The Guardian (USA)

WhatsApp: Israeli firm 'deeply involved' in hacking our users

- Stephanie Kirchgaess­ner in Washington

WhatsApp has alleged in new court filings that an Israeli spyware company used US-based servers and was “deeply involved” in carrying out mobile phone hacks of 1,400 WhatsApp users, including senior government officials, journalist­s, and human rights activists.

The new claims about NSO Group allege that the Israeli company bears responsibi­lity in serious human rights violations, including the hacking of more than a dozen Indian journalist­s and Rwandan dissidents.

For years, NSO Group has said that its spyware is purchased by government clients for the purpose of tracking down terrorists and other criminals and that it had no independen­t knowledge of how those clients – which in the past have reportedly included Saudi Arabia and Mexico – use its hacking software.

But a lawsuit filed by WhatsApp against NSO Group last year – the first of its kind by a major technology company - is revealing more technical details about how the hacking software, Pegasus, is allegedly deployed against targets.

In the court filings last week, WhatsApp said its own investigat­ion into how Pegasus was used against 1,400 users last year showed that servers controlled by NSO Group – not its government clients – were an integral part of how the hacks were executed.

WhatsApp has said victims of the hack received phone calls using its messaging app, and were infected with Pegasus.

Then, it said: “NSO used a network of computers to monitor and update Pegasus after it was implanted on users’ devices. These NSO-controlled computers served as the nerve centre through which NSO controlled its customers’ operation and use of Pegasus.”

According to WhatsApp’s filing, NSO gained “unauthoris­ed access” to its servers by reverse-engineerin­g the messaging app and then evading the company’s security features that prevent manipulati­on of the company’s call features. One WhatsApp engineer who investigat­ed the hacks said in a sworn statement submitted to the court that in 720 instances, the IP address of a remote server was included in the malicious code used in the attacks. The remote server, the engineer said, was based in Los Angeles and owned by a company whose data centre was used by NSO.

NSO has said in legal filings that it has no insight into how government clients use its hacking tools, and therefore does not know who government­s are targeting.

But one expert, John Scott-Railton of Citizen Lab, who has worked with WhatsApp on the case, said NSO’s control of the servers involved in the hack suggests the company would have had logs, including IP addresses, identifyin­g the users who were being targeted.

“Whether or not NSO looks at those logs, who knows? But the fact that it could be done is contrary to what they say,” Scott-Railton said.

In a statement to the Guardian, NSO stood by its earlier remarks. “Our products are used to stop terrorism, curb violent crime, and save lives. NSO Group does not operate the Pegasus software for its clients,” the company said. “Our past statements about our business, and the extent of our interactio­n with our government intelligen­ce and law enforcemen­t agency customers, are accurate.”

The company said it would file its response to the court in coming days.

The new developmen­ts in the case come as NSO is facing separate questions about the accuracy of a tracking product it has launched following the outbreak of Covid-19. The new programme, called Fleming, uses mobile phone data and public health informatio­n to identify who individual­s infected with coronaviru­s may have come into contact with. A report by NBC last weekend said NSO’s new tool was being marketed in the US.

But in a Twitter thread, Scott-Railton said his analysis showed it was relying on data that appeared very imprecise.

“When you are working with data with this much built-in inaccuracy, it would be pretty intense to issue alerts each time this happened. Or to require quarantine­s. Or testing. The rates of false positives here would be through the roof. But ... so would false negatives,” he said.

Asked about the tweets, NSO said that the “unfounded claims” were based on “guesses and outdated screenshot­s, instead of facts”.

“Meanwhile, our Covid-19 product, Fleming, has proved vital for government­s around the world working to contain the outbreak. Well-respected journalist­s from several countries have viewed Fleming, understood how the technology works and recognised it is the latest evolution in analytics software - which does not compromise privacy,” the company said.

 ?? Photograph: Jack Guez/AFP via Getty Images ?? NSO Group says it has no independen­t knowledge of how clients use its hacking software.
Photograph: Jack Guez/AFP via Getty Images NSO Group says it has no independen­t knowledge of how clients use its hacking software.

Newspapers in English

Newspapers from United States