This database tracks details about victims of NSO Group’s Pegasus spyware. Each entry represents either an individual or small group of people, such as a team of lawyers. For that reason, you won't find single entries for the "1,400 mobile phones and devices" targeted through WhatsApp or "15,000 individuals" selected for surveillance in Mexico. The goal is to make each entry as comprehensive as possible by collecting and sorting published reports. The database is updated regularly as more information becomes available.
To view the data, you can:
- Click on the
.csv
file above to view the data right here on GitHub - Download a
.zip
file by clicking the greenCode
-button, then view it using Microsoft Excel - Download a
.zip
file by clicking the greenCode
-button, then import the.csv
into Google Sheets
Each entry contains information about one victim. An entry may contain information about a small group of people, such as a team of lawyers, until we have enough details to break it down further.
Field | Description | Example |
---|---|---|
name |
Name of the victim | Sarah Walker |
code_name |
Code name assigned to the victim | USJRN1 |
role |
Victim's role at the time | Journalist |
affiliation |
Victim's affiliation at the time | El Faro |
occurred |
The year the attack occurred | 2018 |
disclosed |
When the attack was disclosed | 2021-10-24 |
disclosed_by |
Who the attack was disclosed by | Citizen Lab |
forensics_by |
Who did the analysis/forensics | Lookout |
pegasus_project |
If the victim was named by the Pegasus Project | True |
tech_notified |
Tech company which notified the victim | Apple |
device_type |
Type of device | iPhone |
attack_result |
If the attack was attempted or successful | Successful |
lockdown_bypass |
If the attack bypassed Apple's Lockdown Mode | False |
attack_vector |
How the spyware was delivered | SMS |
exploit_name |
CVE or name of the exploit used | KISMET |
first_activity |
Date of first spyware activity | 2018-06-02 |
last_activity |
Date of last spyware activity | 2018-07-22 |
operator |
Country operating the spyware | Mexico |
sources |
List of sources | amnesty.org |
The Pegasus Project was a large-scale investigation into the use of NSO's Pegasus spyware, coordinated by Forbidden Stories with technical support from Amnesty International. At the center of the investigation was a leaked list of 50,000 phone numbers said to have been selected for surveillance by NSO's customers since 2016. Forbidden Stories and Amnesty International shared the data with 15 media partners, including the Guardian and the Washington Post. Due to the sheer number of potential victims disclosed by the investigation, this database may contain some discrepancies and duplicate entries.
We welcome assistance in making the data as complete as possible. Please reach out with any questions, feedback, updated or missing information, corrections, or requests for new fields. You can open an issue in this repository, or email runa@granitt.io.
The data is published under an Attribution-NonCommercial-ShareAlike 4.0 International CC BY-NC-SA 4.0 license.
Granitt was founded by Runa Sandvik with the goal of securing journalists and at-risk people around the world. To learn more about our work, see this TechCrunch interview from July 2022.?