omerbenj Profile Banner
Omer Benjakob Profile
Omer Benjakob

@omerbenj

Followers
6K
Following
8K
Media
869
Statuses
8K

Disinfo/cyber reporter @Haaretz @haaretzcom 📰 #TeamJorge #ProjectPegasus ■ Wikipedialogist ■ Covering knowledge in age of disinfo ■ Research fellow @lpiParis_

Born in New York, raised in Tel Aviv
Joined March 2009
Don't wanna be here? Send us removal request.
@omerbenj
Omer Benjakob
3 years
SCOOP: We went undercover & discovered a secret disinformation-for-hire group called Team Jorge selling election interference, hack-and-leak & influence as a service. They claim to have meddled in 33 elections THREAD #TeamJorge @FredMetzo @GurMegiddo
Tweet card summary image
haaretz.com
No Morals, No Qualms, No Borders: From an Office Building in Israel, Experts in Technological Manipulation Are Attacking Democracies, Media and Elections Across the World
54
557
983
@haaretzcom
Haaretz.com
12 days
Predator, developed by Israeli spyware firm Intellexa, is one of the most invasive spywares on the market. If successfully deployed and installed on a smartphone, there's not much it can't do | @omerbenj, @e_triantafillou & Lorenz Naegeli
Tweet card summary image
haaretz.com
***
14
145
180
@DonnchaC
Donncha Ó Cearbhaill
12 days
Check out the great thread by investigative partner@omerbenj at Haaretz
@omerbenj
Omer Benjakob
12 days
New investigation reveals Intellexa is thriving despite US sanctions, with new ops in Pakistan & Kazakhstan Internal docs obtained by @InsideStoryGR/@haaretzcom & analyzed by @amnesty reveal new tools & access. THREAD https://t.co/MGoTBzoGqK
1
1
2
@DonnchaC
Donncha Ó Cearbhaill
12 days
@_clem1 @JulianVoeg Significantly Google has also announced threat notifications today, first time ever alerts sent for Predator! "several hundred accounts across various countries, including Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan" https://t.co/1GDgggkbEi
Tweet card summary image
cloud.google.com
Commercial surveillance vendor Intellexa continues to thrive and exploit mobile zero-day vulnerabilities.
1
3
8
@DonnchaC
Donncha Ó Cearbhaill
12 days
Simultaneously our partners at Google (@_clem1) and Recorded Future (@JulianVoeg) have published their own deep investigations into Intelellexa https://t.co/mFrTN2d199
Tweet card summary image
recordedfuture.com
Uncover Intellexa’s global corporate web powering Predator spyware, front companies, and expanding targeting from civil society to executives worldwide.
1
4
8
@DonnchaC
Donncha Ó Cearbhaill
12 days
A leaked training video show a client list (by codename): Dragon, Eagle, Falcon, Flamingo, Fox & more. Our investigation confirms Eagle is Kazakhstan; Phoenix, the 2023 Predator Files investigation found, was Libya. https://t.co/BlTsFhTgBg
1
3
6
@DonnchaC
Donncha Ó Cearbhaill
12 days
Shockingly, the leaks shows that Intellexa kept REMOTE ACCESS to Predator systems deployed on government clients’ premises — meaning the company had the potential to see data about surveillance victims in real time.
1
4
10
@DonnchaC
Donncha Ó Cearbhaill
12 days
🚨 A huge leak exposes the new targets and internal operations of Intellexa, the secretive and murky company behind the notorious Predator spyware. Introducing #IntellexaLeaks, a joint investigation with partners @insidestory_gr, @haaretzcom & WAV Research Collective 🧵👇
1
49
118
@DonnchaC
Donncha Ó Cearbhaill
12 days
@brinlystorm Did Memento Labs (aka Hacking Team) just out themselves as also using TeamViewer to remote access Thor customer systems?!? 😅
1
4
4
@criticalvas
Vas Panagiotopoulos
12 days
#IntellexaLeaks: "🇵🇰Pakistan on Thursday refuted claims published in an @AmnestyTech report on Thursday that a #spyware product, manufactured by an Israeli company, was actively being used in the country." https://t.co/zPSOoCx88D
Tweet card summary image
dawn.com
KARACHI: Pakistan on Thursday refuted claims published in an Amnesty International report on Thursday that a spyware...
0
2
3
@omerbenj
Omer Benjakob
11 days
Intellexa's Aladdin, which allows almost zero-click infections, was firm exposed as being in development by Intellexa last year by Haaretz and Inside Story. Our latest investigation shows its live and operational https://t.co/FyrxDiL2Pq
Tweet card summary image
haaretz.com
***
@jsrailton
John Scott-Railton
12 days
5/ Next, we learn from the #PredatorFiles that Intellexa has been working on the "Aladdin" zero-click vector that uses online advertising as the mechanism of targeting. The targeting seems to work by knowing the target's public IP address. There's still a ton we have to learn
0
1
2
@jsrailton
John Scott-Railton
12 days
@AmnestyTech @citizenlab @Google 9/ Highly recommend the full investigation from @haaretzcom Inside Story & the WAV Research Collective. So many critical insights, like that Egypt & Saudi Predator clients appear to remain active despite sanctions & scandals. By @omerbenj @e_triantafillou & Lorenz Naegeli.
Tweet card summary image
haaretz.com
***
1
7
13
@avischarf
avi scharf
12 days
WHOA details in our investigation here👇 https://t.co/1ddxFnOUAx
Tweet card summary image
haaretz.com
***
@jsrailton
John Scott-Railton
12 days
WHOA: Predator spyware discovered in 🇵🇰#Pakistan. + a leak shows zero-click infections via... ads. Yikes. Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
0
4
13
@omerbenj
Omer Benjakob
11 days
Our investigation found that Intellexa's staff seemingly had some form of remote access to infection systems, something other spyware firms have long denied doing. The head of Memento Labs, an Italian hacking tech firm, told @TechCrunch's @lorenzofb this: https://t.co/FjevESgUcq
@omerbenj
Omer Benjakob
12 days
New investigation reveals Intellexa is thriving despite US sanctions, with new ops in Pakistan & Kazakhstan Internal docs obtained by @InsideStoryGR/@haaretzcom & analyzed by @amnesty reveal new tools & access. THREAD https://t.co/MGoTBzoGqK
0
1
4
@haaretzcom
Haaretz.com
11 days
Hacked in Pakistan: Israeli spyware firm Intellexa, owned by Ex-intel officer, still active amid U.S. sanctions | @omerbenj, @e_triantafillou & Lorenz Naegeli
Tweet card summary image
haaretz.com
***
0
4
17
@avischarf
avi scharf
13 days
Hacked in Pakistan: Israeli Spyware Firm Intellexa Still Active Amid US Sanctions. New victims of Predator spyware identified, with secretive 0click Ad-based infections confirmed Bombshell expose by @omerbenj @e_triantafillou Lorenz Naegeli and @DonnchaC
Tweet card summary image
haaretz.com
***
4
210
353
@e_triantafillou
Eliza Triantafillou
12 days
🔥 The #IntellexaLeaks ⚠ Νέα διεθνής έρευνα του @insidestory_gr σε συνεργασία με την @haaretzcom (@omerbenj) , WAV Research Collective (Lorenz Naegeli) και την τεχνική συνδρομή του Security Lab της @amnesty προχωρά σήμερα σε σημαντικές αποκαλύψεις: 📌 https://t.co/GJWBTTelju
2
60
94
@criticalvas
Vas Panagiotopoulos
13 days
➡️New victims of Predator #spyware identified, w. malicious TikTok links revealing new targets ➡️🇪🇬Egypt & 🇸🇦Saudi clients still active ➡️Ad-based infections confirmed ➡️Post-🇺🇸sanctions Intellexa operations ✍️ @omerbenj @e_triantafillou Lorenz Naegeli https://t.co/5qINRJEwgL
1
9
18
@oyoyoy
Oded Yaron 🎗️
12 days
חברות סייבר ריגול תמיד טוענות שאין להן מושג מה עושים עם הכלים שלהן ואין להן גישה למערכות. @omerbenj בתחקיר פצצה בשיתוף עם אמנסטי וגופים נוספים חושף איך זה נראה באמת מאחורי הקלעים https://t.co/YplO5EOcAB
Tweet card summary image
haaretz.co.il
הארץ
1
8
29
@avischarf
avi scharf
13 days
חשיפת "הארץ": שנתיים מאז הסנקציות, אינטלקסה של בכיר אמ"ן לשעבר חיה ובועטת, עם פריצות בעיראק ופקיסטאן ורוגלות בתוך באנרים. סרטון פנימי שדלף מספק הצצה נדירה לקרביים של נשק דיגיטלי מתקדם תחקיר @omerbenj ושותפינו ביוון, שווייץ ואמנסטי https://t.co/roYlGqRdcJ
Tweet card summary image
haaretz.co.il
הארץ
1
11
35
@omerbenj
Omer Benjakob
12 days
This investigation was led by @amnesty's amazing @DonnchaC and the rest of the Security Lab team, which has for years done foundational work on spyware and helped reporters track the industry, published by @InsideStoryGR in Greece, @haaretzcom and WAV Research Collective
0
1
4