iTnews

NSO ran US-based attack servers: Facebook

By Juha Saarinen on Apr 26, 2020 4:50PM
NSO ran US-based attack servers: Facebook

Hundreds hacked via QuadraNet and AWS.

Facebook has filed legal documents that it says shows that Israeli spyware vendor NSO Group ran command and control servers on American cloud providers, which the social network says were used to hack hundreds of WhatsApp users.

Security researcher John Scott-Railton who with the University of Toronto's Citizenlab helped track the activities of NSO Group noted that the new documents presented evidence that the hacked devices connected to servers on California-located cloud providers QuadraNet and Amazon Web Services.

Ah! Another interesting detail, @WhatsApp engineers observed 723 NSO attacks on users in which phones, once exploited, reached out to NSO-owned servers in California (104.223.76[.]220 - @QuadraNet & 54.93.81[.]200 - @amazon) pic.twitter.com/cgPo03WKfo

— John Scott-Railton (@jsrailton) April 24, 2020

The new legal filings could undermine NSO Group's claims that it was not directly involved in the hacking of WhatsApp users as attacks were done through servers paid for by the Israeli spyware vendor.

NSO Group has maintained that its clients are doing the hacking, and that it wasn't involved the attacks.

Some 1400 WhatsApp users are said to have been attacked with NSO Group spyware, which was deployed on users' devices via a vulnerability in the messaging app.

NSO Group also argued that the case against the spyware vendor and its management should be dismissed as American courts have no jurisdiction over an Israeli company and that its alleged overseas government clients meant it had immunity from prosecution.

It's chief executive Shalev Hulio stated earlier that "NSO markets and licenses its Pegasus technology exclusively to sovereign governments and authorised agents" and that those sovereigns and not NSO operate the spyware.

Facebook and WhatsApp responded to the motion to dismiss, saying NSO Group was a commercial company and could not seek immunity as a foreign state as there was no basis in law for it be considered as such.

"Defendants contend that they cannot be held responsible for designing and marketing spyware and then deploying it using WhatsApp’s US-based servers, including in California, to hack into WhatsApp users’ devices.

Instead, Defendants pin blame on unidentified foreign sovereigns. That argument fails at every turn," WhatsApp and Facebook said.

Facebook sued the Israeli spyware vendor in October last year, alleging NSO Group was responsible for reverse-engineering WhatsApp in order to develop a hack to intercept the communications of activists, journalists and dissidents.

WhatsApp incurred costs to investigate the hacks and the vulnerability, and to develop and deploy a patch against it, Facebook said.

The messaging app also suffered loss of goodwill, and impairment to the integrity, quality and value of WhatsApp services, the social network claimed.

Known for its Pegasus spyware, NSO Group is also being sued for its alleged role in the monitoring of American journalist Jamal Khashoggi, who was murdered by Saudi Arabian government agents.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
facebook nso security whatsapp

Partner Content

One way SD-WAN can save business leaders' time
Partner Content One way SD-WAN can save business leaders' time
Improving returns from SD-WAN spending
Partner Content Improving returns from SD-WAN spending
Preventing cybercrime in the world of forex trading
Promoted Content Preventing cybercrime in the world of forex trading
What is zero trust cybersecurity?
Partner Content What is zero trust cybersecurity?

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Juha Saarinen
Apr 26 2020
4:50PM
0 Comments

Related Articles

  • India plans security audit of WhatsApp after hacking attempt
  • WhatsApp hacked to spy on top govt officials at US allies - sources
  • Facebook suspends fake Russian accounts, warns of US election hack-and-leak threat
  • Thailand takes legal action against Facebook, Twitter over content
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.