This week, WhatsApp’sÂ began urging its 1.5 billion or so users to update theirÂ appsÂ to get the latest security patch. The Facebook-owned companyÂ â€” which touts its “simple, secure” messaging â€” said it discovered spyware had been installed remotely on “dozens” of smart phones throughÂ the app. The hack affected both Apple and Android users.
Without naming the company, WhatsApp described the hackers as “a private company that has been known to work with governments to deliver spyware.”
The Financial Times identified the company as NSO Group. A spokesperson for WhatsApp later told The Associated Press: “We’re certainly not refuting any of the [news] coverage you’ve seen.”
What is NSOÂ Group?
NSO Group describes itself as a cybertechnologies company. Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons.
What does its technology do?
NSO is vague about how its technology works. But the University of Toronto’s Citizen Lab, through its research, has determined that itsÂ software basically can gainÂ access to private or confidential informationÂ â€” anÂ individual’s smartphone, for exampleÂ â€”Â and through it, seeÂ and hearÂ all of its communications.
NSO boasts on its website that its technology “has helped governments save thousands of lives, prevent terrorist attacks, break up major crimes, and make the world a safer place.”
But “what is concerning, though,” according to Kevin Mitnick, CEO of mitnicksecurities.com, “is they sell their cyberweapons to countries that might use it against dissidents and might use it to persecute people that are saying bad things about the country or its leadership.”
NSO doesn’t exactly deny this. It has said that it sells only to responsible countries after diligent vetting, and with Israeli government approval.Â
“NSO would not or could not use its technology in its own right to target any person or organization,” it said in a statement Tuesday.
Who areÂ NSO’s clients?
Citizen Lab says NSO’s technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group’s revenues come from the Middle East, but that it has contracts with 21 EU countries, as well.
“This type of exploit wouldn’t be available to the criminal-based type of hackers,” Mitnick said,Â “because they simply can’t afford to buy these cyberweapons.”
Public Safety and Emergency Preparedness Canada did not respond to inquiries about whether Ottawa has bought technology from NSO.
John Scott-Railton, a senior researcher atÂ Citizen Lab, saysÂ it’s not known publicly if Canada has ever been a customer. But heÂ hopes any country considering itÂ would also acquire strong oversight.
“This technology comes withÂ a temptation to abuse because it’s designed to be stealthy and hard to find,” he said. “The abuse potential is so dramatic.”
Amnesty International, which said last year that one of its staffers was targeted by NSO spyware,Â is demanding Israel suspend NSO’s export license for exactly thatÂ reason.
“These softwares that NSO is marketing as tools to prevent terror and crime, are used against human rights defenders and lawyers and doctors and members of Parliament,” Chen Brill-Egri of Amnesty International Israel told Reuters.
“And when the Ministry of Defence in Israel allows this to happen, it endangers millions of people around the world.”
How did this latest hack happen?
Mitnick saidÂ many apps are developedÂ with millions of lines of code â€” and people make mistakes.
“And what happens is security researchers find these flaws and they’re able to develop what they call exploit code to take advantage of these flaws and do exactly what was done in this case.”
WhatsApp has admitted this vulnerability involved a missed call coming to the phone through the app.
“No user interaction required,” said Scott-Railton, “which makes it particularly insidious.”
The hacker would then use that missed call to slide a piece of malware onto the phone.
“That malware,” he continued, could then be used “to turn on the phone’s microphone to capture encrypted conversations, private files and personal materials.”
Was I targeted?
Probably not. WhatsApp says the actual number of people who were affected by this attack amounted to maybe a couple dozen. But as Scott-Railton points out, “the number of people who are vulnerable to this is quite high â€¦ an entire user base.”
His takeaway: “There’s a problematic industry that’s in the business of finding these vulnerabilities. And instead of disclosing them to companies so that they can be closed up, [they’re] selling those vulnerabilities and making them available to customers who will then, as we see, turn around and abuse them.”
How do I update my WhatsApp app?
You can find outÂ here.Â
Article source: https://www.cbc.ca/news/canada/whatsapp-hack-nso-cbc-explains-1.5136061?cmp=rss