Wednesday, February 26, 2025
HomeCyber AttackIsrael Firm Linked With WhatsApp Spyware Hack Faces Lawsuit

Israel Firm Linked With WhatsApp Spyware Hack Faces Lawsuit

Published on

SIEM as a Service

Follow Us on Google News

The Israel firm linked with WhatsApp Spyware Hack to face a lawsuit filed by human rights NGO Amnesty International. The vulnerability was patched by WhatsApp last week, but still, it is not clear how many users affected by the attack.

Whatsapp said that the spyware attack was specifically targeting human rights groups, a simple Whatsapp call an attacker could exploit the bug can deploy spyware in the targeted device.

Amnesty submitted a lawsuit claims that “Staff of Amnesty International have an ongoing and well-founded fear they may continue to be targeted and ultimately surveilled.” Amnesty also petition that for revocation of NSO Group’s export license.

NSO claims that it sells the tools only to the law enforcement and intelligence agencies for tracking criminals and terrorists. The NSO group was founded in 2010, which supplies surveillance software for government agencies.

NSO said, “it would investigate any credible allegations of misuse of its technology which is solely operated by intelligence and law enforcement agencies.”

The lawsuit claims that “NSO Group’s surveillance products and the foreseeability of their misuse when sold to governments that have a history of violating the rights of human rights defenders and that lack adequate legal frameworks for, and institutional oversight of, the deployment of digital surveillance software.”

“NSO Group’s apparent failure to take adequate steps to prevent the foreseeable misuse of its products before or after their sale, and the Israeli government’s apparent failure to adequately prevent such sales – shortcomings that exacerbate the risk of misuse.”

The bug was swiftly fixed last week, successful exploitation of bug leads to install of Pegasus spyware on the targeted device, and it allows an attacker to extract all the data that includes contacts, photos, call history and previous text messages regardless of encryption.

“Recent investigative reports by Haaretz detailing NSO Group’s sale of Pegasus to the Saudi government suggests the company lacks adequate procedures and safeguards regarding the risks its products pose to human rights,” lawsuit states.

Telegram Founder Pavel Durov said, “WhatsApp Will Never be Safe, Looking back, there hasn’t been a single day in WhatsApp’s 10-year journey when this service was secure. That’s why I don’t think that just updating WhatsApp’s mobile app will make it secure for anyone.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Facebook Down for Billions of Users Around the World – Instagram & WhatsApp Also Affected

Beware!! New Android Malware That Can Read Your WhatsApp Messages & Take Screen Shots

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...