NSO Group allegedly connected to hacks of 1,400 people including human rights activists
WHATSAPP has alleged in new court filings that an Israeli spyware company used US-based servers and was “deeply involved” in carrying out mobile phone hacks of 1,400 WhatsApp users, including senior government officials, journalists, and human rights activists.
The new claims about NSO Group allege that the Israeli company bears responsibility in serious human rights violations, including the hacking of more than a dozen Indian journalists and Rwandan dissidents.
For years, NSO Group has said that its spyware is purchased by government clients for the purpose of tracking down terrorists and other criminals and that it had no independent knowledge of how those clients — which in the past have reportedly included Saudi Arabia and Mexico — use its hacking software.
According to Wikipedia:
NSO Group Technologies (NSO standing for Niv, Shalev and Omri, names of company’s founders) is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphones. It was founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio. It employed almost 500 people as of 2017, and is based in Herzliya, near Tel Aviv.
Annual revenues were around US$40 million in 2013 and $150 million in 2015. In June 2017, the company was put up for sale for $1 billion by Francisco Partners Management. Founders Lavie and Hulio, partnering with European private equity fund Novalpina Capital, purchased a majority stake in NSO in February 2019.
NSO claims that it provides “authorized governments with technology that helps them combat terror and crime”. According to several reports, software created by NSO Group was used in targeted attacks against human rights activists and journalists in various countries, was used in state espionage against Pakistan, and played a role in the murder of Saudi dissident Jamal Kashoggi. In October 2019, instant messaging company WhatsApp and its parent company Facebook sued NSO under the US Computer Fraud and Abuse Act (CFAA).
NSO’s founders are ex-members of Unit 8200, the Israeli Intelligence Corps unit responsible for collecting signals intelligence. The company’s start-up funding came from a group of investors headed by Eddy Shalev, a partner in venture capital fund Genesis Partners. The group invested a total of $1.8 million for a 30% stake.
But a lawsuit filed by WhatsApp against NSO Group last year — the first of its kind by a major technology company — is revealing more technical details about how the hacking software, Pegasus, is allegedly deployed against targets.
In the court filings last week, WhatsApp said its own investigation into how Pegasus was used against 1,400 users last year showed that servers controlled by NSO Group — not its government clients — were an integral part of how the hacks were executed.
WhatsApp has said victims of the hack received phone calls using its messaging app, and were infected with Pegasus. Then, it said: “NSO used a network of computers to monitor and update Pegasus after it was implanted on users’ devices. These NSO-controlled computers served as the nerve centre through which NSO controlled its customers’ operation and use of Pegasus.”
According to WhatsApp’s filing, NSO gained “unauthorised access” to its servers by reverse-engineering the messaging app and then evading the company’s security features that prevent manipulation of the company’s call features. One WhatsApp engineer who investigated the hacks said in a sworn statement submitted to the court that in 720 instances, the IP address of a remote server was included in the malicious code used in the attacks. The remote server, the engineer said, was based in Los Angeles and owned by a company whose data centre was used by NSO.
NSO has said in legal filings that it has no insight into how government clients use its hacking tools, and therefore does not know who governments are targeting.
But one expert, John Scott-Railton of Citizen Lab, who has worked with WhatsApp on the case, said NSO’s control of the servers involved in the hack suggests the company would have had logs, including IP addresses, identifying the users who were being targeted.
“Whether or not NSO looks at those logs, who knows? But the fact that it could be done is contrary to what they say,” Scott-Railton said.
In a statement to the Guardian, NSO stood by its earlier remarks. “Our products are used to stop terrorism, curb violent crime, and save lives. NSO Group does not operate the Pegasus software for its clients,” the company said. “Our past statements about our business, and the extent of our interaction with our government intelligence and law enforcement agency customers, are accurate.”
The company said it would file its response to the court in coming days.
* * *