Title: NSO Group’s Role in Spyware Operations Exposed in WhatsApp Lawsuit
In a significant revelation from the ongoing legal battle between NSO Group and WhatsApp, newly unsealed legal documents have clarified that NSO, the Israeli cyberweapons manufacturer, directly engages in “installing and extracting” information from mobile phones targeted by its hacking software, Pegasus. This contradicts NSO’s previous claims that its government clients were solely responsible for operating the spyware. The details emerged from sworn depositions of NSO employees, showcasing a system that automatically accesses WhatsApp’s servers once a target’s phone number is entered.
WhatsApp first initiated the lawsuit in 2019, after discovering that 1,400 of its users—including journalists and activists—had been targeted by Pegasus within a short period. Despite NSO’s assertions that it only sells the software for combating serious crime and terrorism, the depositions suggest a more active role played by the company in exploiting the tool.
The timing of these developments is particularly notable given the political landscape. With Donald Trump’s potential return to the presidency in 2024, speculation mounts regarding a possible shift in U.S. policy towards spyware. NSO has been lobbying Congress to lift its designation on the Biden administration’s blacklist.
Amidst these tensions, WhatsApp is pushing for a summary judgment in the case, citing newly disclosed evidence, including instances of the spyware’s misuse against high-profile targets like Princess Haya of Dubai. A UK ruling previously found that Sheikh Mohammed bin Rashid al-Maktoum unlawfully hacked her phone using Pegasus during contentious custody proceedings. The complexities of this case highlight the ethical and legal ramifications of spyware in modern governance and individual privacy.
Source
Photo credit www.theguardian.com