**Projects** **GLA2010** **In the News** **About** **Publications** **Newsletter** **People** **Archives** **Events** **Opportunities** **Contact** ## The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender **_August 24, 2016_** **[Categories: Bill Marczak, John Scott-Railton, Reports and Briefings�](https://citizenlab.org/category/author/bill-marczak/)** **Authors: Bill Marczak and John Scott-Railton, Senior Researchers at the Citizen Lab, with the assistance of the research team at** **Lookout Security.** **[Media coverage: The New York Times, Motherboard, Gizmodo, Wired, Washington Post, ZDNet.](http://www.nytimes.com/2016/08/26/technology/apple-software-vulnerability-ios-patch.html)** **_This report describes how a government targeted an internationally recognized human rights defender, Ahmed Mansoor, with the_** **_Trident, a chain of zero-day exploits designed to infect his iPhone with sophisticated commercial spyware._** # 1. Executive Summary **Ahmed Mansoor is an internationally recognized human rights defender, based in the United Arab Emirates (UAE), and recipient of** **[the Martin Ennals Award (sometimes referred to as a “Nobel Prize for human rights”). On August 10 and 11, 2016, Mansoor](https://www.amnesty.org/en/latest/news/2015/10/ahmed-mansoor-selected-as-the-2015-laureate-martin-ennals-award-for-human-rights-defenders/)** **received SMS text messages on his iPhone promising “new secrets” about detainees tortured in UAE jails if he clicked on an** **included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to** **an exploit infrastructure connected to NSO Group, an Israel-based “cyber war” company that sells Pegasus, a government-** **exclusive “lawful intercept” spyware product. NSO Group is reportedly owned by an American venture capital firm, Francisco�** **Partners Management.** **The ensuing investigation, a collaboration between researchers from Citizen Lab and from Lookout Security, determined that the** **[links led to a chain of zero-day exploits (“zero-days”) that would have remotely jailbroken Mansoor’s stock iPhone 6 and installed](https://en.wikipedia.org/wiki/Zero-day_(computing))** **sophisticated spyware. We are calling this exploit chain Trident. Once infected, Mansoor’s phone would have become a digital spy** **in his pocket, capable of employing his iPhone’s camera and microphone to snoop on activity in the vicinity of the device, recording** **his WhatsApp and Viber calls, logging messages sent in mobile chat apps, and tracking his movements.** **We are not aware of any previous instance of an iPhone remote jailbreak used in the wild as part of a targeted attack campaign,** **making this a rare find.�** **The Trident Exploit Chain:** **[CVE-2016-4657: Visiting a maliciously crafted website may lead to arbitrary code execution](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657)** **[CVE-2016-4655: An application may be able to disclose kernel memory](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4655)** **[CVE-2016-4656: An application may be able to execute arbitrary code with kernel privileges](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4656)** **Once we confirmed the presence of what appeared to be iOS zero-days, Citizen Lab and Lookout quickly initiated a responsible�** **disclosure process by notifying Apple and sharing our findings. Apple responded promptly, and notified us that they would be�** **addressing the vulnerabilities. We are releasing this report to coincide with the availability of the iOS 9.3.5 patch, which blocks the** **Trident exploit chain by closing the vulnerabilities that NSO Group appears to have exploited and sold to remotely compromise** **iPhones.** **Recent Citizen Lab research has shown that many state-sponsored spyware campaigns against civil society groups and human** **[rights defenders use “just](https://targetedthreats.net/)** **[enough” technical sophistication, coupled with carefully planned deception. This case demonstrates that](https://citizenlab.org/2016/08/group5-syria/)** **not all threats follow this pattern. The iPhone has a well-deserved reputation for security. As the iPhone platform is tightly** **controlled by Apple, technically sophisticated exploits are often required to enable the remote installation and operation of iPhone** **monitoring tools. These exploits are rare and expensive. Firms that specialize in acquiring zero-days often pay handsomely for** **[iPhone exploits. One such firm, Zerodium, acquired an exploit chain similar to the Trident for �one million dollars in November 2015.](https://www.zerodium.com/ios9.html)** **The high cost of iPhone zero days the apparent use of NSO Group’s government exclusive Pegasus product andprior known** ----- **Remarkably, this case marks the third commercial “lawful intercept” spyware suite employed in attempts to compromise Mansoor. In** **2011, he was targeted with FinFisher’s FinSpy spyware, and in 2012 he was targeted with Hacking Team’s Remote Control System.** **Both Hacking Team and FinFisher have been the object of several years of revelations highlighting the misuse of spyware to** **compromise civil society groups, journalists, and human rights workers.** **Figure 1: Ahmed Mansoor, the “Million Dollar Dissident.”** **The attack on Mansoor is further evidence that “lawful intercept” spyware has significant abuse potential, and that some�** **governments cannot resist the temptation to use such tools against political opponents, journalists, and human rights defenders.** **Our findings also highlight the continuing lack of effective human rights policies and due diligence at spyware companies, and the�** **continuing lack of incentives to address abuses of “lawful intercept” spyware.** **Our report proceeds as follows:** **Section 2 provides an overview of the attack against Ahmed Mansoor.** **Section 3 details NSO Group’s tradecraft, gleaned from what appears to be a copy of NSO Group documentation leaked in** **the Hacking Team emails.** **Section 4 summarizes our technical analysis of the attack against Mansoor (in collaboration with Lookout).** **Section 5 describes how we found what appears to be the NSO Group’s mobile attack infrastructure while working on our** **[previous Stealth Falcon report.](https://citizenlab.org/2016/05/stealth-falcon/)** **Section 6 links the spyware used in the attack on Mansoor to NSO Group.** **Section 7 outlines evidence of other individuals targeted with the infrastructure that we linked to NSO Group, including** **Mexican journalist Rafael Cabrera.** **Section 8 explains how the attack on Mansoor fits into the context of ongoing attacks on UAE dissidents.�** **Section 9 concludes the report.** # 2. Ahmed Mansoor Targeted With iPhone Zero-Day **[Ahmed Mansoor is an internationally recognized human rights defender, blogger, and member of Human Rights Watch’s advisory](https://www.amnesty.org/en/latest/news/2015/10/ahmed-mansoor-selected-as-the-2015-laureate-martin-ennals-award-for-human-rights-defenders/)** ----- **punishment** **On the morning of August 10, 2016, Mansoor received an SMS text message that appeared suspicious. The next day he received a** **second, similar text. The messages promised “new secrets” about detainees tortured in UAE prisons, and contained a hyperlink to** **an unfamiliar website. The messages arrived on Mansoor’s stock iPhone 6 running iOS 9.3.3.** **Figure 2: Ahmed Mansoor received suspicious text messages in August 2016. Credit: Martin Ennals Foundation.** **Mansoor quickly forwarded the messages to Citizen Lab researchers for investigation. He has good reason to be concerned about** **unsolicited messages: every year since 2011, Mansoor has been targeted with spyware attacks, including with FinFisher spyware in** **[2011 and Hacking Team spyware in 2012 (see Section 8: Ahmed Mansoor and Previous UAE Attacks).](https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/)** **Figure 3: SMS text messages received by Mansoor (English: “New secrets about torture of Emiratis in state prisons”). The** **sender’s phone numbers are spoofed.** **When Mansoor’s messages reached us, we recognized the links: the domain name webadv.co belongs to a network of domains** **that we believe to be part of an exploit infrastructure provided by the spyware company NSO Group (see Section 6: Linking NSO** **Group Products to the Attack on Mansoor). We had first come across the NSO Group infrastructure during the course of our�** **[earlier research into Stealth Falcon a UAE based threat actor (see Section 5: Tracking a Mobile Attack Infrastructure)](https://citizenlab.org/2016/05/stealth-falcon/)** ----- **g** **y** **g** **g** **p** **g** **previously found several public occurrences of links involving these domains on Twitter (see Section 7: Evidence of Other** **Targets), none of the links we found seemed to be active (i.e., none produced an infection when we tested them). In other exploit** **[infrastructures with which we are familiar (e.g., Hacking Team’s exploit infrastructure), we had noted that operators prefer to](https://wikileaks.org/hackingteam/emails/emailid/121783)** **deactivate such links after a single click, or after a short period of time, perhaps in order to prevent the disclosure of the exploit to** **security researchers.** **We accessed the link Mansoor provided us on our own stock factory-reset iPhone 5 (Mansoor had an iPhone 6) with iOS 9.3.3 (the** **same version as Mansoor). When we clicked the link, we saw that it was indeed active, and watched as unknown software was** **remotely implanted on our phone. This suggested that the link contained a zero-day iPhone remote jailbreak: a chain of heretofore** **unknown exploits used to remotely circumvent iPhone security measures. To verify our observations, we shared our findings with�** **Lookout Security. Both research teams determined that Mansoor was targeted with a zero-day iPhone remote jailbreak. The chain** **of exploits, which we are calling the Trident, included the following (see Section 4: The Trident iOS Exploit Chain and Payload for** **more details):** **[CVE-2016-4657: An exploit for WebKit, which allows execution of the initial shellcode](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657)** **[CVE-2016-4655: A Kernel Address Space Layout Randomization (KASLR) bypass exploit to find the base address of the�](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4655)** **kernel** **[CVE-2016-4656: 32 and 64 bit iOS kernel exploits that allow execution of code in the kernel, used to jailbreak the phone and](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4656)** **allow software installation** **The implant installed by the Trident exploit chain would have turned Mansoor’s iPhone into a digital spy in his pocket. The spyware,** **which appears to be NSO’s Pegasus spyware solution, was capable of employing his iPhone’s camera and microphone to** **eavesdrop on activity in the vicinity of the device, recording his WhatsApp and Viber calls, logging messages sent in mobile chat** **apps, and tracking his movements.** # 3. NSO Group and the Pegasus Solution **[The attack on Mansoor appears to have used Pegasus, a remote monitoring solution sold by NSO Group Technologies Ltd (see](http://www.haaretz.com/israel-news/business/1.574805)** **Section 6: Linking NSO Group Products to the Attack on Mansoor). NSO Group, based in Herzelia, Israel (CR# 514395409),** **develops and sells mobile phone surveillance software to governments around the world. The company describes itself as a** **[“leader” in “mobile and cellular Cyber Warfare,” and has been operating for more than six years since its founding in 2010.](https://www.documentcloud.org/documents/815991-1276-nso-group-brochure-pegasus.html)** **NSO Group appears to be owned by a private equity firm with headquarters in San Francisco: �Francisco Partners Management** **[LLC, which reportedly acquired it in 2014 after approval from the Israeli Defense Ministry. However, as of November 2015,](http://www.haaretz.com/israel-news/business/.premium-1.580721)** **[Francisco Partners was reportedly exploring selling NSO Group, with a stated valuation of up to $1 billion. Interestingly, Francisco](http://www.reuters.com/article/us-nsogroup-m-a-idUSKCN0SR2JF20151103)** **[Partners previously invested in Blue Coat, a company selling network filtering and monitoring solutions, whose technology has been�](http://www.franciscopartners.com/investments/blue-coat)** **[used by repressive regimes according to previous Citizen Lab research.](https://citizenlab.org/2013/07/planet-blue-coat-redux/)** **[Figure 4: Image from an NSO Group brochure posted on SIBAT (The International Defense Cooperation Directorate of the](https://web.archive.org/web/20120813064018/http://www.sibat.mod.gov.il/NR/rdonlyres/DADE8D1E-DFAA-4143-BB48-A73C77C88CBA/0/NSOGROUPE.pdf)** **Israel Ministry of Defense).** **NSO Group has largely avoided the kind of high profile media attention that companies like Hacking Team and FinFisher have�** **sometimes courted. The company maintains no website, there is little concrete information about NSO Group’s Pegasus product** **available online, and we know of no prior technical analysis of NSO Group’s products or infrastructure.** **[Some previous media reports have linked NSO Group](http://foreignpolicy.com/2016/01/22/the-espionage-econom)** **[and Pegasus to a scandal involving potential illegal eavesdropping in](http://impresa.prensa.com/panorama/Virzi-ligado-compra-equipo-Pegasus_0_4267073341.html)** **[Panama, and possible sales to Mexico. Other reports have suggested that NSO Group’s activities have aroused concern within the](https://privacyinternational.org/sites/default/files/global_surveillance.pdf)** **United States intelligence community.** ----- **entered the defense business when potential clients saw the capabilities of NSO Group’s tools.** **Figure 5: Kaymera’s website promises comprehensive mobile security** ## 3.1. Pegasus Documents in Hacking Team Leak **[Much of the publicly available information about Pegasus seems to be rumor, conjecture, or unverifiable claims made to media� about](http://blogs.wsj.com/digits/2014/08/01/can-this-israeli-startup-hack-your-phone/)** **[capabilities. However, when we examined the Hacking Team emails leaked online after a 2015 breach, we found several instances](https://wikileaks.org/hackingteam/emails/)** **of Hacking Team clients or resellers sharing what appeared to be NSO Group’s product documentation and sales pitches.** **For instance, in December 2014, a reseller of surveillance technologies to the Mexican government forwarded a PDF document** **[containing detailed technical specifications of NSO Group’s Pegasus system to Hacking Team�. According to the document’s](https://wikileaks.org/hackingteam/emails/emailid/5391)** **[metadata, it appears to have been created in December 2013 by Guy Molho, who is listed on LinkedIn as the Director of Product](https://www.linkedin.com/in/guymolho)** **Management at NSO Group.** ## 3.2. Device Infection **According to the purported 2013 NSO Group Pegasus documentation found in the Hacking Team materials, NSO Group offers two** **remote installation vectors for spyware onto a target’s device: a zero-click vector, and a one-click vector. The one-click vector** **involves sending the target a normal SMS text message with a link to a malicious website. The malicious website contains an** **exploit for the web browser on the target’s device, and any other required exploits to implant the spyware. In the attack against** **Mansoor, the Trident exploit chain was used.** **To use NSO Group’s zero-click vector, an operator instead sends the same link via a special type of SMS message, like a WAP** **Push Service Loading (SL) message. A WAP Push SL message causes a phone to automatically open a link in a web browser** **instance, eliminating the need for a user to click on the link to become infected. Many newer models of phones have started** **ignoring or restricting WAP Push messages. Mobile network providers may also decide to block these messages.** ----- **The documentation refers to a malicious website employed in installation of the spyware (“Agent”) as an Anonymizer, which** **communicates with a Pegasus Installation Server located on the operator’s premises. When a target visits a malicious link from** **[their device, the Anonymizer forwards the request to the Pegasus Installation Server, which examines the target device’s User-Agent](https://en.wikipedia.org/wiki/User_agent)** **header to determine if Pegasus has an exploit chain, such as the Trident, that supports the device.** **If the device is supported, the Pegasus Installation Server returns the appropriate exploit to the target device through the** **Anonymizer and attempts an infection. If infection fails for any reason, the target’s web browser will redirect to a legitimate website** **specified by the Pegasus operator, in order to avoid arousing the target’s suspicion.�** **In the operation targeting Mansoor, the one-click vector was used, with anonymizer sms.webadv.co (see Section 4: The Trident** **iOS Exploit Chain and Payload for more details).** ## 3.3. Data Collection **According to the purported NSO Group documentation, once successfully implanted on a phone using an exploit chain like the** **Trident, Pegasus can actively record or passively gather a variety of different data about the device. By giving full access to the** **phone’s files, messages, microphone and video camera, the operator is able to turn the device into a silent digital spy in the target’s�** **pocket.** **Figure 7: Diagram from purported NSO Group Pegasus documentation showing the range of information gathered from a** **[device infected with Pegasus. Source: Hacking Team Emails.](https://wikileaks.org/hackingteam/emails/emailid/5391)** **In the spyware used in targeting Mansoor, we confirmed many elements of this functionality, and observed indications that the�** **collection of the following types of data was supported, among others (see Section 4.2: The Payload for more details):** **Calls made by phone, WhatsApp and Viber,** **SMS messages, as well as messages and other data from popular apps like Gmail, WhatsApp, Skype, Facebook,** **KakaoTalk, Telegram, and others,** **A wide range of personal data, such as calendar data and contact lists, as well as passwords, including Wi-Fi passwords.** ## 3.4. Exfiltration� **According to the purported NSO Group documentation, an infected device transmits collected information back to a Pegasus Data** **_Server at the operator’s premises, via the PATN (Pegasus Anonymizing Transmission Network). The PATN appears to be a proxy_** **[chain system similar to Hacking Team’s anonymizers and FinFisher’s relays. The chain is intended to obfuscate the identity of the](https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/)** **government client associated with a particular operation** **Once the collected information arrives on the Pegasus Data Server an** ----- **Figure 8: A purported screenshot of NSO Group’s Pegasus Working Station software, which visualizes location data** **[collected from infected devices (as of March 2012). Source: Hacking Team Emails.](https://wikileaks.org/hackingteam/emails/emailid/5391)** **The implant in the attack targeting Mansoor communicated with two PATN nodes: aalaan.tv and manoraonline.net. The first of�** **[these, aalaan.tv, appears to be a lookalike domain for the legitimate alaan.tv, a Gulf-based satellite television channel (see Section](http://www.alaan.tv/)** **5.2 for more details on lookalike domains observed in apparent NSO Group infrastructure).** ## 3.5. Prioritizing Stealth **One interesting design decision of NSO Group’s Pegasus system, according to the purported NSO Group documentation, is that it** **emphasizes stealth above almost all else. As the documentation states:** **_In general, we understand that it is more important that the source will not be exposed and the target will suspect_** **_nothing than keeping the agent alive and working._** **Certain Pegasus features are only enabled when the device is idle and the screen is off, such as “environmental sound recording”** **(hot mic) and “photo taking.” The documentation also states that the spyware implements a “self-destruct mechanism,” which may** **be activated automatically “in cases where a great probability of exposing the agent exists.” However, the documentation claims** **that sometimes Pegasus removal can result in an infected device rebooting immediately after removal.** # 4. The Trident iOS Exploit Chain and Payload **_In this section, we describe our technical analysis of the attack on Mansoor, including the Trident iOS Exploit chain and payload._** **_Given the accelerated timeframe of this case, we are publishing the results of a preliminary analysis._** **Recall that the investigation that led to the discovery of the Trident exploit chain began when UAE human rights activist Ahmed** **Mansoor forwarded to Citizen Lab two suspicious links that he received via SMS on his iPhone (Section 2). Suspecting the links to** **be iPhone spyware associated with NSO Group (Section 6), we accessed them from our own stock factory-reset iPhone 5 running** **iOS 9.3.3. Mansoor’s device is an iPhone 6, running iOS 9.3.3; we did not have an iPhone 6 available for testing. Although the** **[latest iOS version when Mansoor received the links was 9.3.4, this version had been released only one week beforehand.](https://support.apple.com/en-us/HT207026)** **We accessed the links by opening Safari on our iPhone, and manually transcribing the links from the screenshots that Mansoor** **sent. After about ten seconds of navigating to the URL, which displayed a blank page, the Safari window closed, and we observed** **no further visual activity on the iPhone’s screen. Meanwhile, we saw that the phone was served what appeared to be a Safari** **exploit, followed by intermediate files (�final111�), and a final payload (�test111.tar). The first two payloads form the Trident exploit�** **chain, and test111.tar is the payload.** ----- **Figure 9: Requests from our phone to sms.webadv.co as we clicked on the malicious link. The first request is our click on�** **the link. The requests for ntf_bed.html, ntf_brc.html, and test111.tar are conducted by a stage2 binary (in final111). All�** **previous requests are conducted by Safari.** **Suspecting what we had observed to be the work of a zero-day iPhone remote jailbreak, we shared the exploit and payloads with** **colleagues at Lookout Security, initiated a responsible disclosure process with Apple, and sent Apple the exploit and payloads.** ## 4.1. The Trident Exploit Chain **_This section provides a high-level overview of the Trident exploit chain used in the attack against Mansoor. For further details, see_** **_[Lookout’s report.](https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf)_** **When a user opens the links sent to Mansoor on an iPhone, a stage1 containing obfuscated JavaScript is downloaded. The** **JavaScript downloads (via XMLHttpRequest) stage2 binaries for either 32-bit (iPhone 5 and earlier) or 64-bit (iPhone 5s and later),** **depending on the type of device. The stage1 employs a previously undocumented memory corruption vulnerability in WebKit to** **execute this code within the context of the Safari browser (CVE-2016-4657).** **The stage2 exploits a function that returns a kernel memory address, from which the base address of the kernel can be mapped** **(CVE-2016-4655). The stage2 then employs a memory corruption vulnerability in the kernel (CVE-2016-4656). This last** **vulnerability is employed to disable code signing enforcement, allowing the running of unsigned binaries. The stage2 downloads** **and installs the stage3, which is the spyware payload.** ## 4.2. The Payload **_[This section provides a high-level overview of the functionality of the spyware payload. For more details, see Lookout’s report.](https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf)_** ### 4.2.1. Persistence **The Trident is re-run locally on the phone at each boot, using the JavaScriptCore binary. To facilitate persistence, the spyware** **disables Apple’s automatic updates, and detects and removes other jailbreaks.** ### 4.2.2. Recording **[The attack payload includes a renamed copy of Cydia Substrate, a third-party app developer framework, which it uses to help](http://www.cydiasubstrate.com/)** **facilitate recording of messages and phone calls from targeted apps. To record WhatsApp and Viber calls, the spyware injects** **WhatsApp and Viber using the Cydia Substrate, hooks various call status methods, and sends system-wide notifications when call�** **events occur; the spyware listens for these notifications and starts or stops recording as appropriate. It appears that the payload�** **i** **l di** **iM** **G** **il Vib** **F** **b** **k Wh** **A** **T l** **Sk** **Li** **K k** **T lk W Ch** **S** ----- **passwords and networks.** ### 4.2.3. Exfiltration� **The attack payload beacons back to command and control (C2) servers delivered in stage2 of the Trident, via HTTPS. One of the** **binaries in the stage2 of the link sent to Mansoor contained the following string:** **WW91ciBHb29nbGUgdmVyaWZpY2F0aW9uIGNvZGUgaXM6NTY3ODQyOQpodHRwOi8vZ21haWwuY29tLz96PUZFY0NBQT09Jmk9TVRwa** **FlXeGhZVzR1ZEhZNk5EUXpMREU2YldGdWIzSmhiMjVzYVc1bExtNWxkRG8wTkRNPSZzPXpwdnpQU1lTNjc0PQ==** **The Base64 string decodes to:** **Your Google verification code is:5678429** **http://gmail.com/?z=FEcCAA==&i=MTphYWxhYW4udHY6NDQzLDE6bWFub3Jhb25saW5lLm5ldDo0NDM=&s=zpvzPSYS674=** **This appears designed to look like a text message from Google containing a two-factor authentication code, though legitimate** **Google messages of this type do not contain a link, and contain one fewer digit in the verification code. Base64-decoding the “i”�** **parameter of the URL yields:** **1:aalaan.tv:443,1:manoraonline.net:443** **These are the C2 servers for the spyware sent to Mansoor: aalaan.tv and manoraonline.net.** **A similar obfuscation appears to be used for exchange of information over SMS between an infected phone and the C2 Server. In** **case the spyware’s C2 servers are disabled or unreachable, an operator may deliver updated C2 servers to an infection using this** **[type of SMS, similar to FinFisher’s “emergency configuration update�” functionality.](https://citizenlab.org/2012/08/the-smartphone-who-loved-me-finfisher-goes-mobile/)** # 5. Tracking a Mobile Attack Infrastructure **_This section explains how we first identified what appeared to be a mobile attack infrastructure while tracking Stealth Falcon. We�_** **_then outline some basic observations about the infrastructure, including themes in the domain names used by the attackers. We_** **_link the infrastructure we found to NSO Group in Section 6._** ## 5.1. Stealth Falcon Leads Us to a Mobile Attack Infrastructure **[A year or so before Ahmed Mansoor received his suspicious SMS messages, we were tracking Stealth Falcon, a threat actor](https://citizenlab.org/2016/05/stealth-falcon/)** **targeting individuals critical of the UAE government at home and abroad, several of whom were later arrested. For full details on** **[Stealth Falcon, read our May 2016 report.](https://citizenlab.org/2016/05/stealth-falcon/)** **In the course of our investigation, we traced Stealth Falcon’s spyware to dozens of different command and control (C2) domains.** **One server that matched our C2 fingerprint for Stealth Falcon’s custom spyware, �icloudcacher.com, was connected to the email** **address pn1g3p@sigaint.org, according to data in its DNS SOA record. The same email address appeared in WHOIS records for** **the following three domains:** **asrarrarabiya.com** **asrararabiya.co** **asrararablya.com** **These domains did not match our Stealth Falcon fingerprint. As we examined the domains, however, we found that the index page�** **on these domains contained an iframe pointing to the website asrararabiya.com (Asrar Arabiya, or “Arabian Secrets” in English),** **[which appears to be a benign website that takes a critical view of the Arab World’s “dictatorships.” The index page also contained a](http://asrararabiya.com/%D9%85%D9%86-%D9%86%D8%AD%D9%86/)** **nearly invisible iframe pointing to an odd looking site, smser.net.** **** **** **Figure 10: HTML content of the index page on the three fake “Asrar Arabiya” domains.** ----- **https://smser.net/redirect.aspx.** **