Bahrain Pegasus Campaign 12+ Activists Hacked with Zero-Click Exploits

Aug 2021 路 State-sponsored

By Karim El Labban · ZERO|TOLERANCE

馃嚙馃嚟 Bahrain PDPLAugust 202110 min read

# Bahrain Pegasus Campaign: 12+ Activists Hacked with Zero-Click Exploits

In August 2021, the University of Toronto's Citizen Lab published "From Pearl

to Pegasus," a landmark investigation documenting the Bahraini government's

systematic deployment of NSO Group's Pegasus spyware against at least nine

activists, including members of the Bahrain Center for Human Rights, Waad political

society, and Al Wefaq Islamic Society. A Bahraini government operator, tracked by

Citizen Lab under the codename "LULU," used two distinct zero-click

exploit chains - KISMET (targeting iOS 13.5.1 and 13.7 via a JPEG ICC profile

vulnerability) and FORCEDENTRY (targeting iOS 14.4 and 14.6, bypassing Apple's

BlastDoor sandbox) - to silently compromise iPhones without any user interaction.

In February 2022, Amnesty International's Security Lab confirmed three additional

Bahraini targets, including prominent human rights lawyer Mohamed al-Tajer, bringing

the confirmed total to at least 12 victims across Bahrain and the United Kingdom.

The infections granted full device access: messages, contacts, call logs, emails,

photographs, real-time GPS location, and the ability to silently activate the device's

camera and microphone. NSO Group was placed on the U.S. Entity List in November 2021,

and affected activists filed a lawsuit in the UK in December 2022.

## Key Facts

  • .**What:** NSO Group Pegasus deployed via zero-click iPhone exploits.
  • .**Who:** 12+ Bahraini activists, lawyers, and human rights defenders.
  • .**Data Exposed:** Messages, contacts, GPS location, photos, and live microphone access.
  • .**Outcome:** NSO placed on U.S. Entity List; UK lawsuit filed by victims.

## What Was Exposed

Pegasus represents the most invasive surveillance capability commercially available.

Unlike conventional data breaches that expose structured databases, a Pegasus infection

transforms the target's smartphone into a comprehensive surveillance device,

providing the operator with access that exceeds what even the device owner can see

on their own screen.

  • .Complete iMessage, WhatsApp, Signal, and Telegram message histories, including

messages in end-to-end encrypted applications - Pegasus captures content

at the device level, after decryption, rendering encryption irrelevant

  • .Full contact databases and call logs, revealing the social networks, professional

relationships, and communication patterns of each target - metadata that

intelligence agencies consider more valuable than content

  • .Email accounts and their contents, including any accounts configured on the

device (personal, professional, and organizational)

  • .Complete photo libraries and videos, including metadata containing GPS

coordinates, timestamps, and device identifiers

  • .Real-time and historical GPS location data, enabling continuous physical

surveillance of the target's movements

  • .Silent activation of the device's camera and microphone, turning

the phone into an ambient listening and recording device even when not

in active use

  • .Stored passwords, authentication tokens, and credentials for online accounts,

potentially enabling access to cloud services, financial accounts, and

organizational systems beyond the device itself

  • .Browser history, bookmarks, and search queries, revealing the target's

interests, research activities, and digital behavior patterns

The technical evolution of the exploits used against Bahraini targets is significant.

The KISMET exploit, deployed in 2020, targeted a vulnerability in iOS's

handling of ICC (International Color Consortium) profiles embedded in JPEG images

sent via iMessage. The exploit was "zero-click" - the target

did not need to open, view, or interact with the message in any way. The mere

receipt of the iMessage triggered the exploit chain, which escalated privileges,

escaped the iMessage sandbox, and installed the Pegasus implant. This technique

worked against iOS 13.5.1 and 13.7, both of which were current versions at the

time of deployment.

When Apple introduced BlastDoor in iOS 14 - a dedicated sandbox for processing

incoming iMessage content, specifically designed to mitigate the class of attacks

exemplified by KISMET - NSO Group developed FORCEDENTRY to bypass it.

FORCEDENTRY exploited a vulnerability in Apple's CoreGraphics PDF parser,

using a technique that constructed a virtual machine from logical operators within

the JBIG2 image compression codec to achieve arbitrary code execution. This

exploit bypassed BlastDoor entirely and worked against iOS 14.4 and 14.6,

demonstrating NSO's ability to defeat defensive measures within months of

their deployment. The sophistication of FORCEDENTRY was such that Google's

Project Zero described it as "one of the most technically sophisticated

exploits we've ever seen."

The targeting pattern in Bahrain reveals a systematic campaign against civil society.

The nine initial victims identified by Citizen Lab included three members of Waad

(a secular political society), three members of the Bahrain Center for Human Rights,

one member of Al Wefaq (the largest Shia political society, dissolved by the

government in 2016), and two exiled dissidents living abroad. The subsequent

identification of Mohamed al-Tajer - a lawyer who had represented torture

victims and political prisoners - among the targets confirmed that the

campaign extended to the legal profession, a particularly chilling implication for

attorney-client privilege and access to justice.

The extraterritorial dimension of this campaign is critical. Several targets were

located in the United Kingdom at the time of infection, meaning the Bahraini

government was conducting surveillance operations on the sovereign territory of

a close ally. This led to the filing of a UK lawsuit in December 2022, in which

affected Bahraini activists sought legal remedies under UK data protection and

human rights law. The case represents one of the first attempts to hold a foreign

government accountable for Pegasus surveillance conducted on UK soil.

The implications for the broader Bahraini civil society extend far beyond the

confirmed 12 victims. Citizen Lab identified the LULU operator as active since

at least 2017, suggesting a multi-year campaign with potentially hundreds of targets.

The confirmed victims represent only those whose devices were forensically analyzed

-- the actual scope of surveillance is almost certainly far larger. The chilling

effect on free expression, political organizing, and human rights advocacy is

incalculable: when activists know that any iPhone in their community may be

compromised, the resulting self-censorship achieves the surveillance objective

even without additional infections.

## Regulatory Analysis

The deployment of Pegasus by a Bahraini government operator against citizens and

residents creates a profound regulatory paradox under the PDPL (Law No. 30 of 2018).

The law establishes data protection obligations that, if applied consistently, would

render the Pegasus campaign unlawful. However, the operator of the spyware is the

government itself - the same entity responsible for enforcing the law.

Article 3 of the PDPL defines personal data as "any data - regardless

of its source or form - that would identify a specific individual or make him

identifiable, directly or indirectly." The data collected by Pegasus falls

squarely within this definition and encompasses virtually every category of personal

data the law was designed to protect. Messages, contacts, location data, photographs,

and biometric data (voice recordings captured via microphone activation) are all

personal data under Article 3. The collection of this data without the knowledge

or consent of the data subjects constitutes processing under the PDPL.

Article 5 establishes the conditions for lawful data processing, requiring either

the consent of the data subject or a legitimate legal basis. The PDPL does include

an exemption in Article 2 for processing "necessary for the purposes of

national security" and law enforcement. However, this exemption is not

unlimited. International standards, including the jurisprudence of the European

Court of Human Rights and the UN Human Rights Committee, require that surveillance

measures be prescribed by law, necessary and proportionate to a legitimate aim,

and subject to adequate safeguards against abuse. The targeting of human rights

defenders, journalists, and lawyers - rather than individuals suspected of

criminal activity or terrorism - raises serious questions about whether the

national security exemption was applied in good faith.

Article 8 requires appropriate security measures to protect personal data. In the

context of government surveillance, this article creates an obligation to secure

the collected data against unauthorized access by third parties. NSO Group's

architecture routes surveillance data through its servers (despite claims to the

contrary), creating exposure to potential interception by NSO employees, Israeli

intelligence, or third-party threat actors who might compromise NSO's

infrastructure. The use of a foreign commercial spyware vendor to collect the

most sensitive personal data of Bahraini citizens introduces third-party risk

that the PDPL's security requirements would not permit in any other context.

Article 15 addresses cross-border data transfers, requiring that personal data

transferred outside Bahrain receive adequate protection. Pegasus infections

involve data transmission to command-and-control infrastructure hosted in multiple

jurisdictions, with portions of the data passing through servers operated by NSO

Group in Israel. This constitutes a cross-border transfer of the most sensitive

personal data imaginable - including information about political activities,

religious associations, and legal consultations - to a jurisdiction that the

Bahraini government does not formally recognize. The irony of a Bahraini government

operator routing its citizens' most intimate data through Israeli servers

is not lost on data protection analysts.

The practical reality is that the PDPL will never be enforced against the government

for Pegasus deployment. The Personal Data Protection Authority lacks the independence

and mandate to investigate state surveillance operations. This represents a

fundamental structural limitation: data protection laws that exempt or cannot

reach government surveillance effectively protect personal data from everyone

except the entity with the greatest capacity to misuse it. The UK lawsuit filed

by Bahraini activists may ultimately prove more consequential than any domestic

regulatory action, as it subjects the Pegasus campaign to the scrutiny of an

independent judiciary applying the UK Data Protection Act 2018 and the Human

Rights Act 1998.

## What Should Have Been Done

Addressing the Pegasus threat requires action at multiple levels: individual

device security, organizational security practices, platform-level protections

by Apple, regulatory and legal frameworks, and international export control

mechanisms. No single measure is sufficient against a threat actor deploying

zero-click exploits backed by a nation-state budget.

At the individual level, Apple's introduction of Lockdown Mode in iOS 16

(September 2022) represents the most significant defensive measure against

Pegasus-class attacks. Lockdown Mode disables several attack surfaces exploited

by NSO Group, including: blocking most iMessage attachment types (eliminating

the KISMET and FORCEDENTRY vectors), disabling link previews, blocking incoming

FaceTime calls from unknown contacts, restricting web browsing features commonly

exploited by commercial spyware, and preventing configuration profile installation.

Every individual at risk of state-sponsored surveillance should enable Lockdown

Mode and accept the functionality trade-offs. Bahraini activists and civil society

organizations should mandate Lockdown Mode on all organizational devices.

Organizations at risk should implement a mobile device management (MDM) strategy

that enforces automatic updates, requires devices to run the latest iOS or Android

version, and enables organizational-level security policies. The KISMET exploit

worked against iOS 13.5.1, which was superseded by iOS 13.6 within weeks of the

infections being deployed. While FORCEDENTRY targeted then-current iOS versions,

timely updates remain the most accessible defense against the majority of mobile

threats. Organizations should configure MDM policies to restrict device enrollment

to devices running supported OS versions and require updates within 48 hours of

release.

Regular forensic analysis of devices belonging to at-risk individuals should be

institutionalized. Amnesty International's Mobile Verification Toolkit (MVT),

released as open-source software, enables the detection of Pegasus indicators on

both iOS and Android devices. Organizations should conduct quarterly MVT scans of

high-risk individuals' devices, with immediate analysis of any device

exhibiting anomalous behavior (unexpected battery drain, unexplained data usage,

device overheating). Citizen Lab's detection of the Bahraini campaign

was possible because activists submitted their devices for forensic analysis --

this practice should be systematized rather than ad hoc.

Communication security practices should assume device compromise and implement

defense-in-depth accordingly. Sensitive conversations should occur in environments

where phones are not present (Faraday bags or physically separate rooms). Organizations

should use air-gapped computers for the most sensitive document handling, maintaining

strict separation between communication devices (which may be compromised) and

document processing systems. The "assume breach" mindset is not

paranoia when the threat actor is deploying zero-click exploits backed by a

government budget.

At the platform level, Apple should expand iMessage's contact key verification

system and make Lockdown Mode more granular, allowing users to disable specific

attack surfaces without losing all advanced functionality. Apple should also invest

in automated detection of exploitation attempts, building on its existing threat

notification system that alerts users when Apple detects state-sponsored targeting

of their devices. The notification system should be expanded to include more detailed

guidance on immediate steps to take when a notification is received.

At the regulatory and legal level, the Bahraini PDPL should be amended to establish

an independent data protection authority with the mandate and resources to investigate

government data processing activities, including surveillance. The national security

exemption in Article 2 should be narrowed to require judicial authorization for

surveillance, proportionality assessments, and mandatory oversight by an independent

body. International models exist: Germany's G10 Commission provides independent

oversight of intelligence surveillance, and the UK's Investigatory Powers

Tribunal adjudicates complaints about surveillance activities. Without independent

oversight, the PDPL provides no protection against the most invasive form of

personal data collection.

At the international level, the export of commercial spyware should be subject to

the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use

Goods and Technologies, with surveillance technologies classified as dual-use items

requiring export licenses. The placement of NSO Group on the U.S. Entity List in

November 2021 was a significant step, but enforcement remains incomplete. An

international moratorium on the sale, transfer, and use of spyware technology,

as called for by the UN High Commissioner for Human Rights, should be pursued

until adequate international regulatory frameworks are established.

The Bahrain Pegasus campaign demonstrates that commercial spyware has fundamentally

altered the threat landscape for civil society. When a government can purchase

zero-click exploitation capabilities that bypass every security measure an individual

can take, the defense must shift from technical controls to legal and institutional

safeguards. Bahrain's PDPL, with its national security exemption and lack

of independent oversight, provides no meaningful protection against the most

invasive data collection tool ever deployed against its citizens.

RELATED ANALYSIS

Google Disrupts UNC2814: Chinese Espionage Group Breached 53 Telecoms and Governments Across 42 Countries Using Google Sheets C2
Feb 2026 路 53 orgs 路 42 countries 路 decade-long campaign
APT IRAN's 375TB Lockheed Martin Claim: Fabricated Data Dump, Real Information Operation
Mar 30, 2026 路 375TB claim unverified 路 $598M buyout fiction
F5 BIG-IP: Critical RCE Exploited in the Wild After Five-Month Misclassification
Mar 30, 2026 路 CVSS 9.8 路 240K+ exposed instances
FBI Director Patel: Handala Publishes 300+ Emails from Personal Gmail - 11 Prior Breaches on HIBP
Mar 27, 2026 路 300+ emails 路 MOIS retaliation
MuddyWater Pre-Positions Dindoor and Fakeset Backdoors on US Bank, Airport, Defense Networks
Mar 5, 2026 路 US bank & airport 路 Iranian APT
MORE NATION-STATE & ESPIONAGE →