Pegasus

NSO Group

A commercial mobile-spyware platform developed by the Israeli firm NSO Group from approximately 2011 onward, sold under regulated-export licence to government clients for installation on iOS and Android target devices via zero-click and one-click delivery vectors. Substantially documented through Citizen Lab and Amnesty International technical research as deployed against journalists, dissidents, attorneys, and political-opposition figures across more than fifty countries.

Overview

Pegasus is the principal commercial mobile-spyware platform documented in the post-2010 published institutional record. The platform's substantive operational characteristics — the combination of zero-click installation capability against iOS and Android target devices, the substantial operational reach into the encrypted-messenger and contact-database content of the targeted device, the institutional pattern of state-client deployment under regulated-export licence — have made the platform the substantively defining commercial-spyware product of the 2010s and 2020s.

The substantively settled subsequent assessment of NSO Group's institutional position has produced the substantial body of academic-and-policy literature, civil-litigation record, and institutional-reform proposal that constitutes the principal post-2018 institutional engagement with commercial-spyware regulation. The substantively unresolved institutional question — whether the commercial-spyware industry's operational pattern can be substantively constrained through export-control regulation, civil-litigation accountability, or alternative institutional mechanisms — remains a continuing thread in the post-2021 institutional environment.

Origins / Development

NSO Group Technologies Ltd. was founded in 2010 in Herzliya, Israel by Niv Karmi (a former Israeli Defence Forces signals-intelligence officer), Shalev Hulio (a former IDF intelligence officer), and Omri Lavie (a technology entrepreneur). The institutional pattern of the founding cohort — substantially Israeli signals-intelligence veterans transitioning to commercial cybersecurity following IDF service — was substantively the institutional pattern of the broader Israeli commercial-spyware industry of the post-2005 period (NSO Group, Candiru, Cellebrite, Quadream, Paragon Solutions, and adjacent firms).

The institutional context of NSO Group's emergence was the post-2008 maturation of mobile-platform exploitation as a substantive cybersecurity discipline. The 2007 introduction of the Apple iPhone and the subsequent consumer-mobile-platform expansion across the 2008–2010 period had produced a substantive new operational target environment — mobile devices that consolidated communication, identification, location, and personal data into a single networked platform — for which commercial exploitation tooling had limited prior existence. NSO Group's institutional substantive technical contribution was the development of operational tooling for the mobile-platform target environment.

The substantively documented institutional development pathway across the 2011–2016 period produced successive Pegasus versions. The first commercially-deployed Pegasus version — substantively documented in the 2016 Citizen Lab disclosure of the operational deployment against UAE human-rights activist Ahmed Mansoor — was the iOS-targeted Pegasus 1.x platform with one-click delivery via SMS-message social-engineering. The substantive subsequent development across the 2017–2019 period produced the zero-click delivery capability — initial implementations through the iMessage and FaceTime exploitation chains, subsequent expansion through WhatsApp (the substantively documented May 2019 WhatsApp exploitation chain at the heart of the WhatsApp Inc. v. NSO Group civil litigation), and substantively the FORCEDENTRY iMessage-rendering exploitation chain documented in the Citizen Lab–Apple September 2021 disclosure.

The institutional Israeli regulatory framework for NSO Group's export operations is substantively the Defence Export Control Law of 2007 — the post-2007 Israeli statutory framework under which dual-use cybersecurity products are regulated as defence exports requiring Israeli Ministry of Defence licensing for export to specific government clients. The institutional substance of the licensing framework is that the Israeli MOD substantively reviews each NSO Group sale at the country-client level and substantively approves or rejects the proposed export. The substantively documented operational pattern is that the Israeli MOD has substantively approved Pegasus exports to approximately fifty country clients across the post-2011 period; substantively rejected exports to certain country clients (substantively the publicly-cited examples being Iran, the People's Republic of China, and the Russian Federation); and substantively re-licensed exports following adverse public-record disclosure (the post-2018 Khashoggi-related licensing review, the post-2021 Forbidden Stories disclosure-related licensing review).

Operational characteristics

The substantively documented operational characteristics of Pegasus across the 2016–present period — drawing on the Citizen Lab technical analysis, the Amnesty International Security Lab forensic-analysis methodology (Mobile Verification Toolkit), and the WhatsApp Inc. v. NSO Group civil-litigation discovery record — substantially comprise the following operational pattern.

Delivery vectors

The zero-click delivery vector is the substantively defining operational characteristic of Pegasus 2.x and later versions. The vector substantively requires no target-user interaction — the operational deployment of the implant is substantively triggered by the receipt of a specially-crafted message at the target device, with substantial documented variants across the post-2018 period including: WhatsApp voice-call delivery (the May 2019 vector that produced the WhatsApp Inc. v. NSO Group lawsuit); iMessage attachment-rendering delivery (the FORCEDENTRY chain documented in September 2021, exploiting the iOS CoreGraphics image-parsing component); and adjacent platform-vulnerability vectors. The one-click delivery vector — operational across the 2011–2016 period and substantially in continuing operational use as a fallback against zero-click-resistant targets — substantively requires target-user interaction with a delivered link.

Operational capability on the target device

The operational capability documented on substantively Pegasus-installed target devices includes: SMS-content extraction (full message-history archive); contact-list extraction (full contact-database archive); call-history extraction; real-time geolocation tracking; hot-microphone activation with audio capture; camera activation with photograph and video capture; encrypted-messenger content access (Signal, WhatsApp, Telegram, Wickr, iMessage) through interception of the unencrypted endpoint state on the target device; email-application content access; password and credential extraction; web-browser history and cookies extraction; and adjacent operational capability across the broader application landscape on the target device. The institutional substance of the capability is substantively comprehensive — the operational implant substantively produces full visibility into the institutional content the target user maintains on the target device.

Persistence and exfiltration

The institutional pattern of Pegasus persistence on the target device is substantively limited rather than indefinite — the operational implant is substantively designed for finite operational deployment rather than for indefinite persistence. The substantively documented operational pattern is that operational deployment is substantively initiated for a specific institutional purpose; operational persistence on the target device extends across days-to-weeks rather than years; and the implant substantively self-deletes upon completion of the operational requirement. The institutional rationale for the limited-persistence design is substantively the operational-security consideration of detection avoidance — the operational implant's substantive forensic footprint on the target device is substantively reduced by limited deployment duration. Exfiltration of collected data substantively occurs through the operational command-and-control channel to an NSO-customer-controlled infrastructure stack.

Documented deployments

The documented deployments of Pegasus across the post-2016 published institutional record substantially comprise:

Confirmed Ahmed Mansoor (UAE, 2016). The 24 August 2016 Citizen Lab disclosure of the operational targeting of UAE human-rights activist Ahmed Mansoor was the first substantively documented Pegasus deployment in the public record. The disclosure substantively established the institutional pattern that subsequent Citizen Lab and Amnesty International disclosures across the 2017–present period have substantially extended.

Confirmed Mexican journalists and political opposition (2014–present). The substantively documented Pegasus deployment in Mexico across the Calderón, Peña Nieto, and López Obrador presidential periods has substantially targeted approximately fifty journalists, civil-society activists, anti-corruption investigators, and political-opposition figures. The most substantively documented episodes have included: the 2017 Citizen Lab disclosure of the targeting of journalists Carmen Aristegui, Carlos Loret de Mola, and the broader Aristegui-affiliated journalistic cohort; the 2019 disclosure of the targeting of the relatives of the 43 disappeared Ayotzinapa students whose 2014 disappearance has been the principal Mexican-civil-society institutional question; and the substantial subsequent disclosures across the post-2018 period.

Confirmed Jamal Khashoggi institutional circle (2018). The substantively documented Pegasus deployment against members of the institutional circle of Saudi journalist Jamal Khashoggi, in the period preceding his 2 October 2018 killing at the Saudi consulate in Istanbul, has been the subject of substantial subsequent academic-and-policy commentary. The substantively documented targets included the spouse of Saudi journalist Omar Abdulaziz (a close associate of Khashoggi); the operational targeting was substantively conducted by the Saudi-government NSO-customer institutional-deployment vehicle.

Confirmed Catalan independence movement (2017–present). The substantively documented Pegasus deployment against members of the Catalan-independence-movement institutional cohort across the post-2017 period has been the subject of the April 2022 Citizen Lab CatalanGate disclosure, which substantively documented the targeting of approximately sixty-five Catalan-political and Catalan-civil-society figures including Members of the European Parliament Diana Riba and Jordi Solé; Catalan presidents Pere Aragonès and Quim Torra; and substantial subsequent additions.

Confirmed Hungarian journalists and civil-society figures (2018–21). The substantively documented Pegasus deployment in Hungary across the post-2018 period under the Orbán government has substantially targeted journalists at Direkt36 and Telex.hu, civil-society lawyers, anti-corruption investigators, and adjacent institutional cohorts.

Confirmed Indian opposition figures and journalists (2019–present). The 2021 Forbidden Stories disclosure substantially documented the Pegasus deployment in India against opposition political figures (Rahul Gandhi), journalists (Paranjoy Guha Thakurta), Election Commission officials, and substantial portions of the Indian civil-society institutional cohort.

The institutional position of NSO Group on these documented deployments has been the substantial pattern of customer-confidentiality non-acknowledgement combined with the institutional position that abuse-related operational deployments by client governments have been substantively the responsibility of the client governments rather than of NSO Group. The substantive subsequent institutional reform within NSO Group across the post-2018 period has substantially included the establishment of the institutional Human Rights Compliance Committee and the substantively documented termination of approximately ten country-client relationships across the post-2021 period.

The substantive subsequent institutional response to the Pegasus operational pattern has comprised three principal institutional tracks.

US Entity List designation (November 2021)

The 3 November 2021 designation of NSO Group on the US Department of Commerce Entity List substantially restricted the institutional ability of US-export-related transactions involving NSO Group products. The designation substantively constrained NSO Group's institutional access to US-developer cloud-computing services, US-supplier components, and US-financial-system transaction processing. The institutional consequences for NSO Group's commercial operations have been substantial across the post-2021 period.

Civil litigation record

The substantively major civil litigation against NSO Group across the post-2019 period has comprised: WhatsApp Inc. v. NSO Group (filed October 2019, ongoing as of 2026, with the substantive 2024 federal-court ruling that NSO Group was substantively liable for the WhatsApp exploitation under the Computer Fraud and Abuse Act of 1986); Apple Inc. v. NSO Group (filed November 2021, dismissed September 2024 on jurisdictional grounds following Apple's institutional concern that continued litigation would substantively expose Apple's institutional security-research methodology); and adjacent civil-litigation actions in Israeli, UK, French, and Catalan courts brought by individual targets.

Institutional reform proposals

The substantial post-2021 institutional reform proposals for the commercial-spyware industry have included: the March 2023 Biden Executive Order 14093 prohibiting US-government operational use of commercial spyware that has been deployed against US-government personnel or against civil-society targets; the substantially-coordinated US-EU joint declaration on commercial-spyware proliferation (September 2023); the Pall Mall Process diplomatic framework launched February 2024; and substantial subsequent multilateral institutional engagement.

Sources & Further Reading

  1. Bill Marczak and John Scott-Railton, The Million Dollar Dissident: NSO Group's iPhone Zero-Days used against a UAE Human Rights Defender, Citizen Lab Research Report 78, 24 August 2016 — the first substantively documented Pegasus deployment.
  2. The Pegasus Project, Forbidden Stories and Amnesty International, beginning 18 July 2021 — the principal investigative-journalism collaboration on the comprehensive Pegasus targeting record.
  3. Citizen Lab Targeted Threats Research, University of Toronto Munk School of Global Affairs and Public Policy — the substantial body of Pegasus-related forensic and policy research across the post-2016 period.
  4. Amnesty International Security Lab, Forensic Methodology Report: How to Catch NSO Group's Pegasus, 18 July 2021 — the technical-forensic methodology developed for Pegasus detection.
  5. WhatsApp Inc. v. NSO Group Technologies Ltd., No. 4:19-cv-07123, US District Court for the Northern District of California, filed 29 October 2019 — the principal civil-litigation track.
  6. Apple Inc. v. NSO Group Technologies Ltd., No. 3:21-cv-09078, US District Court for the Northern District of California, filed 23 November 2021 — the secondary civil-litigation track.
  7. US Department of Commerce, Commerce Adds NSO Group and Other Foreign Companies to Entity List for Malicious Cyber Activities, 3 November 2021.
  8. Citizen Lab, CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru, 18 April 2022.
  9. Executive Order 14093, Prohibition on Use by the United States Government of Commercial Spyware, 27 March 2023.
  10. Ronan Farrow, How Democracies Spy on Their Citizens, The New Yorker, 18 April 2022 — the substantial book-length-equivalent treatment of the Pegasus operational pattern.