NSO Group

NSO Group Technologies Ltd.
Private
Industry Computer security
Founded 2010 (2010)
Founders
  • Niv Carmi
  • Omri Lavie
  • Shalev Hulio
Headquarters Herzliya, Israel
Key people
Shalev Hulio (CEO)[1]
Products Pegasus
Owner

NSO Group Technologies is an Israeli software company founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio.[2][3] It is reported to employ around 200 people and is based in Herzliya near Tel Aviv.[1][4] Annual revenues were said to be around $40 million in 2013 and $150 million in 2015.[2][5] According to the company, it provides "authorized governments with technology that helps them combat terror and crime".[6]

Background

Its former chairman of the board of directors was retired general Avigdor Ben-Gal, previously head of Israel Aircraft Industries in the 1990s.[2] The founders are said to be ex-members of Unit 8200, the Israeli Intelligence Corps unit responsible for collecting signals intelligence;[6] The company's start-up funding came from a group of investors headed by Eddy Shalev, a partner in the venture capital fund Genesis Partners. The group invested in total 1.8 million dollar for 30% of the company's shares.[7][2]

In 2012, the government of Mexico said that it had signed a $20 million contract with NSO Group.[2] The company was reported in 2015 to be a supplier of surveillance technology to the government of Panama. The contract became the subject of a Panamanian anti-corruption investigation following its disclosure in a leak of confidential information from the Italian firm Hacking Team.[8] In 2014, the American private equity firm Francisco Partners bought the company for $130 million.[9] It was reported in 2015 to be seeking to sell the company for up to $1 billion.[5]

Pegasus malware

For more details on this topic, see Pegasus (spyware).

On August 25, 2016, Citizen Lab and Lookout revealed that malware known as Pegasus, created by the company, was being used to target human rights activist Ahmed Mansoor in the United Arab Emirates.[10] Mansoor is an internationally recognized human rights activist and 2015 Martin Ennals Award Laureate. He informed Citizen Lab researchers Bill Marczak and John Scott-Railton that his iPhone 6 was targeted on August 10, 2016, by means of a clickable link in an SMS text message.[6][11]

An analysis by Citizen Lab and Lookout discovered that the link downloaded malware that exploited three previously unknown and unpatched zero-day vulnerabilities in the iPhone's operating system iOS.[12] According to Lookout's analysis, the malware can silently jailbreak an iPhone when a victim, through spear phishing, is sent and opens a malicious URL. After a user opens this link, the malware installs on the phone, hoovering up all communications and locations of the targeted iPhones including iMessage, Gmail, Viber, Facebook, WhatsApp, Telegram and Skype communications and it can collect Wi-Fi passwords.[6] The researchers noticed that the malware's code referenced an NSO Group product called 'Pegasus' in leaked marketing materials.[4] Pegasus had previously come to light in a leak of records from the Italian company Hacking Team, when it was said to have been supplied to the government of Panama.[8] The researchers found that a Mexican journalist, Rafael Cabrera, had also been targeted and there was evidence that the malware could have been used in Israel, Turkey, Thailand, Qatar, Kenya, Uzbekistan, Mozambique, Morocco, Yemen, Hungary, Saudi Arabia, Nigeria, and Bahrain.[6]

Citizen Lab and Lookout notified Apple's security team. Apple patched the flaws within ten days and released an update for iOS.[13] A patch for macOS was released six days later.[14]

See also

References

  1. 1 2 Franceschi-Bicchierai, Lorenzo; Cox, Joseph (August 25, 2016). "Meet NSO Group, The New Big Player In The Government Spyware Business". VICE Magazine. Retrieved 2016-08-25.
  2. 1 2 3 4 5 Hirschauge, Orr; Orpaz, Inbal (February 17, 2014). "U.S. Fund to Buy NSO and Its Smartphone-snooping Software". Retrieved 2016-08-26.
  3. Coppola, Gabrielle (September 29, 2014). "Israeli Entrepreneurs Play Both Sides of the Cyber Wars". Bloomberg News. Retrieved 2016-08-25.
  4. 1 2 Lee, Dave (August 26, 2016). "Who are the hackers who cracked the iPhone?". BBC News. Retrieved 2016-08-26.
  5. 1 2 Stone, Mike; Roumeliotis, Greg (November 2, 2015). "Secretive cyber warfare firm NSO Group explores sale: sources". Reuters. Retrieved 2016-08-26.
  6. 1 2 3 4 5 Fox-Brewster, Thomas (August 25, 2016). "Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text". Forbes. Retrieved 2016-08-25.
  7. Fischer, Yisrael; Levi, Ruti (August 29, 2016). "The Israelis Behind History's 'Most Sophisticated Tracker Program' That Wormed Into Apple". Retrieved 2016-09-01.
  8. 1 2 Rodriguez, Rolando B.; Diaz, Juan Manuel (August 7, 2015). "Abren sumario en caso Hacking Team". La Prensa (Panama City). Retrieved 2016-08-25.
  9. Yadron, Danny (August 1, 2014). "Can This Israeli Startup Hack Your Phone?". The Wall Street Journal. Retrieved 2016-08-25.
  10. Franceschi-Bicchierai, Lorenzo (August 25, 2016). "Government Hackers Caught Using Unprecedented iPhone Spy Tool". VICE Magazine. Retrieved 2016-08-25.
  11. Peterson, Andrea (August 25, 2016). "This malware sold to governments could help them spy on iPhones, researchers say". The Washington Post. Retrieved 2016-08-25.
  12. Technical Analysis of Pegasus Spyware (PDF) (Technical report). Lookout. August 25, 2016. Retrieved 2016-08-25.
  13. "About the security content of iOS 9.3.5". Apple Inc. August 25, 2016. Retrieved 2016-08-25.
  14. "About the security content of Security Update 2016-001 El Capitan and Security Update 2016-005 Yosemite". Apple Inc. September 1, 2016. Retrieved 2016-09-01.
This article is issued from Wikipedia - version of the 9/13/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.