The new analysis challenges Pegasus maker's claims that the murdered journalist’s wife, Hanan Elatr, ‘was not a target’

Emirates flight attendant Hanan Elatr surrendered her two Android cellphones, laptop and passwords when security agents surrounded her at the Dubai airport. They drove her, blindfolded and in handcuffs, to an interrogation cell on the edge of the city, she said. There, she was questioned all night and into the morning about her fiance, Saudi journalist Jamal Khashoggi, reports Dana Priest of the Washington Post.

The next day, at 10:14 a.m. on April 22, 2018, while her devices were still in official custody, someone opened the Chrome browser on one of the Androids.

They tapped in the address of a website “https://myfiles[.]photos/1gGrRcCMO”, on the phone’s keyboard, fumbling over the tiny keys, making two typos, and then pressed “go,” according to a new forensic analysis by cybersecurity expert Bill Marczak of Citizen Lab. The process took 72 seconds.

The website sent the phone a powerful spyware package, known as Pegasus, according to the new analysis.

Over the next 40 seconds, the phone sent 27 status reports from its web browser to the website’s server, updating the progress it was making installing the spyware.

Read more

© Copyright LaPresse