【學英文看科技】兩名歐洲記者驚傳遭政府間諜軟體入侵!揭開監控醜聞的冰山一角。
2025-6-16
| 2025-6-16
字數 4575閱讀時間 12 分鐘
type
status
date
slug
summary
tags
category
icon
password

📢【新聞標題】

Two European journalists were hacked using government spyware
兩名歐洲記者遭政府間諜軟體駭客入侵

📰【摘要】

Two European journalists were hacked using government spyware made by Israeli surveillance tech provider Paragon, new research has confirmed. The researchers said both journalists were hacked by the same Paragon customer, based on evidence found on the two journalists’ devices. The confirmation of the first-ever known Paragon infections further deepens an ongoing spyware scandal that, for now, appears to be mostly focused on the use of spyware by the Italian government, but could expand to include other countries in Europe.
最新研究證實,兩名歐洲記者遭以色列監控技術供應商Paragon製造的政府間諜軟體駭客入侵。研究人員表示,根據在兩名記者設備上發現的證據,兩名記者都遭到同一Paragon客戶的駭客攻擊。首次確認Paragon間諜軟體感染,進一步加深了持續不斷的間諜軟體醜聞,目前看來,該醜聞主要集中在義大利政府使用間諜軟體,但可能會擴大到包括歐洲其他國家。

🗝️【關鍵詞彙表】

📝 spyware (n.)

  • 間諜軟體
  • 例句: Two European journalists were hacked using government spyware.
  • 翻譯: 兩名歐洲記者遭政府間諜軟體駭客入侵。

📝 forensic (adj.)

  • 法醫的;鑑識的
  • 例句: The Citizen Lab published a new report detailing the results of a new forensic investigation.
  • 翻譯: 公民實驗室發表了一份新報告,詳細介紹了一項新的鑑識調查的結果。

📝 notified (v.)

  • 通知
  • 例句: WhatsApp first notified around 90 of its users.
  • 翻譯: WhatsApp 首先通知了大約 90 名用戶。

📝 revelations (n.)

  • 揭露、曝光
  • 例句: These new revelations come months after WhatsApp first notified around 90 of its users.
  • 翻譯: 這些新揭露發生在 WhatsApp 首先通知大約 90 名用戶的幾個月後。

📝 attribute (v.)

  • 歸因於
  • 例句: For now, The Citizen Lab has not attributed Pellegrino’s and the other unnamed European journalist’s hacks to any government.
  • 翻譯: 目前,公民實驗室尚未將佩萊格里諾和另一位不具名的歐洲記者遭駭客入侵歸因於任何政府。

📝 compromised (adj.)

  • 受損的;被洩露的
  • 例句: After analyzing his device, The Citizen Lab said it found traces of a spyware infection, but could not link the compromise to a particular spyware maker nor any government.
  • 翻譯: 在分析了他的設備後,公民實驗室表示,它發現了間諜軟體感染的痕跡,但無法將此受損事件與特定的間諜軟體製造商或任何政府聯繫起來。

📝 zero-click (adj.)

  • 零點擊
  • 例句: Citizen Lab said the journalist was hacked with “a sophisticated zero-click attack against the device via iMessage”.
  • 翻譯: 公民實驗室表示,該記者遭受到「通過 iMessage 對設備進行的複雜零點擊攻擊」的駭客攻擊。

✍️【文法與句型】

📝 based on evidence found on...

  • 說明: Used to indicate that a conclusion or statement is supported by specific evidence discovered.
  • 翻譯: 用於表明結論或陳述受到已發現的特定證據的支持。
  • 例句: The researchers said both journalists were hacked by the same Paragon customer, based on evidence found on the two journalists’ devices.
  • 翻譯: 研究人員表示,根據在兩名記者設備上發現的證據,兩名記者都遭到同一Paragon客戶的駭客攻擊。

📝 puts into question...

  • 說明: To cast doubt on something or cause people to doubt something.
  • 翻譯: 使某事受到質疑或使人們懷疑某事。
  • 例句: The Citizen Lab’s new report puts into question COPASIR’s conclusions.
  • 翻譯: 公民實驗室的新報告使COPASIR的結論受到質疑。

📝 It is possible that...

  • 說明: Used to express a possibility or suggestion.
  • 翻譯: 用於表達可能性或建議。
  • 例句: It is possible that someone was hoping to gain information about Fanpage by hacking my smartphone.
  • 翻譯: 有可能有人希望通過入侵我的智慧型手機來獲取有關 Fanpage 的資訊。

📖【全文與翻譯】

Two European journalists were hacked using government spyware made by Israeli surveillance tech provider Paragon, new research has confirmed.
最新研究證實,兩名歐洲記者遭以色列監控技術供應商Paragon製造的政府間諜軟體駭客入侵。

On Thursday, digital rights group The Citizen Lab published a new report detailing the results of a new forensic investigation into the iPhones of Italian journalist Ciro Pellegrino and an unnamed “prominent” European journalist.
週四,數位權利組織公民實驗室發表了一份新報告,詳細介紹了一項新的鑑識調查的結果,該調查針對義大利記者西羅·佩萊格里諾和一位不具名的「著名」歐洲記者的iPhone。

The researchers said both journalists were hacked by the same Paragon customer, based on evidence found on the two journalists’ devices.
研究人員表示,根據在兩名記者設備上發現的證據,兩名記者都遭到同一Paragon客戶的駭客攻擊。

Until now, there was no evidence that Pellegrino, who works for online news website Fanpage, had been either targeted or hacked with Paragon spyware.
到目前為止,沒有證據表明在線上新聞網站 Fanpage 工作的佩萊格里諾,曾被 Paragon 間諜軟體鎖定或入侵。

When he was alerted by Apple at the end of April, the notification referred to a mercenary spyware attack, but did not specifically mention Paragon, nor whether his phone had been infected with the spyware.
當他在四月底收到 Apple 的警報時,該通知提到了一次僱傭間諜軟體攻擊,但沒有特別提到 Paragon,也沒有提到他的手機是否感染了該間諜軟體。

The confirmation of the first-ever known Paragon infections further deepens an ongoing spyware scandal that, for now, appears to be mostly focused on the use of spyware by the Italian government, but could expand to include other countries in Europe.
首次確認 Paragon 間諜軟體感染,進一步加深了持續不斷的間諜軟體醜聞,目前看來,該醜聞主要集中在義大利政府使用間諜軟體,但可能會擴大到包括歐洲其他國家。

These new revelations come months after WhatsApp first notified around 90 of its users in over two dozen countries in Europe and beyond, including journalists, that they had been targeted with Paragon spyware, known as Graphite.
這些新揭露發生在 WhatsApp 首先通知包括記者在內的,在歐洲和以外的二十多個國家/地區的大約 90 名用戶,他們已成為 Paragon 間諜軟體(稱為 Graphite)的目標的幾個月後。

Among those targeted were several Italians, including Pellegrino’s colleague and Fanpage director Francesco Cancellato, as well as nonprofit workers who help rescue migrants at sea.
被鎖定的人中有幾位義大利人,包括佩萊格里諾的同事兼 Fanpage 總監弗朗切斯科·坎切拉托,以及幫助在海上營救移民的非營利組織工作人員。

Last week, Italy’s parliamentary committee known as COPASIR, which oversees the country’s intelligence agencies’ activities, published a report that said it found no evidence that Cancellato was spied on.
上週,負責監督該國情報機構活動的義大利議會委員會 COPASIR 發布了一份報告,稱未發現任何坎切拉托遭到監視的證據。

The report, which confirmed that Italy’s internal and external intelligence agencies AISI and AISE were Paragon customers, made no mention of Pellegrino.
該報告證實義大利國內和國外情報機構 AISI 和 AISE 是 Paragon 的客戶,但沒有提及佩萊格里諾。

The Citizen Lab’s new report puts into question COPASIR’s conclusions.
公民實驗室的新報告使COPASIR的結論受到質疑。

“A week ago it seemed like Italy was putting this scandal to bed. Now they’ll have to reckon with new forensic evidence,” John Scott-Railton, a senior researcher at The Citizen Lab, told TechCrunch ahead of the report’s publication.
「一週前,義大利似乎正在平息這起醜聞。現在他們將不得不考慮新的鑑識證據,」公民實驗室的高級研究員約翰·斯科特-雷爾頓在報告發布前告訴 TechCrunch。

“Ciro’s case adds to the big and politically tricky question: Who has been hacking Italian journalists with Paragon spyware? This mystery needs an answer.”
「西羅的案例加劇了一個巨大的且在政治上棘手的問題:誰一直在使用 Paragon 間諜軟體入侵義大利記者?這個謎團需要一個答案。」

Scott-Railton said The Citizen Lab believes that the Italian government is in a position to definitively answer questions about what was done with their use of Paragon spyware, particularly regarding Ciro’s case.
斯科特-雷爾頓表示,公民實驗室認為,義大利政府能夠明確回答有關他們使用 Paragon 間諜軟體做了什麼的問題,特別是關於西羅的案例。

Pellegrino told TechCrunch that he believes that his civil rights have been “trampled upon.”
佩萊格里諾告訴 TechCrunch,他認為他的公民權利受到了「踐踏」。

“I understand that Prime Minister Meloni is a professional journalist like me (I have been a journalist since 2005, she has since 2006),” Pellegrino told TechCrunch.
「我知道梅洛尼總理是一位像我一樣的專業記者(我自 2005 年以來一直是一名記者,她自 2006 年以來一直是記者),」佩萊格里諾告訴 TechCrunch。

“Does she care about the rights of this type of workers? Why has she not spent a single word in solidarity with the journalists who have been spied on?”
「她關心這類工人的權利嗎?為什麼她沒有說一句話來聲援那些遭到監視的記者?」

After Cancellato revealed he had been targeted with spyware, the Italian government published a press release denying it was behind the targeting of any journalist or human rights activists.
在坎切拉托透露他已成為間諜軟體的目標後,義大利政府發布新聞稿,否認其是任何記者或人權活動家成為目標的幕後黑手。

The fact that both Cancellato and Pellegrino work for the same outlet suggests they may be part of a “cluster” of targets, according to the Citizen Lab report.
公民實驗室報告稱,坎切拉托和佩萊格里諾都在同一家媒體工作,這一事實表明他們可能是一個目標「集群」的一部分。

Pellegrino said that he did not work on the blockbuster Fanpage investigation into the “Gioventù Meloniana,” a group part of Meloni’s Fratelli d’Italia party, which revealed that some of its members sympathize with fascism.
佩萊格里諾表示,他沒有參與 Fanpage 對「Gioventù Meloniana」(梅洛尼的義大利兄弟黨的一部分)的重磅調查,該調查顯示該黨的一些成員同情法西斯主義。

Pellegrino, who is the head of Fanpage’s Naples bureau, also said he hasn’t worked on any investigation about immigration.
佩萊格里諾是 Fanpage 那不勒斯分社的負責人,他也表示他沒有參與任何關於移民的調查。

“It is possible that someone was hoping to gain information about Fanpage by hacking my smartphone,” said Pellegrino.
佩萊格里諾說:「有可能有人希望通過入侵我的智慧型手機來獲取有關 Fanpage 的資訊。」

The Italian government did not respond to TechCrunch’s request for comment.
義大利政府沒有回應 TechCrunch 的置評請求。

Apart from Pellegrino, another journalist in Italy, Monica Macchioni, said in early May that she had received a notification from Apple.
除了佩萊格里諾之外,義大利的另一位記者莫妮卡·馬基奧尼在五月初表示,她收到了蘋果公司的通知。

Referring to an email TechCrunch sent to Paragon and its executive chairman John Fleming, Emily Horne, who works for WestExec Advisors, said the spyware maker “won’t have anything new on this,” apart from what the company said earlier this week.
WestExec Advisors 的 Emily Horne 在提到 TechCrunch 發送給 Paragon 及其執行董事長 John Fleming 的電子郵件時表示,除了該公司本週早些時候所說的,該間諜軟體製造商「對此沒有任何新東西」。

At the time, Paragon told Israeli newspaper Haaretz that it offered the Italian government help to investigate Cancellato’s alleged hack, but the government refused — and that’s why the company cut ties with Italy.
當時,Paragon 告訴以色列報紙《國土報》,它向義大利政府提供了幫助,以調查坎切拉托被指控的駭客攻擊事件,但政府拒絕了——這就是該公司切斷與義大利關係的原因。

On April 29, 2025, the prominent European journalist received a notification from Apple, the same notification that Pellegrino received and on the same day, according to The Citizen Lab.
根據公民實驗室的說法,2025 年 4 月 29 日,這位著名的歐洲記者收到了來自蘋果公司的通知,與佩萊格里諾收到的通知相同,且在同一天。

The lab’s researchers analyzed the unnamed journalist’s devices and found that one of them was infected with Graphite, based on forensic evidence showing that the spyware communicated with a server that the researchers had previously established with “high confidence” was part of Paragon’s infrastructure.
該實驗室的研究人員分析了這位不具名的記者的設備,發現其中一台設備感染了 Graphite,基於鑑識證據顯示,該間諜軟體與研究人員先前以「高度確信」建立的屬於 Paragon 基礎設施一部分的伺服器進行了通信。

Citizen Lab said the journalist was hacked with “a sophisticated zero-click attack against the device via iMessage,” based on the researchers finding a specific iMessage account “present in the device logs around the same time as the phone was communicating with the Paragon server.”
公民實驗室表示,根據研究人員發現一個特定的 iMessage 帳戶「在設備日誌中存在的時間與手機與 Paragon 伺服器通信的時間大致相同」,該記者遭受了「通過 iMessage 對設備進行的複雜零點擊攻擊」的駭客攻擊。

Zero-click hacks are some of the most effective attacks, given that, as the name suggests, they require no interaction from the target.
零點擊駭客攻擊是一些最有效的攻擊,因為顧名思義,它們不需要目標的任何互動。

And in this case, The Citizen Lab said it believed the attack was invisible to the victim.
在這種情況下,公民實驗室表示,它認為這次攻擊對受害者來說是隱形的。

According to the report, Apple told The Citizen Lab that “the attack deployed in these cases was mitigated in iOS 18.3.1,” which was released on February 10, 2025, some two weeks after WhatsApp notified the targets of Paragon spyware.
根據該報告,蘋果公司告訴公民實驗室,「在這些案例中部署的攻擊已在 iOS 18.3.1 中得到緩解」,該版本於 2025 年 2 月 10 日發布,大約在 WhatsApp 通知 Paragon 間諜軟體目標的兩週後。

In the case of Pellegrino, The Citizen Lab said it found the same iMessage account on his iPhone’s logs.
就佩萊格里諾而言,公民實驗室表示,它在他的 iPhone 日誌中找到了相同的 iMessage 帳戶。

Given that it’s typical for each government customer to have its own spyware infrastructure, The Citizen Lab said it believed Pellegrino and the unnamed journalist were likely targeted by the same Paragon operator.
鑑於每個政府客戶通常都有自己的間諜軟體基礎設施,公民實驗室表示,它認為佩萊格里諾和這位不具名的記者很可能成為同一 Paragon 運營商的目標。

The unnamed journalist’s iPhone was infected in January and early February, said The Citizen Lab.
公民實驗室表示,這位不具名的記者的 iPhone 在一月和二月初受到感染。

According to COPASIR’s report, Paragon and its Italian intelligence customers suspended the company’s surveillance systems on February 14, 2025, which means that the spy agencies AISE and AISI were still using Paragon’s spyware when the prominent European journalist was hacked.
根據 COPASIR 的報告,Paragon 及其義大利情報客戶於 2025 年 2 月 14 日暫停了該公司的監控系統,這意味著當這位著名的歐洲記者遭到駭客攻擊時,間諜機構 AISE 和 AISI 仍在使用 Paragon 的間諜軟體。

For now, The Citizen Lab has not attributed Pellegrino’s and the other unnamed European journalist’s hacks to any government.
目前,公民實驗室尚未將佩萊格里諾和另一位不具名的歐洲記者遭駭客入侵歸因於任何政府。

The Citizen Lab noted in the report that it’s possible some of the people who were notified of having been targeted with Graphite by WhatsApp may also have been infected, but, due to the fact that Android has limited logs, as well as “efforts by Paragon to delete traces of the infection,” it may be impossible to confirm that.
公民實驗室在報告中指出,一些被 WhatsApp 通知已成為 Graphite 目標的人也可能受到感染,但是,由於 Android 的日誌有限,以及「Paragon 刪除感染痕跡的努力」,可能無法確認這一點。

Apart from Pellegrino and the unnamed journalists, two other people have so far been confirmed to have been targeted with Paragon’s spyware: Luca Casarini and Beppe Caccia, who both work for the Italian nonprofit Mediterranea Saving Humans, which rescues immigrants who try to cross the Mediterranean Sea.
除了佩萊格里諾和這位不具名的記者之外,到目前為止,已確認有另外兩人成為 Paragon 間諜軟體的目標:Luca Casarini 和 Beppe Caccia,他們都在義大利非營利組織 Mediterranea Saving Humans 工作,該組織負責營救試圖穿越地中海的移民。

The Citizen Lab confirmed both were infected after analyzing their devices.
公民實驗室在分析了他們的設備後證實他們都受到了感染。

In its report, COPASIR confirmed the two were surveilled by Italian spy agencies.
COPASIR 在其報告中證實,這兩人受到了義大利間諜機構的監視。

There are other people who have said they received notifications of having been targeted. Their cases, however, are still somewhat unclear.
還有其他人說他們收到了成為目標的通知。然而,他們的情況仍然有些不明朗。

After analyzing his device, The Citizen Lab said it found traces of a spyware infection, but could not link the compromise to a particular spyware maker nor any government.
在分析了他的設備後,公民實驗室表示,它發現了間諜軟體感染的痕跡,但無法將此受損事件與特定的間諜軟體製造商或任何政府聯繫起來。

🔗【資料來源】

文章連結:https://techcrunch.com/2025/06/12/researchers-confirm-two-journalists-were-hacked-with-paragon-spyware/
  • 新聞
  • 【學英文看科技】Bluesky被罵翻了?其實它的「開放式」真面目你根本沒看清!【學英文看科技】蘋果App Store大升級!AI標籤讓你秒找到心儀App
    Loading...