with the appropriate permission of Meduza’s team. Meduza is a co-founder of NEMO.


YOU MAY WANT TO READ

Meduza faced the most intense cyberattack campaign in its history


Posted

in

by