Article 6K9Z7 NSO Group Ordered To Turn Over Spyware Code To WhatsApp

NSO Group Ordered To Turn Over Spyware Code To WhatsApp

by
Tim Cushing
from Techdirt on (#6K9Z7)
Story Image

The time has come to pay the discovery piper for NSO Group. The phone exploit firm formed by former Israeli spies was supported unilaterally by the Israeli government as it courted human rights abusers and autocrats. The Israeli government apparently felt selling powerful phone exploits to its enemies got caught with its third-party pants down when numerous news agencies exposed just how often NSO's customers abused its powerful spyware to target journalists, activists, lawyers, dissidents, religious leaders, and anyone else who annoyed its customers.

NSO Group has been sued multiple times. One of the first lawsuits filed in the US featured Meta (formerly Facebook) as a plaintiff, suing on behalf of WhatsApp, its encrypted communications acquisition. NSO tried multiple times to escape this lawsuit. It claimed it was a private sector equivalent of a government agency and, therefore, should be protected by sovereign immunity. This argument was rejected, leaving NSO with the option of arguing its actions (or, rather, the actions of its customers, which it claimed it couldn't control) weren't subject to US law.

That other argument might have worked if NSO Group's customers weren't using WhatsApp's US-based servers to deliver malware payloads. Once something like this happens, US law comes into play and, without the protective cover of sovereign immunity, NSO Group must continue to respond to lawsuits filed by US tech companies.

Everything NSO tried in hopes of earning an early exit from US lawsuits was aimed at preventing the very thing that's happening now. NSO and its (few remaining) backers can probably survive an expensive settlement. What the company is unlikely to survive is a (possibly) public outing of its malware code.

As Stephanie Kirchgaessner reports for The Guardian, NSO has been ordered to turn over the source code for pretty much all of its malware to Meta/WhatsApp.

NSO Group, the maker of one the world's most sophisticated cyber weapons, has been ordered by a US court to hand its code for Pegasus and other spyware products toWhatsAppas part of the company's ongoing litigation.

[...]

In reaching her decision, Hamilton considered a plea by NSO to excuse it of all its discovery obligations in the case due to various US and Israeli restrictions".

Ultimately, however, [Judge Phyllis Hamilton] sided with WhatsApp in ordering the company to produce all relevant spyware" for a period of one year before and after the two weeks in which WhatsApp users were allegedly attacked: from 29 April 2018 to 10 May 2020. NSO must also give WhatsApp information concerning the full functionality of the relevant spyware".

WhatsApp already has a pretty good idea how NSO Group malware operates. It has already managed to detect actual deployments via its servers. The irony here, of course, is that the incidents that most likely exposed NSO's exploitation of WhatsApp servers were trial runs of a US-oriented version of NSO's Pegasus phone exploit by the FBI. (The FBI ultimately decided it couldn't deploy this malware constitutionally.) A months-long investigation by the FBI into the mysterious" NSO purchase by a supposedly unknown" government agency ultimately revealed that it was the FBI itself shelling out bucks for malware it couldn't deploy without violating the Constitution.

The order [PDF] issued by Judge Hamilton makes it clear NSO has to hand over more than just its Pegasus code to WhatsApp.

As to category (1), as stated at the hearing, the court adopts plaintiffs' definition of all relevant spyware" as set forth in their motion: any NSO spyware targeting or directed at Whatsapp servers, or using Whatsapp in any way to access Target Devices." As also stated at the hearing, defendants have not identified a basis for limiting its production to the Pegasus program, or to any particular single operating system.

[...]

As to the timeframe of documents that must be produced, the court concludes that, at this stage of the case, the Richmark factors weigh in favor of production for all relevant spyware" for a period of one year before the alleged attack to one year after the alleged attack; in other words, from April 29, 2018 to May 10, 2020. If, after reviewing the relevant spyware from that timeframe, plaintiffs are able to provide evidence that any attack lasted beyond that timeframe, plaintiffs may seek further discovery at that time.

hahahahaaaaaaaaaa

We can be sure NSO's lawyers are now busy crafting extremely restrictive proposed protective orders to prevent WhatsApp/Meta for making this information available to the public via court filings, blogs posts, transparency reports, or any other options this company has at its disposal.

I imagine these motions (along with other efforts to seal docket entries) will be granted, since NSO has continually claimed its customers use its malware to target high-value targets like suspected terrorists and other violent criminals. But this court remains free to weigh NSO's CYA statements against the brutal reality: that its malware is often used to target people governments don't like, rather than the terrorists" and violent criminals" governments claim they're interested in apprehending.

Equally amusing is the fact that the same court has denied NSO's demands for any communications between WhatsApp/Meta and Toronto's Citizen Lab that were initiated following the filing of this lawsuit. It's easy to see why NSO would love access to these communications, considering Citizen Lab has constantly and continually exposed abusive NSO malware deployments over the past several years while also publishing whatever exploit code it's been able to extract during these investigations.

But, as the court notes, NSO has already undercut its own argument for additional discovery on its end by attempting to move the goalposts to cover only perceived misuses against civil society" by its customers. This attempt to obtain further communications is backed only by NSO's perception of the tone of WhatsApp's lawsuit, rather than its listed causes for action - allegations that cover not only abusive" deployments of malware but also legitimate" deployments that, nonetheless, occurred without the platform's permission and definitely violated WhatsApp's terms of service.

So, the lawsuit will move forward. And it's NSO that obligated to start explaining itself - not just to Meta/WhatsApp, but the court itself. Now that there's source code on the line, NSO Group might start examining it other options, the most likely of which would be paying WhatsApp a considerable sum of money while promising not to use the company's US servers to deploy malware. Most entities, at worst, have to deal with the consequences often expressed as having to lay in a bed that they've made. But NSO's actions exceed this idiom. NSO, for all intents and purposes, shat the bed before making it, which makes lying it it feel that much worse.

External Content
Source RSS or Atom Feed
Feed Location https://www.techdirt.com/techdirt_rss.xml
Feed Title Techdirt
Feed Link https://www.techdirt.com/
Reply 0 comments