Article 4TCPD WhatsApp suit says Israeli spyware maker exploited its app to target 1,400 users

WhatsApp suit says Israeli spyware maker exploited its app to target 1,400 users

by
Dan Goodin
from Ars Technica - All content on (#4TCPD)
whatsapp-icon-800x533.jpg

Enlarge (credit: Christoph Scholz / Flickr)

Facebook and its WhatsApp messenger division on Tuesday sued Israel-based spyware maker NSO Group. This is an unprecedented legal action that takes aim at the unregulated industry that sells sophisticated malware services to governments around the world. NSO vigorously denied the allegations.

Over an 11-day span in late April and early May, the suit alleges, NSO targeted about 1,400 mobile phones that belonged to attorneys, journalists, human-rights activists, political dissidents, diplomats, and senior foreign government officials. To infect the targets with NSO's advanced and full-featured spyware, the company exploited a critical WhatsApp vulnerability that worked against both iOS and Android devices. The clickless exploit was delivered when attackers made a video call. Targets need not have answered the call or taken any other action to be infected.

Routing malware through WhatsApp servers

According to the complaint, NSO created WhatsApp accounts starting in January 2018 that initiated calls through WhatsApp servers and injected malicious code into the memory of targeted devices. The targeted phones would then use WhatsApp servers to connect to malicious servers allegedly maintained by NSO. The complaint, filed in federal court for the Northern District of California, stated:

Read 11 remaining paragraphs | Comments

index?i=XhTD4uhXaMg:9WhH6hEzYBM:V_sGLiPB index?i=XhTD4uhXaMg:9WhH6hEzYBM:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments