Omer Benjakob
@omerbenj
Followers
6K
Following
8K
Media
869
Statuses
8K
Disinfo/cyber reporter @Haaretz @haaretzcom 📰 #TeamJorge #ProjectPegasus ■ Wikipedialogist ■ Covering knowledge in age of disinfo ■ Research fellow @lpiParis_
Born in New York, raised in Tel Aviv
Joined March 2009
SCOOP: We went undercover & discovered a secret disinformation-for-hire group called Team Jorge selling election interference, hack-and-leak & influence as a service. They claim to have meddled in 33 elections THREAD #TeamJorge @FredMetzo @GurMegiddo
haaretz.com
No Morals, No Qualms, No Borders: From an Office Building in Israel, Experts in Technological Manipulation Are Attacking Democracies, Media and Elections Across the World
54
557
983
Predator, developed by Israeli spyware firm Intellexa, is one of the most invasive spywares on the market. If successfully deployed and installed on a smartphone, there's not much it can't do | @omerbenj, @e_triantafillou & Lorenz Naegeli
haaretz.com
***
14
145
180
Check out the great thread by investigative partner@omerbenj at Haaretz
New investigation reveals Intellexa is thriving despite US sanctions, with new ops in Pakistan & Kazakhstan Internal docs obtained by @InsideStoryGR/@haaretzcom & analyzed by @amnesty reveal new tools & access. THREAD https://t.co/MGoTBzoGqK
1
1
2
@_clem1 @JulianVoeg Significantly Google has also announced threat notifications today, first time ever alerts sent for Predator! "several hundred accounts across various countries, including Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan" https://t.co/1GDgggkbEi
cloud.google.com
Commercial surveillance vendor Intellexa continues to thrive and exploit mobile zero-day vulnerabilities.
1
3
8
Simultaneously our partners at Google (@_clem1) and Recorded Future (@JulianVoeg) have published their own deep investigations into Intelellexa https://t.co/mFrTN2d199
recordedfuture.com
Uncover Intellexa’s global corporate web powering Predator spyware, front companies, and expanding targeting from civil society to executives worldwide.
1
4
8
A leaked training video show a client list (by codename): Dragon, Eagle, Falcon, Flamingo, Fox & more. Our investigation confirms Eagle is Kazakhstan; Phoenix, the 2023 Predator Files investigation found, was Libya. https://t.co/BlTsFhTgBg
1
3
6
Shockingly, the leaks shows that Intellexa kept REMOTE ACCESS to Predator systems deployed on government clients’ premises — meaning the company had the potential to see data about surveillance victims in real time.
1
4
10
🚨 A huge leak exposes the new targets and internal operations of Intellexa, the secretive and murky company behind the notorious Predator spyware. Introducing #IntellexaLeaks, a joint investigation with partners @insidestory_gr, @haaretzcom & WAV Research Collective 🧵👇
1
49
118
@brinlystorm Did Memento Labs (aka Hacking Team) just out themselves as also using TeamViewer to remote access Thor customer systems?!? 😅
1
4
4
#IntellexaLeaks: "🇵🇰Pakistan on Thursday refuted claims published in an @AmnestyTech report on Thursday that a #spyware product, manufactured by an Israeli company, was actively being used in the country." https://t.co/zPSOoCx88D
dawn.com
KARACHI: Pakistan on Thursday refuted claims published in an Amnesty International report on Thursday that a spyware...
0
2
3
Intellexa's Aladdin, which allows almost zero-click infections, was firm exposed as being in development by Intellexa last year by Haaretz and Inside Story. Our latest investigation shows its live and operational https://t.co/FyrxDiL2Pq
haaretz.com
***
5/ Next, we learn from the #PredatorFiles that Intellexa has been working on the "Aladdin" zero-click vector that uses online advertising as the mechanism of targeting. The targeting seems to work by knowing the target's public IP address. There's still a ton we have to learn
0
1
2
@AmnestyTech @citizenlab @Google 9/ Highly recommend the full investigation from @haaretzcom Inside Story & the WAV Research Collective. So many critical insights, like that Egypt & Saudi Predator clients appear to remain active despite sanctions & scandals. By @omerbenj @e_triantafillou & Lorenz Naegeli.
haaretz.com
***
1
7
13
WHOA details in our investigation here👇 https://t.co/1ddxFnOUAx
haaretz.com
***
WHOA: Predator spyware discovered in 🇵🇰#Pakistan. + a leak shows zero-click infections via... ads. Yikes. Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
0
4
13
Our investigation found that Intellexa's staff seemingly had some form of remote access to infection systems, something other spyware firms have long denied doing. The head of Memento Labs, an Italian hacking tech firm, told @TechCrunch's @lorenzofb this: https://t.co/FjevESgUcq
New investigation reveals Intellexa is thriving despite US sanctions, with new ops in Pakistan & Kazakhstan Internal docs obtained by @InsideStoryGR/@haaretzcom & analyzed by @amnesty reveal new tools & access. THREAD https://t.co/MGoTBzoGqK
0
1
4
Hacked in Pakistan: Israeli spyware firm Intellexa, owned by Ex-intel officer, still active amid U.S. sanctions | @omerbenj, @e_triantafillou & Lorenz Naegeli
haaretz.com
***
0
4
17
Hacked in Pakistan: Israeli Spyware Firm Intellexa Still Active Amid US Sanctions. New victims of Predator spyware identified, with secretive 0click Ad-based infections confirmed Bombshell expose by @omerbenj @e_triantafillou Lorenz Naegeli and @DonnchaC
haaretz.com
***
4
210
353
🔥 The #IntellexaLeaks ⚠ Νέα διεθνής έρευνα του @insidestory_gr σε συνεργασία με την @haaretzcom (@omerbenj) , WAV Research Collective (Lorenz Naegeli) και την τεχνική συνδρομή του Security Lab της @amnesty προχωρά σήμερα σε σημαντικές αποκαλύψεις: 📌 https://t.co/GJWBTTelju
2
60
94
➡️New victims of Predator #spyware identified, w. malicious TikTok links revealing new targets ➡️🇪🇬Egypt & 🇸🇦Saudi clients still active ➡️Ad-based infections confirmed ➡️Post-🇺🇸sanctions Intellexa operations ✍️ @omerbenj @e_triantafillou Lorenz Naegeli https://t.co/5qINRJEwgL
1
9
18
חברות סייבר ריגול תמיד טוענות שאין להן מושג מה עושים עם הכלים שלהן ואין להן גישה למערכות. @omerbenj בתחקיר פצצה בשיתוף עם אמנסטי וגופים נוספים חושף איך זה נראה באמת מאחורי הקלעים https://t.co/YplO5EOcAB
haaretz.co.il
הארץ
1
8
29
חשיפת "הארץ": שנתיים מאז הסנקציות, אינטלקסה של בכיר אמ"ן לשעבר חיה ובועטת, עם פריצות בעיראק ופקיסטאן ורוגלות בתוך באנרים. סרטון פנימי שדלף מספק הצצה נדירה לקרביים של נשק דיגיטלי מתקדם תחקיר @omerbenj ושותפינו ביוון, שווייץ ואמנסטי https://t.co/roYlGqRdcJ
haaretz.co.il
הארץ
1
11
35
This investigation was led by @amnesty's amazing @DonnchaC and the rest of the Security Lab team, which has for years done foundational work on spyware and helped reporters track the industry, published by @InsideStoryGR in Greece, @haaretzcom and WAV Research Collective
0
1
4