A wall on a branch of the Israeli NSO Group company,near the southern Israeli town of Sapir.Credit:AP
This is the first time since 2019 that the malicious code used in a Pegasus hack has been discovered by researchers and offers new insights into the techniques of the company,highlighted in July by The Pegasus Project,a multi-part global investigation byThe Washington Post and 16 other news organisations.
The researchers declined to name the Saudi activist who was targeted,at the person’s request. They also did not reveal what NSO governmental client they believe deployed Pegasus against this person. They did say thatthe hacking technique used,which they called “forced entry”,has been active since February and can invade Apple iPhones,MacBooks and Apple Watches secretly in what’s called a “zero-click attack” - something of a speciality for NSO,which is based in Israel.
“We wouldn’t have discovered this exploit if NSO’s tool wasn’t used against somebody they shouldn’t be targeting,” said John Scott-Railton,a researcher for Citizen Lab,based at the University of Toronto’s Munk School of Global Affairs and Public Policy.
He added,“chat programs are quickly becoming a soft underbelly of device security.”
“Chat programs are quickly becoming a soft underbelly of device security,” said one reseacher.Credit:AP
Apple did not immediately respond to a request for comment.
NSO Group says it licenses itsPegasus spyware tool to government agencies and police forces around the world to investigate major crimes. But the Pegasus Project investigation and earlier reports by Citizen Lab found that the tool had also been used to target political dissidents,business leaders,journalists and human rights activists.