meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

100: NSO

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 31 August 2021

⏱️ 73 minutes

🧾️ Download transcript

Summary

The NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile phone. They sell this spyware to government agencies around the world. How is it used and what kind of company is the NSO Group? Thanks to John Scott-Railton and Citizen Lab for investigating this and sharing their research. Sponsors Support for this show comes from Detectify. Try their web vulnerability scanner free. Go to https://detectify.com/?utm_source=podcast&utm_medium=referral&utm_campaign=DARKNET Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/. Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. For a full list of sources used in this episode and complete transcripts visit https://darknetdiaries.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Hey, I can't believe we made its episode 100.

0:04.2

And seriously, I couldn't have done it without all the support from my listeners.

0:07.8

So truly, thank you so much for tuning in.

0:10.6

This has been amazing.

0:12.2

And I can't wait to see what the next 100 episodes brings.

0:15.4

Okay, so real quick, before we get started, this is the second part of a two-part episode.

0:20.4

If you haven't already, go back and listen to the episode just before this, number 99, called The Spy.

0:26.6

There's this malware called Magic Lantern.

0:30.5

And I find it fascinating.

0:32.1

It usually infects the computer through an email attachment.

0:35.0

You get the email, which says to open the attachment, and when you do Zang, your computer is infected.

0:41.0

And what Magic Lantern does is it records your keystrokes and sends everything you type back to a central system.

0:47.4

So the hackers can see everything you type.

0:50.4

Now, of course, with a keystroke logger like this, it can pick up any message you send to people,

0:55.6

private chats, and of course your passwords.

0:58.6

So who's the shady hacking group that uses Magic Lantern?

1:03.0

The FBI.

1:04.6

Yeah, in 2001, someone issued a Freedom of Information request and got back information that the FBI uses this Magic Lantern malware

1:12.2

to capture keystrokes on target computers.

1:14.6

Now, I'm under the impression that the FBI would need to get permission to use this software, like a search warrant or something.

1:20.6

So this would classify Magic Lantern to be a lawful intercept mechanism.

1:25.0

Meaning they had permission to basically wiretap someone.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.