Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Five things we learned from WhatsApp vs. NSO Group spyware lawsuit


Tuesday, Whatsapp has won a great victory against the NSO group When the jury ordered more than 1 million damage to the manufacturer of unsuspecting spy software, when you order the transfer of a meta company.

The judge closed the legal battle for more than five years, which began in October 2019 WhatsApp blamed the NSO group Making a user of more than 1300 users, taking advantage of a sensitivity in the chat app Audio-call functionality.

Several certificates, including several certificates, including the NSO Group CEO Yaron Shohat and WhatsApp employees, including the incident, were tried.

Even before the court started, it had found several revelations, including the NSO group The government cut 10 of its customers To abuse the pegasus spy program, 1223 places of victims For Spyware Campaign and for Spyware Maker for the name: Mexico, Saudi Arabia and Uzbekistan.

TechCrunch read the transcripts of trial hearings and highlights the most interesting facts and verses. We will update this post because we learn this post more than 1,000 pages.

Finally told how the Whatsapp attack works

This Zero click attackNoting that the spy program did not interact with the target, “Fake Whatsapp worked by putting a phone call,” said WhatsApp’s lawyer Antonio Perez during the trial. The lawyer explained that the NSO group called the “WhatsApp Installation server”, a special machine designed to send malicious messages between WhatsApp’s infrastructure, a special machine designed to watch real messages.

“After receiving once, these messages trigger the user’s phone to reach the third server and download the Pegasus spy program. This was the only thing that needs to happen was the phone number,” Perez said.

NSO Group Research and Development Deputy President Tamir Gazneli, “An important stage for Pegasus said it was a solution to any zero click.

Nso Group confirms that the American phone number targeted as a test for FBI

Contact us

Do you have more information about NSO Group or other spy programs? You can contact the signal securely with Lorenzo Franceschi-Bichierai, which is a unemployed device and network +1 917 257 1382 or telegram and keybase @lorenzofb or Email.

Over the years, the NSO group cannot be used against the American phone numbers of the spy program, and the +1 cannot express any cell number that started with the country code.

In 2022 The New York Times first informed The company said the US phone “attacked”, but it was part of a test for FBI.

The NSO group’s lawyer Joe Akrotirianakis confirmed it, “The only exception” was not able to target Pegasus +1 numbers, “Pegasus was a special configured version of US government customers to use in potential demonstration.”

FBI The selected was reported not to place Pegasus after the test.

How do customers of the NSO group use Pegasus

NSO Director-General Shohat, the user interface for Pegasus’s government customers, the hack method or technician’s use hack methods or techniques should not choose to choose to use which vector for using which vector they need. ”

In other words, this is a pegasus system in the background that chooses technology that hacked the known technology exploitEach time the spy program targets a person.

NSO Group headquarters shares the same building as apples

In a funny coincidence, NSO group headquarters In Israel in the same building in Herzliya, the city of Tel Aviv like appleiPhone customers are often targeted by the NSO Pegasus spy program. Said holding the first five floors of NSO and the apple occupies the rest of the 14-storey building.

The fact that the headquarters of the NSO headquarters obviously advertised is somewhat interesting. Other companies that develop spy program or zero days Barcelona Based Varistonthis closed in FebruaryThe official website was located in the workshop when they demanded another location.

The NSO Group admitted to target WhatsApp users after a lawsuit

After the spyware attack, NSSEP filed a lawsuit against the NSO group against the NSO group. Despite the active legal call, Spyware Maker, NSO Group’s Research and Development Vice President Tamir Gazni’nin Tamir Gazni’s users targeted.

Gazneli said, “Follow”, “Do,” said WhatsApp was used to the zero clicking vector by 2020 in May 2019. Other versions were called Eden and “Paradise” and three were known as “Hummingbird”.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *