Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0n1con3/the-nso-blacklist
List of NSO Pegasus's C2C Servers where will be used to control Pegasus.
https://github.com/0n1con3/the-nso-blacklist
adguard-blocklist adguardhome blocklist business-security cybersecurity dns dns-record foss homelab-setup hosting hosts infrastructure opnsense pfsense pfsense-firewall pfsense-netgate pihole-blocklists piholeblocklist safety-critical-systems security
Last synced: 8 days ago
JSON representation
List of NSO Pegasus's C2C Servers where will be used to control Pegasus.
- Host: GitHub
- URL: https://github.com/0n1con3/the-nso-blacklist
- Owner: 0n1cOn3
- Created: 2021-07-19T02:57:03.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2023-06-08T13:59:36.000Z (over 1 year ago)
- Last Synced: 2024-11-14T15:45:50.903Z (2 months ago)
- Topics: adguard-blocklist, adguardhome, blocklist, business-security, cybersecurity, dns, dns-record, foss, homelab-setup, hosting, hosts, infrastructure, opnsense, pfsense, pfsense-firewall, pfsense-netgate, pihole-blocklists, piholeblocklist, safety-critical-systems, security
- Homepage:
- Size: 42 KB
- Stars: 16
- Watchers: 3
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
🔍 How to catch NSO Group’s Pegasus
### Introduction
NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”.
This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project,
a collaborative investigation that involves more than 80 journalists from 17 media organizations
in 10 countries coordinated by Forbidden Stories with technical support of "Amnesty International’s Security Lab"*.### Why ?
However, on further analysis we* also noticed suspicious redirects and we can at least from the forensic work, use the information to prevent certain Domains and DNS's. it should make it harder for Pegasus, to communicate with the C&C's from the NSO Group.
### Purpose ?
This is a list of domains and DNSs which has been collected from Amnesty International’s Security Lab.
đź”— You can check the huge writeup here:
https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/
### PiHole/Adguard Home
The list can be added to pihole and giving a little bit a protection not to get attacked nor getting any other packages from their respective servers.
## Other Sources
đź”— https://github.com/Red-Laboratory/NSO-hosts
đź”— https://github.com/jjjxu/NSO_Pegasus_Blocklist
đź”— https://github.com/AmnestyTech/investigations