Carmil resents a comparison with the NSO Group. “I know the people at NSO and appreciate their know-how, but Cellebrite works in the legitimate world of the police force, whose abilities are closely controlled, unlike the world of NSO customers and others who engage in illegal and concealed activity. Cellebrite is totally on the good side, where court orders are used. We do not make tools for breaking into private entities or espionage organizations.”
NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.
According to a document signed by an unnamed vice president for Candiru, they also offer a “high-end cyber intelligence platform dedicated to infiltrate PC computers, networks, mobile handsets, by using explosions and disseminations operations.“
In an age of ubiquitous technology and strong encryption, such “lawful hacking” has emerged as a powerful tool for public safety when law enforcement needs access to data. NSO insists that the vast majority of its customers are European democracies, although since it doesn’t release client lists and the countries themselves remain silent, that has never been verified.
The Israeli company has signed contracts with Bahrain, Oman and Saudi Arabia.
A Tel Aviv court has rejected a legal case filed by Amnesty International that attempted to block the Israeli spyware firm NSO Group from selling its cyberweapons internationally.
The rights groups sought to force the Israeli defence ministry to revoke NSO Group’s export licence for its leading phone-hacking software, Pegasus. Amnesty’s lawyers alleged the product had been used by repressive governments to target activists, including one the rights group’s own researchers, as well as journalists.
“Today’s disgraceful ruling is a cruel blow to people put at risk around the world by NSO Group selling its products to notorious human rights abusers. At a moment when NSO and the Israeli MOD should be held accountable for their practices, it is appalling that the court has failed to do so.
“NSO Group continues to profit from human rights abuses with impunity. The ruling of the court flies in the face of the mountains of evidence of NSO Group’s spyware being used to target human rights defenders from Saudi Arabia to Mexico, including the basis of this case – the targeting of one of our own Amnesty employees. We will continue to do all we can to stop NSO Group’s spyware being used to commit human rights abuses.
Israeli cyber espionage company NSO provided tools that helped the Moroccan regime track a local journalist named Omar Radi, according to a thorough investigation that human rights organization Amnesty International conducted over the past few months. The report was released on Monday.
The espionage against Radi began only a few days after NSO ostensibly committed itself to a new policy of transparency in keeping with the United Nations’ human rights guidelines for companies, according to the Amnesty investigation.
Das Programm, das auf sein Handy gespielt worden sein soll, soll laut Amnesty-Analyse von der israelischen Firma NSO stammen und nennt sich „Pegasus“. Mithilfe der Software ist es möglich, jegliche Kommunikation eines Mobiltelefons mitzuschneiden – egal, ob es sich dabei um Telefonate, SMS oder E-Mails handelt. Offiziell wird die NSO-Software zur Jagd auf Verbrecher und Terroristen eingesetzt.
The tech giant’s counsel filed a response to NSO’s move for dismissal that included two IP addresses and a handful of websites it claims were used by NSO Group to attack WhatsApp users in spring 2019. One was hosted by Amazon Web Services in the U.S., the others by Californian company QuadraNet and a German provider.
According to WhatsApp’s filing, NSO gained “unauthorised access” to its servers by reverse-engineering the messaging app and then evading the company’s security features that prevent manipulation of the company’s call features. One WhatsApp engineer who investigated the hacks said in a sworn statement submitted to the court that in 720 instances, the IP address of a remote server was included in the malicious code used in the attacks. The remote server, the engineer said, was based in Los Angeles and owned by a company whose data centre was used by NSO.
NSO also claimed that it and Q Cyber are entitled to immunity because they operate in the service of foreign countries. Facebook claims that the Israeli companies are not entitled to such immunity under U.S. law.
Auch auf dem Smartphone des in Istanbul ermordeten saudiarabischen Journalisten Dschamal Kashoggi wurde der NSO-Trojaner gefunden. Dafür hatte NSO die Übertragungsprotokolle von WhatsApp angegriffen, so die Klage. In Israel hingegen wird NSO-Software gerade zur Smartphone-Überwachung gegen die Verbreitung des Coronavirus vom Inlandsgeheimdienst Shin Bet eingesetzt.
Die Cyber-Intelligence-Firma NSO Group behauptet, eine Software entwickelt zu haben, mit der Gesundheitsministerien die Ausbreitung des Corona-Virus verfolgen können. Angeblich nutzen rund ein Dutzend Staaten sie bereits zu Testzwecken.
Facebook is seeking to have NSO barred from accessing or attempting to access WhatsApp and Facebook’s services after hacking spree that targeted journalists, diplomats, activists and others
– Amnesty International have filed a lawsuit in Israel following the WhatsApp hack
– Amnesty have accused NSO of not giving due diligence in selling their product
– This week WhatsApp said NSO’s spyware software was used in a security breach
– WhatsApp said the attack may have been launched against human rights groups
Amnesty International is supporting a legal action to take the Israeli Ministry of Defence (MoD) to court, to demand that it revokes the export license of NSO Group, an Israeli company whose spyware products have been used in chilling attacks on human rights defenders around the world.
In a petition to be filed tomorrow at the District Court of Tel Aviv, approximately 30 members and supporters of Amnesty International Israel and others from the human rights community set out how the MoD has put human rights at risk by allowing NSO to continue exporting its products.
An Israeli firm accused of supplying tools for spying on human-rights activists and journalists now faces claims that its technology can use a security hole in WhatsApp, the messaging app used by 1.5 billion people, to break into the digital communications of iPhone and Android phone users.
Security researchers said they had found so-called spyware — designed to take advantage of the WhatsApp flaw — that bears the characteristics of technology from the company, the NSO Group.
Unabhängig davon, ob ein Anruf angenommen wird oder nicht, kann allein schon mit dem Versuch eines Verbindungsaufbaus der Exploit-Code übermittelt werden, so dass sich die Malware installieren lässt.
Eine Schad-Software, die diesen Bug bereits aktiv ausnutzt, ist ein Staatstrojaner namens Pegasus. Dieser wird von der israelischen Firma NSO Group entwickelt und an verschiedene staatliche Behörden lizenziert.
WhatsApp told the Financial Times, which broke the story, that „the attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems. We have briefed a number of human rights organizations to share the information we can, and to work with them to notify civil society.“
On Monday, Amnesty International said it was backing legal action against the Israeli Ministry of Defence demanding that it revokes NSO Group’s export licence. Danna Ingleton, deputy director of Amnesty Tech, said: ‘NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics.’
An Israeli company licenses software around the world that can crack just about any smartphone, but is its use always on the side of good?
Hulio’s company, worth hundreds of millions of dollars, first made global headlines in 2016 when its tools were used by the authoritarian government of the UAE in order to spy on Ahmed Mansoor, an award-winning human rights activist. The company has never fully addressed the spying; Mansoor currently sits, untried and unable to regularly contact his family, in an unidentified prison somewhere in the UAE on charges of criticizing the UAE government.
The spotlight did not dissuade the company. Instead, it served as an advertisement to other authoritarian governments about NSO Group’s exceptional ability …
Saudi dissident Omar Abdulaziz, who lives in Canada, has filed a lawsuit against an Israeli technology company called the NSO Group accusing it of providing the Saudi government with the surveillance software to spy on him and his friends — including Jamal Khashoggi. The program, known as Pegasus, not only allows the monitoring of all communications from a phone — all texts, all emails, all phone calls — but can also hijack a mobile phone’s microphone and camera to turn it into a surveillance device.
Before NSO helped the Saudi government track its adversaries outside the kingdom, and helped the Mexican government hunt drug kingpins, and earned hundreds of millions of dollars working for dozens of countries on six continents, the company consisted of two high school friends in northern Israel with one relatively mundane idea.
Using technology developed by graduates of Intelligence Unit 8200 — Israel’s equivalent of the N.S.A.— Shalev Hulio and Omri Lavie started a company in 2008 that allowed cellphone firms to gain remote access to their customers’ devices to perform maintenance.
Word spread to Western spy services, whose operatives spotted an opportunity.
(8.10.2018) Developed by Israeli cyber company NSO Group, Pegasus sends „exploit links“ to operators‘ targets, who can then access virtually all the phone’s data and can even use the phone’s camera to spy on conversations.
(2.10.201) Agents apparently linked to the Saudi regime used spy technology from Israeli firm NSO Group Technologies to eavesdrop on a Saudi dissident in Canada, according to a report on Monday.
The Citizen Lab research group said it had “high confidence” that NSO’s Pegasus software had been used this summer to eavesdrop on a 27-year-old Saudi exile, Omar Abdulaziz.
In early June 2018, an Amnesty International staff member received a suspicious WhatsApp message in Arabic. The text contained details about an alleged protest outside the Saudi embassy in Washington D.C., followed by a link to a website. Investigations by Amnesty International’s technology team revealed that clicking the link would have, according to prior knowledge, installed “Pegasus”, a sophisticated surveillance tool developed by the Israel-based company NSO Group.
Like many other Israeli startups in the security field, NSO was founded in 2010 by three veterans of the army’s premier signals intelligence unit, 8200: Niv Carmi, Omri Lavie and Shalev Hulio. They started work on Pegasus, which remains NSO’s only product, immediately after founding the company.