Malta Independent

Who are the hackers who cracked the iPhone?

-

What do we know about the curious, secretive NSO Group? Very little - but after this week, an awful lot more than we did before.

The group, an Israeli-based but American-owned company, specialise­s in creating what it calls tools against crime and terrorism. But the security researcher­s call them something else: a cyber arms dealer.

On Thursday, the NSO Group was thrust into internatio­nal headlines after being credited with creating malicious software capable of “jailbreaki­ng” any iPhone withjust one tap of the screen, and then installing vicious spyware.

Security-savvy human rights lawyer Ahmed Mansoor found himself targeted by the attack when his iPhone received a message promising “secrets” about torture happening in prisons in the United Arab Emirates.

Had he tapped on the link, the phone would have been plundered. Huge amounts of private data: text messages, photos, emails, location data, even what’s being picked up by the device’s microphone and camera.

Thankfully, he didn’t do that. Instead, he passed on the message to experts at Citizen Lab and Lookout, who peeled back the covers on what they described as one of the sophistica­ted cyber weapons ever discovered. With it came evidence that it was the NSO Group’s expertise at the heart of it all.

Earlier this year, UK-based watchdog Privacy Internatio­nal launched a database tracking the global trade of cyber arms. Its intention was to track deals between cyber arms companies and government­s.

According to the Surveillan­ce Industry Index, the NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligen­ce Unit, an Israeli militaryfu­nded scheme for start-ups.

According to Forbes, the 8200 Intelligen­ce Unit was heavily involved in providing expertise and funding for Stuxnet, a cyber attack on Iran that was a joint operation between the US and Israel. Listed in the SSI were multi-million dollar deals made between the NSO Group and government entities in Mexico and Panama. This is the tip of the iceberg - press reports of sales rely on leaks and anonymous sources, and so there are likely many more unknown to the general public.

In 2015, the NSO Group’s owners - US-based venture capital firm Francisco Partners - were looking to sell the company at a value of around $1bn. Neither firm has responded to requests for further comment.

That the NSO Group sells tools to government­s is no secret - in a statement released in response to claims it was behind the attack on Mr Mansoor, NSO Group spokesman Zamir Dahbash said: “The company sells only to authorized government­al agencies, and fully complies with strict export control laws and regulation­s.” But the company has gone no further than that in describing who its customers are, and what exactly they buy. It does say it has no control over how its tools are used and for what purpose.

Whatever the origin of the NSO Group, what has been created is an extraordin­arily talented team of cyber specialist­s.

The attack on Mr Mansoor, had it worked, would have utilised not one but three zero day attacks. A “zero day” is a term given to vulnerabil­ities that were previously unknown to the security industry, and are therefore wide open to attack. To discover one zero day is rare, to find three is outstandin­g.

Clues to the origin of the attack came when the experts looked at the messages Mr Mansoor received. A link was included to a web domain known to point to servers set up by the NSO Group for its customers.

When the researcher­s analysed the spyware’s code, they noticed apparent references to “Pegasus”, the name given, by the NSO Group, to one of its spying products.

Details about Pegasus were made public last year when another cyber arms firm, called the Hacking Team, was itself breached. Material used to market Pegasus was subsequent­ly leaked.

When Apple was made aware of the vulnerabil­ities in its iPhone, it acted quickly, patching the problem in 10 days and pushing out an update to all of its users. That has neutralise­d this specific attack, sure, but there’ll likely be many more that remain hidden from view.

In a rare interview with Defense News, the NSO Group’s co-founder, Omri Lavie, said their attacks would “leave no trace”.

Thanks to the quick thinking of Mr Mansoor, and the forensic efforts of researcher­s, the group has been temporaril­y dragged into the limelight - but it will only be for a brief moment. Soon the NSO Group will rejoin the rest of the money-spinning cyber arms trade back in the shadows.

Newspapers in English

Newspapers from Malta