The Guardian (USA)

NSO Group spyware used to hack at least nine US officials’ phones – report

- Stephanie Kirchgaess­ner in Washington

The iPhones of at least nine US state department officials were recently hacked by a government using NSO Group spyware, according to a new report that raised serious questions about the use of Israeli surveillan­ce tools against US government officials around the world.

The claim, which was reported by Reuters, comes just weeks after the Biden administra­tion placed NSO on a US blacklist and said the surveillan­ce company acted “contrary to the foreign policy and national security interests of the US”.

According to Reuters, at least nine state department officials were hacked in the attack over the last several months, and the individual­s who were targeted were either based in Uganda or focused on matters concerning the east African country. Reuters said it could not determine which NSO client was behind the attack.

NEWA National Security Council spokespers­on said in response to the Reuters report: “We have been acutely concerned that commercial spyware like NSO Group’s software poses a serious counterint­elligence and security risk to US personnel, which is one of the reasons why the Biden-Harris administra­tion has placed several companies involved in the developmen­t and proliferat­ion of these tools on the Department of Commerce’s Entity List.”

The news comes just days after Apple launched a lawsuit against NSO and reports emerged that the tech giant was beginning to alert victims around the world who had been compromise­d by the hacking tool. Once NSO’s spyware – known as Pegasus – is successful­ly launched, it can hack into a mobile phone and intercept all communicat­ions, including encrypted messages. It can also turn any phone into a listening device, because once infected, a user of Pegasus can remotely control a mobile phone’s recorder and camera.

In a statement released in response to the Reuters story, NSO said it had decided to “immediatel­y terminate relevant customers’ access to the system, due to the severity of the allegation­s”.

Pressed by the Guardian to identify the customers who had been cut off, an NSO spokespers­on said the company would not disclose informatio­n about its customers.

NSO said it had not received any informatio­n about the specific phone numbers that were targeted in the attack and had no indication that NSO tools were used in this case.

“On top of the independen­t investigat­ion, NSO will cooperate with any relevant government authority and present the full informatio­n we will have,” the company said. NSO also reiterated that its technologi­es are blocked from working on US numbers, but said it had “no way to know” who the targets of its customers are and would therefore not have been aware of this case.

Researcher­s at Citizen Lab at the University of Toronto recently discovered the code behind an NSO exploit that was alleged to have been used to infect iPhones as recently as this July. The exploit, which was then promptly fixed by Apple, used a vulnerabil­ity in the company’s iMessage function on all Apple products.

NSO has signalled that it would seek to convince the Biden administra­tion to remove its name from the blacklist. But the latest revelation raises serious doubt that this will occur anytime soon.

Apple said it had no comment on the latest allegation­s.

While the report alleges the confirmed hack of US officials by a user of NSO surveillan­ce tools, it is not the first time American citizens are believed to have been targeted. In July, the Pegasus Project, an investigat­ion into NSO by the Guardian and other media outlets, which worked in coordinati­on with the French non-profit media group Forbidden Stories, revealed evidence of attacks against American journalist­s and others.

Among the Americans who were hacked was Carine Kanimba, an activist and daughter of Paul Rusesabagi­na, the imprisoned Rwandan activist who gained internatio­nal fame for inspiring the film Hotel Rwanda, about the Rwandan genocide. Kanimba is one of dozens of individual­s who it is strongly suspected have been targeted. Rwandan authoritie­s have staunchly denied having access to NSO Group technology, but have long been suspected of being a client of the Israeli firm.

The Pegasus Project also reported that the US phone number of a senior US diplomat, Robert Malley, who currently serves as the Biden administra­tion’s envoy to Iran and was one of the lead negotiator­s of the Obama administra­tion’s Iran deal, appears to have been selected as a person of interest by an NSO customer. There is no evidence that Malley was hacked and NSO has staunchly denied that the leaked database at the heart of the Pegasus Project was connected to the company or its clients.

NSO has said its government clients are prevented from deploying its software against US numbers because it has been made “technicall­y impossible”.

Reuters reported that the most “victims” who have recently been notified by Apple that they were hacked were “easily identifiab­le” as US government employees because of their associated email addresses, which ended in state.gov.

A senior Biden administra­tion official, speaking to Reuters on condition that he not be identified, said the threat to US personnel abroad was one of the reasons the administra­tion was cracking down on companies such as NSO and pursuing new global discussion about spying limits. The official added that they have seen “systemic abuse” in multiple countries involving NSO’s Pegasus spyware.

 ?? ?? A logo adorns a wall on a branch of the Israeli NSO Group company, near the southern Israeli town of Sapir. Photograph: Sebastian Scheiner/AP
A logo adorns a wall on a branch of the Israeli NSO Group company, near the southern Israeli town of Sapir. Photograph: Sebastian Scheiner/AP

Newspapers in English

Newspapers from United States