Friday, February 21, 2025
HomeFACEBOOKFacebook Secretly Tried to Buy Pegasus Spyware From NSO Group to Monitor...

Facebook Secretly Tried to Buy Pegasus Spyware From NSO Group to Monitor Apple Users Activities & Access Data

Published on

SIEM as a Service

Follow Us on Google News

NSO Group CEO Shalev Hulio Claim that Facebook tried to buy a Pegasus Spyware to monitor better their users especially access to the Apple user’s data and their activities.

Pegasus is a powerful commercial spyware developed by Israel based spyware maker NSO group, also known as Q cyber technologies.

The company claimed that they sell its spyware only government and law enforcement agencies for tracking criminals and terrorists, but it alleged that their technology also used to target the individual users around the world

Oct 2019, Facebook filed a lawsuit against the NSO group in the U.S district count in northern direct of California for hacking its WhatsApp messenger by exploiting the zero-day vulnerability using Pegasus to steal the WhatsApp users data.

Now, the Defendant of this case, NSO group or Q cyber technologies CEO and the major shareholder of the company Shalev Hulio declared that two Facebook representatives approached to NSO group to purchase the right to use certain capabilities of Pegasus spyware.

During the time, Facebook was in an initial stage of deploying the VPN Product called Onavo Protect that helps Facebook to analyze the user’s traffic and their activities and send them through the VPN.

Also, he started his declaration in the Court document “Onavo Protect, which has frequently been categorized as “spyware,” allowed Facebook to gather information about Onavo Protect users, including the applications installed on those users’ mobile devices and the amount of time the users spent on each application. “

Also, Facebook representatives stated that Facebook was concerned that its method for gathering user data through Onavo Protect was less effective on Apple devices than on Android devices.

Facebook requested to NSO group that they wanted to use purported capabilities of Pegasus to monitor the users on Apple devices and was willing to pay for the ability to monitor Onavo Protect users.

Shalev Hulio also stated that ” Facebook proposed to pay NSO a monthly fee for each Onavo Protect user. Facebook is a private entity and not a sovereign government or government agency for national security and law enforcement purposes and therefore does not meet NSO’s customer criteria and NSO group declined the sale”

Facebook Spokesperson stats that “NSO is trying to distract from the facts Facebook and WhatsApp filed in court over six months ago. Their attempt to avoid responsibility includes inaccurate representations about both their spyware and a discussion with people who work at Facebook. “

Facebook removed the Onavo Protect from the App Store and Google Play as well due to the suspect of monitoring the users.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at...

New Facebook Fake Copyright Notices to Steal Your FB Accounts

A newly discovered phishing campaign is using fake Facebook copyright infringement notices to trick...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...