Android and iPhone spyware linked to attacks and murders


Android and iPhone spyware sold by the NSO group enables state-of-the-art terror attacks in several countries, according to a new database released by Amnesty International and affiliates.

NSO uses zero-day exploits to develop spyware for both iPhone and Android smartphones, allowing users to read text messages and emails, monitor contacts and calls, track locations, access passwords, and more. Can collect, and even switch on the smartphone’s microphone to record the meeting…

background

A zero-day vulnerability is a security flaw that is unknown to the company that makes the hardware or software, and can be used to create malware, including spyware. The privacy protections in iPhones mean that the zero-day black market discovered in iOS could be worth big bucks, with Israel-based NSO Group buying many of them for its Pegasus spyware.

NSO was founded in 2010 to report on the many years-old exploits of the iPhone. The company says it only sells Pegasus to governments, but critics say it includes countries with a record of human rights abuses.

In 2019, it was revealed that Pegasus could quietly collect all iCloud data from a target’s phone. Was also reportedly behind the text-activated hack of Pegasus-related iPhones al Jazeera Journalist. Like other NSO attacks, this was a zero-touch exploit that didn’t require the victim to do anything other than receive a text.

Amnesty International tried to stop the export of spyware last year.

Impact of NSO Android and iPhone Spyware

bloomberg Reports on new database that claims to link Pegasus use to multiple abuses, including murder.

A new research database from human rights groups has accused Israeli company NSO Group Ltd of providing governments with technology that has been used to spy on dozens of journalists, activists and lawyers, and alleging that the product broke-in. linked to acts of violence, including harassment, intimidation and murder […]

A new database released Saturday by Amnesty International, Citizen Lab and Forensic Architecture documents more than 60 cases in which NSO’s spyware was used to target dissidents and government critics from countries including Rwanda, Togo, Spain, the United Arab Emirates, Saudi Arabia has been done for. Mexico, Morocco and India […]

The new database by human rights groups, titled “Digital Violence: How the NSO Group Enabled State Terror”, is based on analysis of legal files, interviews with alleged victims, export licenses, news reports and procurement records.

Rights groups allege that government use of NSO spyware is “continuously entangled with a spectrum of bodily violations”, including arrests, assaults and even murder, in the case of Saudi journalist Jamal Khashoggi, whose associates were convicted. Was reportedly targeted by Saudi use. of Pegasus before his assassination at the hands of Saudi government operatives in October 2018. The NSO has denied that its technology was used to target Khashoggi.

NSO says it has already refused to sell its spyware to 55 countries, and it investigates claims of abuse.

The NSO Group investigates all credible claims of abuse, and NSO takes appropriate action based on the results of its investigation. This involves shutting down a customer’s system – a step NSO has taken several times in the past and will not hesitate to take it again if the situation warrants it.

You can access the database here.

FTC: We use income generating auto affiliate links. more.


For more Apple news, check out 9to5Mac on YouTube:



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *