Spyware - Apple Starts Legal Action Against NSO Group

Apple is suing Israeli spyware firm NSO Group and its parent company for allegedly targeting iPhone users with a powerful hacking tool. 

NSO's Pegasus software can infect both iPhones and Android devices, allowing operators to extract messages, photos and emails, record calls and secretly activate microphones and cameras.

The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. 

The lawsuit was filed in the federal court in San Jose, California, and alleges that NSO Group was engaged in concerted efforts in 2021 to attack Apple customers, products and servers through dangerous malware and spyware. “State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability. That needs to change,” said Craig Federighi, Apple’s senior vice president of Software Engineering. 

US Government Blacklist

The Apple action follows only a couple of weeks after the  Israeli company was added to a US trade blacklist.
NSO Group's Pegasus software has reportedly been used by nation states to target the phones of rights activists and journalists and has consequently placed NSO Group, on its "entity list", banning business dealings with them.

The other firms added to the list with NSO Group are fellow Israeli spyware agency Candiru, Russia’s Positive Technologies and Singapore’s Computer Security Initiative Consultancy.

The Israeli company has in the past sold its surveillance software to Saudi Arabia, Mexico, the United Arab Emirates and other countries with poor human rights records. The company has consistently defended its actions by claiming that its surveillance tools are meant to be used by its customers to investigate serious crimes and terrorism. It has also alleged that it has no information about how its tools are used against targets.

Apple wants to hold NSO Group and its parent company OSY Technologies "accountable for the surveillance and targeting of Apple users" and is seeking a permanent injunction to ban NSO Group from using any Apple devices, software or services "to prevent further abuse and harm to its users...  "Defendants are notorious hackers, amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse," Apple wrote in its legal complaint.

The US government statement about placing put NSO Group on its trade blacklist says that that the company's software had "enabled foreign governments to conduct transnational repression, which is the practice of authoritarian governments targeting dissidents, journalists and activists". 

NSO denies those claims, saying it only works with law enforcement, military, and intelligence agencies from countries with good human-rights records.

In July, Paris-based non-profit Forbidden Stories and Amnesty International said NSO's Pegasus spyware may have been used to snoop on more than 1,000 journalists, rights activists and other prominent individuals, from about 50 countries. President Emmanuel Macron's phone number also reportedly showed up on a leaked list of French government minsters said to be bugged with Pegasus. 

Apple stated in its complaint that the NSO created more than 100 fake Apple ID user credentials to carry out its attacks. While its servers were not hacked, the Israeli firm misused and manipulated Apple's servers to deliver the attacks on iPhone users. 

The US and Israel are close allies, with their respective cyber-experts having co-operated to restrain Iran's nuclear programme. But Pegasus spyware has emerged as a formidable cyber-weapon, used by some of the most  autocratic regimes in the Middle East to target a wide range of people, not just criminals and terrorists. Journalists, lawyers, peace activists and other dissidents have all had their phones secretly infected with malware that allows the customer to read every message, access all their data and even remotely turn on the microphone without the owner's knowledge.

Apple:     Reuters:     Computing:     BBC:    JPost:   New York Times:   Times of Israel:    The Print

You Might Also Read:

Your Phone Is Spying On You:

 

« Russia Wants Control Over Big Tech
Tesla Drivers Can’t Unlock Their Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Totalsec

Totalsec

Totalsec is a Grupo Salinas company with a team of professionals in cybersecurity and information security providing Security Consulting, Solutions Integration, and Managed Security Services.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.