Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

NSO Group

Page extended-confirmed-protected
From Wikipedia, the free encyclopedia
Israeli cyber-espionage and malware firm

NSO Group Technologies Ltd.
Company typePrivate
IndustryTechnology
Founded2010; 15 years ago (2010)
Founders
  • Omri Lavie
  • Shalev Hulio
  • Niv Karmi
    (left the company one month after its inception)
Headquarters,
Israel
Key people
Yaron Shohat (ActingCEO)[1][2]
ProductsPegasus
RevenueUS$ 243 million (2020)
US$ 99 million (2020)
Owner
  • Novalpina Capital
  • Omri Lavie
  • Shalev Hulio
Number of employees
750 (2021) Edit this on Wikidata
Websitensogroup.com

NSO Group Technologies Limited (NSO standing forNiv, Shalev, and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietaryspywarePegasus, which is capable of remotezero-click surveillance of smartphones.[3] It employed almost 500 people as of 2017.[2][4][5]

NSO claims that it provides authorized governments with technology that helps them combat terror and crime.[6][7] The company says that it deals with government clients only.[8]Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government.[9]

According to several reports, NSO Group spyware has been used to targethuman rights activists andjournalists in various countries,[10][11][12] was used for state espionage againstPakistan,[13] forwarrantless domestic surveillance of Israeli citizens by Israeli police,[14] and played a role in themurder of Saudi dissidentJamal Khashoggi by agents of the Saudi government.[15]

In 2019, instant messaging companyWhatsApp and its parent companyMeta Platforms (then known as Facebook) sued NSO under the United StatesComputer Fraud and Abuse Act.[6][7] In 2021, Apple filed a lawsuit against NSO in the U.S.,[16] and the US included NSO Group in itsEntity List for acting against U.S. national security and foreign policy interests, effectively banning U.S. companies from supplying NSO.[17]

Corporate profile

Overview

NSO Group is a subsidiary of the Q Cyber Technologies group of companies.[7] Q Cyber Technologies is the name the NSO Group uses in Israel, but the company goes by OSY Technologies in Luxembourg, and in North America, a subsidiary formerly known as Westbridge. It has operated through various other companies around the world.[18]

Founding

NSO Group was founded in 2010 by Niv Karmi, Shalev Hulio, and Omri Lavie.[19][20][21] Hulio and Lavie were school friends who went into the technology start-up sector during the mid-2000s. The pair founded a company - CommuniTake - which offered a tool that let cellphone tech support workers access the customers' devices (but necessitating that the customer grant permission to enable access). After a European intelligence agency expressed interest in the product, the pair realised they could instead develop a tool that could gain access to phones without user authorisation, and market it to security and intelligence agencies. Karmi, who served in military intelligence and the Mossad, was brought on board to help market the tool with the help of his contacts. The first iteration of NSO's Pegasus spyware was finalised in 2011.[8]

Operations

NSO Group has come to employ over 700 personnel globally. Almost all of NSO's research team is made up of former Israeli military intelligence personnel, most of them having served in Israel'sMilitary Intelligence Directorate, and many of these in itsUnit 8200. The company's most valuable staff are graduates of the military intelligence's highly selective advanced cyberweapons training programs. NSO seeks to uncover a surfeit ofzero-day exploits in target devices to ensure smooth continuous access even as some of the security vulnerabilities exploited by NSO are inevitably discovered and patched, with labs in the company's Herzliya headquarters featuring racks stacked with phones being tested against new exploits.[8]

Relationship with the Israeli state

Pegasus spyware is classified as a military export by Israel and its sale is controlled by the government.[9] According toThe New York Times, "Israel's government has long seen Pegasus as a critical tool for its foreign policy."[22] and that it "[...] has treated NSO as ade facto arm of the state, granting licenses for Pegasus to numerous countries [...] with which the Israeli government hoped to nurture stronger security and diplomatic ties."[23] Israel has used the sale of NSO products as a diplomatic bargaining chip to advance its foreign policy interests as well as limiting its sale to[8][22] or its use against certain states to maintain good relations with certain states.[8] Israel has faced criticism for approving the sale of NSO technologies to countries with poor human rights records.[24] U.S. intelligence officials have also said the Israeli state presumably has backdoor access to data obtained by Pegasus. NSO denies being "a tool of Israeli diplomacy", and denies the presence of a backdoor in its spyware tools.[25]

Israel, wary of angering the U.S. in the wake of theSnowden revelations, required NSO to prevent Pegasus from targeting American phone numbers. Israel has used Pegasus to advance its interests in the region, with Pegasus playing a role in negotiating theAbraham Accords. ANew York Times investigation highlighted several instances in which the sale of Pegasus to a particular government coincided with that government's increased support of Israel.[8] Israel has used Pegasus sales in its diplomatic efforts to forge a united front against Iran, thus clearing the sale of the spyware toAzerbaijan,Morocco, theUAE, andSaudi Arabia.[26]

The Israeli government blocked the sale of Pegasus to Estonia and Ukraine for fear that Israel's relations with Russia would be damaged if the spyware was used against Russia. Israel initially authorised the export of Pegasus to Estonia (which made a $30 million down payment to obtain the system), but after a senior Russian official approached Israeli security agencies and informed them that Russia had learned of Estonia's attempts to obtain Pegasus, the Israeli Ministry of Defense decided to disallow Estonia from using Pegasus against any Russian phone numbers following a heated debate on the issue among Israeli officials, and subsequently blocked the sale.[22]

Corporate history

The company's start-up funding came from a group of investors headed by Eddy Shalev, a partner inventure capital fundGenesis Partners which invested a total of $1.8 million for a 30% stake.[27][19]

In 2013, NSO's annual revenues were around US$40 million.[19][28]

In 2014, the U.S.-basedprivate equity firmFrancisco Partners bought the company for $130 million.[29]

In 2014, the surveillance firm Circles (which produces is a phone geolocation tool) was acquired by Francisco Partners for $130 million, and thus became a corporate affiliate of NSO's.[30]

In 2015, Francisco was seeking to sell the company for up to $1 billion.[28]

Annual revenues were around $150 million in 2015.[19][28]

In June 2017, the company was put up for sale for more than $1 billion byFrancisco Partners (roughly ten times what Francisco originally paid to acquire it in 2014).[4] At the time it was put up for sale, NSO had almost 500 employees (up from around 50 in 2014).[4]

On February 14, 2019, Francisco Partners sold a majority (60%) stake of NSO back to co-founders Shalev Hulio and Omri Lavie, who were supported in the purchase by European private equity fund Novalpina Capital[31] which specialises in investments in controversial companies.[26] Hulio and Lavie invested $100 million, with Novalpina acquiring the remaining portion of the majority stake, thus valuing the company at approximately $1 billion.[32] The day after the acquisition, Novalpina attempted to address the concerns raised by Citizen Lab with a letter, stating their belief that NSO operates with sufficient integrity and caution.[33]

In July 2021, investors in Novalpina Capital stripped Novalpina Capital of control over its assets (including NSO) after an unresolved personal dispute amongst the co-founders of Novalpina Capital.[34]Berkeley Research Group (BRG), a California-based consultancy firm, was subsequently handed control over the assets (including NSO).[35]

By the time of BRG's takeover, NSO Group was in perilous financial straits, having gone months without a new sale and in risk of missing its debt payments and its November 2021 payroll payments. NSO CEO Shalev Hulio suggested to BRG that the company should improve its financial standing by starting to sell its products to high-risk customers previously deemed unacceptable, responding to objections by joking that missing debt payments was risky too. BRG was categorically opposed to the suggestion[35] despite acknowledging that selling to high-risk customers was the only realistic way of maintaining NSO's business operations.[36] Hulio proposed increasing sales to Israel's western allies (including U.S. law enforcement, the most lucrative prospective market), but the November 2021 U.S. blacklisting of NSO subsequently ended the company's prospects of breaking into the U.S. market (Hulio then devised a plan to split up the company in order to circumvent the U.S. sanctions). According to theFinancial Times, NSO also seemed to have been abandoned by the previously doting Israeli government due to a proliferation of Israeli companies offering comparable technologies (including some established by former NSO employees).[35] In a court filing, BRG described NSO as "valueless" to its private equity backers;[37] in December 2021, a group of NSO creditors described NSO as insolvent in a letter to NSO's majority shareholders.[36]

Two of the ousted co-founders attempted to reclaim control over Novalpina Capital's assets by filing a lawsuit in Luxemburg, with a U.K. court allowing the case to proceed to trial in April 2022.[38] In an April 2022 letter, BRG told an EU committee investigating abuse of NSO's products that NSO's management has not been forthcoming in providing information about its business operations, including on the issue of the company's blacklisting in the U.S.[37]

In the months after the November 2021 blacklisting of NSO by the U.S. Department of Commerce that resulted in an U.S. export ban for the company, and amid a campaign by the Israeli government to find a way to prevent the floundering NSO from going under, the U.S. Commerce Department sent a list of questions to NSO about how its spyware products operate. In 2022,L3Harris Technologies, a U.S. military contractor with experience in the spyware technology sector, was conducting talks on the possibility of acquiring NSO.[23] L3Harris sought to acquire NSO's technology and code with the acquisition of the company's employees discussed as well.[24] L3Harris executives travelled to Israel to conduct the talks which were not disclosed to the public. L3Harris reportedly told their NSO counterparts that they had the blessing and backing of the U.S. government and U.S. intelligence in pursuing the acquisition as long as the Pegasus source code and the cache of zero-day vulnerabilities uncovered by NSO could be passed on to the other intelligence agencies of theFive Eyes. The Israeli authorities were reportedly willing to fulfill the latter and reluctant to comply with the former, and also insisted that Israel ultimately retain control over issuing export licences for NSO's products. The Israeli authorities were also opposed to allowing L3Harris' employees to join NSO's development team in NSO's Israeli headquarters. The talks were revealed to the public by the press in June 2022, resulting in a scramble by the parties involved, with White House officials publicly condemning the negotiation in harsh terms, and L3Harris (which is heavily reliant on government contracts) reportedly notifying the U.S. government that they had abandoned the acquisition attempt. There were reportedly attempts to revive the negotiations in the weeks after the preceding negotiations were revealed by the press. An acquisition by a U.S.-based corporation could have lifted the blacklisting of NSO by the U.S. which had barred NSO from receiving exports from U.S. companies, hindering NSO's operations.[23] Experts consulted byThe Guardian said that due to the blacklisting of NSO Group, a new corporate entity would likely have had to be created before the U.S. government would allow the acquisition. A senior White House official commented anonymously for the article that made the secret acquisition negotiations public, stating that the White House had not been in any way involved in the deal, further stating that the U.S. government "opposes efforts by foreign companies to circumvent US export control measures or sanctions [...]".[24]

In August 2022, Hulio stepped down from his post as CEO, with the company's COO Yaron Shohat temporarily assuming the role until a full-time replacement was to be named.[39] Hulio's resignation from his post as CEO came amid a restructuring of the company as it attempted to focus on pursuing clients among NATO member countries. The reorganisation also entailed a downsizing NSO's workforce, with 100 employees (out of a total of 750 employees) being let go.[40]

In March 2023, it was reported that Omri Lavie had emerged in control of the company after multiple legal fights between NSO and a US financial firm called Treo, which previously controlled the equity fund that held a majority stake in the Israeli firm.[41]

In October 2025, NSO Group confirmed that a group of US-based investors, led by film producerRobert Simonds, had acquired a controlling interest in the company.[42] It was also reported that as part of the deal, which was valued in the tens of millions of dollars, co-founder Omri Lavie would be ending his relationship with the company.[42]

Foreign offices and export controls

In late 2020,Vice Media published an article in which it reported that NSO Group had closed theCyprus-based offices of Circles, the company it had acquired in 2014. The article, based on interviews with two former employees, described the integration between the two companies as "awful" and stated that NSO would rely on Circles'Bulgarian office instead. According to Vice, this came just over a year after an activist group known asAccess Now wrote to authorities in both Cyprus and Bulgaria, asking them to further scrutinise NSO exports.[43] Access now had stated that they had received denials from both the Bulgarian and Cypriot authorities, with both countries stating that they had not provided export licenses to the NSO group.[44] Despite this, an article written byThe Guardian during the 2021 Pegasus scandal quoted NSO Group as saying that it had been "regulated by theexport control regimes of Israel, Cyprus and Bulgaria".[45] NSO's own "Transparency and Responsibility Report 2021", published about a month before the scandal, makes the same statement, adding that those were the three countries through which NSO exported its products.[46] Circles' Bulgarian office, in particular, was stated to have been founded as a "bogus phone company" in 2015 byCitizen Lab citingIntelligenceOnline, a part ofIndigo Publications.[47] This report was reprinted by the Bulgarian investigation publicationBivol in December 2020, which appended it with public registry documents which indicated that the company's Bulgarian office had grown to employ up to 150 people and had received two loans worth about 275 million American dollars in 2017 from twooffshore companies and aSwiss bank registered in theCayman Islands.[48]

History

NSO was founded in 2010 by Niv Karmi, Omri Lavie, and Shalev Hulio.[19][20][21] In 2012, the Federal government of Mexico announced the signing of a $20 million contract with NSO.[19] It was later revealed by aNew York Times investigation that NSO's product was used to target journalists and human rights activists in the country.[49]

NSO pitched its spyware to theDrug Enforcement Administration (DEA), which declined to purchase it due to its high cost.[50]

In 2015, the company soldsurveillance technology to the government of Panama. The contract later became the subject of a Panamanian anti-corruption investigation following its disclosure in a leak ofconfidential information from Italian firmHacking Team.[51]

In August 2016, NSO (through its U.S. subsidiary Westbridge) pitched its U.S. version of Pegasus to theSan Diego Police Department (SDPD) In the marketing material, Westbridge emphasized that the company is U.S. based and majority owned by a U.S. parent company. A SDPD Sergeant responded to the sales pitch with "sounds awesome". The SDPD declined to purchase the spyware as it was too expensive.[52]

Around 2016, NSO reportedly sold Pegasus software toGhana.[53]

In June 2018, an Israeli court indicted a former employee of NSO for allegedly stealing a copy of Pegasus and attempting to sell it online for $50 million worth ofcryptocurrency.[54]

In August 2018, the human rights groupAmnesty International accused NSO of helping Saudi Arabia spy on a member of the organization's staff.[55]

In April 2019, NSO froze its deals with Saudi Arabia over a scandal alleging NSO software's role in tracking murdered journalistJamal Khashoggi in the months before his death.[56]

In May 2019, messaging service WhatsApp alleged that aspyware injectionexploit targeting its calling feature was developed by NSO.[57][58] WhatsApp stated that the exploit targeted 1,400 users in 20 countries, including "at least 100 human-rights defenders, journalists and other members of civil society".[59][60][61] NSO denied involvement in selecting or targeting victims, but did not explicitly deny creating the exploit.[58] In response to the alleged cyberattack, WhatsApp sued NSO.[62]

In June 2019, NSO began setting up a test facility in New Jersey for the FBI which had procured NSO's services, and began testing a version of Pegasus developed for U.S. government agencies to be used on U.S. phones. After two years of deliberations in the FBI and Department of Justice, the FBI decided not to deploy the tools for domestic use in the summer of 2021, with the New Jersey facility laying dormant as of early 2022. The DEA, Secret Service, andUnited States Africa Command had also held discussions with NSO which however did not proceed beyond that stage.[8]

In April 2020,Motherboard reported about an incident that occurred several years prior in which an NSO employee used a client's Pegasus tool to spy on a love interest (a female personal acquaintance) during a work trip to the UAE. The employee broke into the client's office outside of office hours to use the tool, prompted an alert and an investigation by the client. The employee was detained by authorities, and fired by NSO, Motherboard's sources said. Sources also told Motherboard that NSO leadership held a meeting to prevent similar incidents in the future, and subsequently adopted more rigorous screening of employees that interact with clients.[63]

In July 2020, Motherboard reported that the US branch of NSO was pitching its brand of Pegasus to the US Secret Service during 2018.[64]

In November 2021, the United States added the NSO Group to itsEntity List, for acting "contrary to the foreign policy and national security interests of the US" and it effectively bans the sale of hardware and software to the company.[17] The listing deprived NSO of U.S. technology on which NSO relies, crippling its operations.[8][35] Israeli officials subsequently unsuccessfully attempted to get the blacklisting overturned,[23] and NSO reportedly tried and failed multiple times to meet with the U.S. Bureau of Industry and Security to attempt to obtain export waivers.[35]

In December 2021, 86 human rights organisations sent a joint letter calling on the EU to impose global sanctions against NSO Group and seek to "prohibit the sale, transfer, export and import of the Israeli company's surveillance technology" due to the risks NSO's technology poses for human rights globally.[65]

In January 2022,Calcalist published an investigatory piece detailing the widespread unlawful use of Pegasus by theIsraeli Police.[66] Although the Israeli Police formally denied this, some senior police officials have hinted that the claims were true.[67] On February 1, the police admitted that there was, in fact, misuse of the software.[68] On February 7, a secondCalcalist report revealed that the warrantless surveillance was very widespread, including that of politicians and government officials, heads of corporations, journalists, activists, and Avner Netanyahu, the son of then-Prime Minister,Benjamin Netanyahu.[69] After outcry and calls for a state commission of inquiry, including from the current police commissioner himself, theMinister of Public Security (the minister responsible for the police),Omer Bar-Lev, announced that he will be forming a commission of inquiry, to be chaired by a retired judge, and whose powers will basically be indistinguishable from a state commission.[70]

In September 2023, theCitizen Lab attributed with high confidence that an exploit ofiOS 16.6 was being used to install Pegasus spyware onApple devices without user interaction. Apple said that devices inLockdown Mode was able to block the loophole and issued an update to fix the vulnerability.[71]

Products and services

Pegasus

Main article:Pegasus (spyware)

NSO Groups offers the smartphone spyware tool Pegasus to government clients for the exclusive intended purpose of combating crime and terrorism.[63] The first version of Pegasus was finalised in 2011.[8] Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government.[9] TheIsraeli Ministry of Defense licenses the export of Pegasus to foreign governments, but not to private entities.[72]

Pegasus is compatible with iPhone and Android devices. It can be deployed remotely. Once deployed, it allows the client to access the target phone's data and sensors, including: location data, texts, emails, social media messages, files, camera, and microphone. The client-facing side of the tool is user friendly, and all that may be required (depending upon the case) of the client to begin deployment of Pegasus is to enter the target's phone number into the tool.[63]

Phantom

Phantom is a phone hacking product marketed by Westbridge, the United States branch of NSO Group. According to a former NSO employee, "Phantom" is the brand name for the Pegasus in the U.S., but the two tools are otherwise identical.[64] Israel required NSO Group to program Pegasus so as not to be able to target US phone numbers. NSO then launched Phantom for the U.S. market for use on U.S. targets, receiving permission from Israel to develop it as a specialty tool for exclusive use by U.S. governmental agencies.[8]

Circles

In 2014, the surveillance firm Circles was acquired by Francisco Partners, becoming a corporate affiliate of NSO Group. Circles' product is a phone geolocation tool.[30] The firm has two systems. One operates by connecting to the purchasing country's local telecommunications companies’ infrastructure. The other separate system, known as the “Circles Cloud”, is capable of interconnecting with telecommunications companies across the globe.[73][74]

In December 2020, theCitizen Lab reported thatSupreme Council on National Security (SCNS) of theUnited Arab Emirates was set to receive both these systems. In a lawsuit filed against the NSO group inIsrael, emails revealed links between Circles and several customers in the United Arab Emirates. Documents also revealed that Circles sent targets’ locations and phone records to the UAE SCNS. Aside from Israel and the UAE, the report named the governments ofAustralia,Belgium,Botswana,Chile,Denmark,Ecuador,El Salvador,Estonia,Equatorial Guinea,Guatemala,Honduras,Indonesia,Kenya,Malaysia,Mexico,Morocco,Nigeria,Peru,Serbia,Vietnam,Zambia, andZimbabwe as likely customers of Circles surveillance technology.[73][74]

In September 2021,Forensic News published shipping records showing that in 2020 Circles supplied equipment to Uzbekistan'sState Security Service (SGB).[75]

Criticism and controversies

See also:Pegasus (spyware)

Use of undercover private investigators to pursue critics

In October 2018,Associated Press reported that twoCitizen Lab researchers were being pursued by undercover operatives with false identities. The undercover agents had been inquiring about their work involving NSO Group, and also appeared to be trying to goad the researchers into making anti-Semitic or otherwise damaging remarks. After growing suspicious, one researcher contacted AP reporters. Together, they managed to arrange a sting during a meeting with a suspected undercover operative at a hotel luncheon with AP journalists secretly awaiting nearby; after the journalists approached the operative to question him, the operative fled, bumping into chairs and circling the room as he tried to get away. There also appeared to be two additional undercover operatives in the room. The operative that met the researcher appeared to be filming the researcher with a hidden camera during the meeting, and one of the operatives standing nearby appeared to be recording the meeting as well. The operative was later identified as a former Israeli security official. Responding to the AP report, NSO denied any involvement. It was later also uncovered that the identified undercover agent had previously worked on a case linked to the Israeli private intelligence agencyBlack Cube; NSO Group subsequently denied contracting Black Cube, and Black Cube denied involvement as well.[76]

In February 2019, Associated Press reported that at least four more individuals - three lawyers involved in lawsuits against NSO Group for alleged sales of NSO spyware to governments with poor human rights records, and one journalist who had been covering said litigation - were being pursued by undercover operatives for their work on NSO. Undercover agents again tried to goad the individuals into making racist or anti-Israel remarks. Two of the individuals were surreptitiously recorded by the undercover operatives. Channel 12, an Israeli television channel, obtained and aired the secret recordings made by the undercover operatives shortly before the AP published the revelations.[77] Channel 12 claimed the two individuals were attempting to smear NSO Group on behalf of Qatar.[78] Channel 12 also confirmed that Black Cube undercover investigators were involved.[78][77]

WhatsApp lawsuit

In May 2019, messaging service WhatsApp alleged that aspyware injectionexploit targeting its calling feature was developed by NSO.[57][58] Victims were exposed to the spywarepayload even if they did not answer the call.[79] WhatsApp told theFinancial Times that "the attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems."[80] NSO denied involvement in selecting or targeting victims, but did not explicitly deny creating the exploit.[58] In response to the alleged cyberattack, WhatsApp sued NSO under the Computer Fraud and Abuse Act and other US laws in aSan Francisco court on October 29.[62] WhatsApp stated that the exploit targeted 1,400 users in 20 countries, including "at least 100 human-rights defenders, journalists and other members of civil society".[59][60][61] WhatsApp alerted the 1,400 targeted users. In at least one case, the surveillance was authorized by a judge.[81]

NSO employees had complained to WhatsApp about improved security, according to the court filings by WhatsApp and its parent company Facebook:[82]

On or about May 13, 2019, Facebook publicly announced that it had investigated and identified a vulnerability involving the WhatsApp Service (CVE-2019-3568). WhatsApp and Facebook closed the vulnerability, contacted law enforcement, and advised users to update the WhatsApp app. Defendants subsequently complained that WhatsApp had closed the vulnerability. Specifically, NSO Employee 1 stated, "You just closed our biggest remote for cellular ... It's on the news all over the world."

In April 2020, NSO Group blamed its government clients for the hacking of 1,400 WhatsApp users, including journalists and human rights activists. However, the firm did not disclose the names of the clients which, as Citizen Lab stated, include authorities in Saudi Arabia, UAE, Bahrain, Kazakhstan, Morocco, and Mexico.[83] In court filings WhatsApp alleged that its investigation showed that the hacks originated from NSO Group servers rather than its clients'. WhatsApp said "NSO used a network of computers to monitor and update Pegasus after it was implanted on users' devices. These NSO-controlled computers served as the nerve centre through which NSO controlled its customers' operation and use of Pegasus." WhatsApp said that NSO gained "unauthorised access" to WhatsApp servers by reverse-engineering the WhatsApp app to be able to evade security features. NSO responded "NSO Group does not operate the Pegasus software for its clients".[84]

In July 2024,The Guardian reported that the Israeli government had seized documents from NSO's offices in July 2020 in an apparent effort to block the disclosure of information about Pegasus during the WhatsApp lawsuit.[85]

In December 2024, US District JudgePhyllis Hamilton found NSO liable for unlawfully exploiting a vulnerability in WhatsApp to install spyware on users' phones, and in May 2025 the jury in the case ruled that NSO owed Meta Platforms, the owner of WhatsApp, $168 million in damages;[86] Hamilton later reduced the amount owed to around $4 million.[87] In October 2025, a court in the United States mandated that the NSO Group cease the utilization of its spyware on WhatsApp, referencing direct and irreparable damage as the basis for this decision.[88][89]

Apple lawsuit

In November 2021, Apple Inc. filed a complaint against NSO Group and its parent companyQ Cyber Technologies in theUnited States District Court for the Northern District of California about theFORCEDENTRY exploit used to deploy the Pegasus spyware package, requesting injunctive relief, compensatory damages, punitive damages, and disgorgement of profits.[16][90] The "zero-click" exploit was discovered by the CanadianCitizen Lab after Saudi activistLoujain al-Hathloul's iPhone was hacked. Technical information uncovered by Bill Marczak's team at the lab allowed Apple to warn thousands of its users, including U.S. State Department employees in Uganda. Researchers also discovered that spyware fromQuaDream, another Israeli vendor, took advantage of the same vulnerability in iPhones.[91] Apple dropped the lawsuit in September 2024.[92][93]

See also

References

  1. ^"Israeli spyware company NSO Group CEO steps down". Reuters. August 21, 2022. RetrievedAugust 21, 2022.
  2. ^abFranceschi-Bicchierai, Lorenzo; Cox, Joseph (August 25, 2016)."Meet NSO Group, The New Big Player In The Government Spyware Business".VICE Magazine. RetrievedAugust 25, 2016.
  3. ^Timberg, Craig; Albergotti, Reed; Guéguen, Elodie (July 19, 2021)."Despite the hype, Apple security no match for NSO spyware – International investigation finds 23 Apple devices that were successfully hacked".The Washington Post. RetrievedJuly 19, 2021.
  4. ^abcOneill, Patrick Howard (June 12, 2017)."Israeli hacking company NSO Group is on sale for more than $1 billion". Cyberscoop. RetrievedJune 18, 2017.
  5. ^Lee, Dave (August 26, 2016)."Who are the hackers who cracked the iPhone?".BBC News. RetrievedAugust 26, 2016.
  6. ^abFox-Brewster, Thomas (August 25, 2016)."Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text".Forbes. RetrievedAugust 25, 2016.
  7. ^abcSchaffer, Aaron (January 10, 2020)."Israeli spyware company accused of hacking activists hires lobby firm".Al-Monitor. RetrievedJuly 20, 2021.
  8. ^abcdefghijBergman, Ronen; Mazzetti, Mark (January 28, 2021)."The Battle for the World's Most Powerful Cyberweapon".The New York Times.ISSN 0362-4331.Archived from the original on January 31, 2022. RetrievedJanuary 31, 2021.
  9. ^abcPriest, Dana (June 6, 2021)."Spyware technology found on phone of Moroccan journalist, report says".Washington Post. RetrievedJuly 20, 2021.
  10. ^"Activists and journalists in Mexico complain of government spying".Reuters. June 20, 2017. RetrievedJune 20, 2017.
  11. ^Franceschi-Bicchierai, Lorenzo (August 25, 2016)."Government Hackers Caught Using Unprecedented iPhone Spy Tool".VICE Magazine. RetrievedAugust 25, 2016.
  12. ^"Who is spying on Indians? WhatsApp, Pegasus spyware maker, the government are caught in a blame game". Reuters. December 13, 2019. RetrievedJanuary 3, 2020.
  13. ^"Israeli spyware allegedly used to target Pakistani officials' phones". Reuters. December 19, 2019. RetrievedJanuary 3, 2020.
  14. ^Ganon, Tomer (January 18, 2022)."Israel police uses NSO's Pegasus to spy on citizens".CTech. RetrievedFebruary 1, 2022.
  15. ^Falconer, Rebecca (March 24, 2019)."Israeli firm won't say if it sold Saudis spyware linked to Khashoggi killing".Axios. RetrievedNovember 9, 2019.
  16. ^abKirchgaessner, Stephanie (November 23, 2021)."Apple sues Israeli spyware firm NSO Group for surveillance of users".The Guardian. RetrievedNovember 23, 2021.
  17. ^ab"US Blacklists Israeli Spyware Company NSO Group".Daily News Brief. November 3, 2021. RetrievedNovember 3, 2021.
  18. ^Patrick Howell O'Neill (August 19, 2020)."The man who built a spyware empire says it's time to come out of the shadows".MIT Technology Review. RetrievedJuly 20, 2021.
  19. ^abcdefHirschauge, Orr; Orpaz, Inbal (February 17, 2014)."U.S. Fund to Buy NSO and Its Smartphone-snooping Software". RetrievedAugust 26, 2016.
  20. ^abCoppola, Gabrielle (September 29, 2014)."Israeli Entrepreneurs Play Both Sides of the Cyber Wars".Bloomberg News. RetrievedAugust 25, 2016.
  21. ^abNicole Perlroth (February 11, 2017)."Spyware's Odd Targets: Backers of Mexico's Soda Tax".The New York Times. RetrievedFebruary 13, 2017.
  22. ^abcBergman, Ronen; Mazzetti, Mark (March 23, 2022)."Israel, Fearing Russian Reaction, Blocked Spyware for Ukraine and Estonia".The New York Times.ISSN 0362-4331. RetrievedApril 13, 2022.
  23. ^abcdMazzetti, Mark; Bergman, Ronen (July 10, 2022)."Defense Firm Said U.S. Spies Backed Its Bid for Pegasus Spyware Maker".The New York Times.ISSN 0362-4331. RetrievedJuly 10, 2022.
  24. ^abc"US defence contractor in talks to take over NSO Group's hacking technology".the Guardian. June 14, 2022. RetrievedJuly 11, 2022.
  25. ^"Key Democrat warns of major security risk if US firm acquires NSO hacking code".the Guardian. June 16, 2022. RetrievedJuly 11, 2022.
  26. ^abRichard, Laurent (2023).Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy. Sandrine Rigaud (First ed.). New York, New York.ISBN 978-1-250-85869-6.OCLC 1351934685.{{cite book}}: CS1 maint: location missing publisher (link)
  27. ^Fischer, Yisrael; Levi, Ruti (August 29, 2016)."The Israelis Behind History's 'Most Sophisticated Tracker Program' That Wormed Into Apple". RetrievedSeptember 1, 2016.
  28. ^abcStone, Mike; Roumeliotis, Greg (November 2, 2015)."Secretive cyber warfare firm NSO Group explores sale: sources".Reuters. RetrievedAugust 26, 2016.
  29. ^Yadron, Danny (August 1, 2014)."Can This Israeli Startup Hack Your Phone?".The Wall Street Journal. Archived fromthe original on August 7, 2019. RetrievedAugust 25, 2016.
  30. ^ab"This Surveillance Tool Can Find You With Just Your Telephone Number — Did These 25 Countries Buy It?".Forbes. RetrievedDecember 1, 2020.
  31. ^Ziv, Amitai (February 14, 2019)."Israeli Cyberattack Firm NSO Bought Back by Founders at $1b Company Value".Haaretz. RetrievedJuly 20, 2019.
  32. ^Yablonko, Yasmin (February 14, 2019)."Novalpina Capital and founders buy NSO at $1b co value".Globes. RetrievedJune 6, 2019.
  33. ^"Novalpina Capital buys spyware co. NSO Group & commits to helping it become more transparent | Business & Human Rights Resource Centre".business-humanrights.org. RetrievedJune 6, 2019.
  34. ^"Berkeley Research Group lined up to take control of private equity owner of NSO".Financial Times. July 31, 2021. RetrievedJuly 11, 2022.
  35. ^abcde"NSO's cash dilemma: miss debt repayment or sell to risky customers".Financial Times. June 1, 2022. RetrievedJuly 11, 2022.
  36. ^ab"EY valued NSO Group at $2.3bn months before emergency bailout".Financial Times. June 27, 2022. RetrievedJuly 11, 2022.
  37. ^ab"NSO Group keeping owners 'in the dark', manager says".Financial Times. May 9, 2022. RetrievedJuly 11, 2022.
  38. ^"NSO Group's private equity manager risks being ousted in court battle".Financial Times. April 11, 2022. RetrievedJuly 11, 2022.
  39. ^"Israeli spyware company NSO Group CEO steps down".Reuters. August 21, 2022. RetrievedSeptember 9, 2022.
  40. ^"Spyware Firm NSO's Chief Steps Down in Reorganization".Bloomberg.com. August 21, 2022. RetrievedSeptember 9, 2022.
  41. ^Kirchgaessner, Stephanie (March 1, 2023)."NSO Group co-founder emerges as new majority owner".The Guardian.
  42. ^abFranceschi-Bicchierai, Lorenzo (October 10, 2025)."Spyware maker NSO Group confirms acquisition by US investors".TechCrunch.Archived from the original on October 11, 2025. RetrievedOctober 12, 2025.
  43. ^"NSO Group Closes Cyprus Office of Spy Firm".Vice.com. August 21, 2020. RetrievedJuly 19, 2021.
  44. ^Krahulcova, Lucie (September 12, 2019)."Is NSO Group's infamous Pegasus spyware being traded through the EU?".Access Now. RetrievedJuly 19, 2021.
  45. ^"Edward Snowden calls for spyware trade ban amid Pegasus revelations".The Guardian. July 19, 2021. RetrievedJuly 19, 2021.
  46. ^"Transparency and Responsibility Report 2021"(PDF).NSO Group. June 30, 2021.
  47. ^Marczak, Bill; Scott-Railton, John; Rao, Siddharth Prakash; Anstis, Siena; Deibert, Ron (December 1, 2020)."Running in Circles: Uncovering the Clients of Cyberespionage Firm Circles".The Citizen Lab. RetrievedJuly 19, 2021.
  48. ^Биволъ, Екип (December 12, 2020)."Citizen Lab: Кръгов маратон с държавни клиенти на фирма за кибершпионаж" [Citizen Lab: A round-robin marathon with government clients of a cyberespionage firm].Bivol.bg (in Bulgarian). RetrievedJuly 19, 2021.
  49. ^Ahmed, Azam; Perlroth, Nicole (June 19, 2017)."Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families (Published 2017)".The New York Times.ISSN 0362-4331. RetrievedOctober 28, 2020.
  50. ^"The DEA Didn't Buy Malware From Israel's Controversial NSO Group Because It Was Too Expensive".Vice.com. September 11, 2019. RetrievedFebruary 1, 2022.
  51. ^Rodriguez, Rolando B.; Diaz, Juan Manuel (August 7, 2015)."Abren sumario en caso Hacking Team".La Prensa (Panama City). RetrievedAugust 25, 2016.
  52. ^"NSO Group Pitched Phone Hacking Tech to American Police".Vice.com. May 12, 2020. RetrievedFebruary 1, 2022.
  53. ^"Raising Concerns Over Press Freedom, Israel's NSO Reportedly Sold Ghana Surveillance Tech".Haaretz.
  54. ^Steinberg, Joseph (July 9, 2018)."Rogue CyberSecurity Company Employee Tried To Sell Powerful, Stolen iPhone Malware For $50-Million". RetrievedJuly 10, 2018.
  55. ^"Amnesty International Among Targets of NSO-powered Campaign".Amnesty International. August 2018. RetrievedAugust 1, 2018.
  56. ^"Israeli spy tech firm linked to Khashoggi murder said to freeze Saudi deals".The Times of Israel. RetrievedJuly 20, 2019.
  57. ^ab"WhatsApp voice calls used to inject Israeli spyware on phones".Financial Times. May 13, 2019. RetrievedJune 6, 2019.
  58. ^abcdNewman, Lily Hay (May 14, 2019)."How Hackers Broke WhatsApp With Just a Phone Call".Wired.ISSN 1059-1028. RetrievedJune 6, 2019.
  59. ^abSatter, Raphael; Culliford, Elizabeth (October 30, 2019)."WhatsApp sues Israel's NSO for allegedly helping spies hack phones around the world".Reuters. RetrievedOctober 30, 2019.
  60. ^abBajak, Frank (October 29, 2019)."Facebook sues Israeli company over WhatsApp spyware".Associated Press. RetrievedOctober 30, 2019.
  61. ^abCathcart, Will."Why WhatsApp is pushing back on NSO Group hacking".The Washington Post. RetrievedOctober 30, 2019.
  62. ^ab"WhatsApp sues Israeli firm NSO over cyberespionage".Agence France-Presse. January 16, 2012. Archived fromthe original on October 30, 2019. RetrievedOctober 30, 2019.
  63. ^abcCox, Joseph (April 28, 2020)."NSO Employee Abused Phone Hacking Tech to Target a Love Interest".Vice. RetrievedJanuary 30, 2022.
  64. ^abCox, Joseph (July 23, 2020)."NSO Group Pitched Its Spyware to the Secret Service".Vice. RetrievedJanuary 30, 2022.
  65. ^"Rights groups urge EU to ban NSO over clients' use of Pegasus spyware".The Guardian. December 3, 2021. RetrievedJanuary 30, 2022.
  66. ^"חברת NSO בשירות משטרת ישראל: פריצות לטלפון של אזרחים ללא פיקוח או בקרה | כלכליסט" [NSO working with Israeli police: hacking into people's phones without any oversight or control].Calcalist (in Hebrew). January 18, 2022. RetrievedOctober 21, 2025.
  67. ^"מה באמת אומרת משטרת ישראל כשהיא מכחישה את תחקיר כלכליסט | כלכליסט" [What does the Israeli police really mean when it denies the Calcalist investigation?].Calcalist (in Hebrew). January 20, 2022. RetrievedOctober 21, 2025.
  68. ^תורג'מן, מאיר; צימוקי, טובה (February 1, 2022)."הזיגזג של המשטרה בפרשת NSO: "התגלו ממצאים שמשנים את מצב הדברים"" [Police zigzag in NSO affair: "Findings have been discovered that change the situation"].Ynet (in Hebrew). RetrievedOctober 21, 2025.
  69. ^"Ministry heads, Netanyahu associates, activists said targeted by police with spyware."The Times of Israel, February 7, 2022.
  70. ^"Police minister establishes commission to probe explosive NSO spying claims."The Times of Israel, February 7, 2022.
  71. ^Bing, Christopher; Siddiqui, Zeba (September 8, 2023)."New flaw in Apple devices led to spyware infection, researchers say".Reuters.
  72. ^"יש לנו מאזין על הקו" [We have a listener on the line.].Calcalist (in Hebrew). October 18, 2012. RetrievedJanuary 3, 2020.
  73. ^abMarczak, Bill; Scott-Railton, John; Rao, Siddharth Prakash; Anstis, Siena; Deibert, Ron (December 2020)."Running in Circles: Uncovering the Clients of Cyberespionage Firm Circles".The Citizen Lab. RetrievedDecember 1, 2020.
  74. ^abKirkpatrick, David D.; Ahmed, Azam (August 31, 2018)."Hacking a Prince, an Emir and a Journalist to Impress a Client".The New York Times. RetrievedAugust 31, 2020.
  75. ^Stedman, Scott (September 3, 2021)."NSO Group Affiliate Circles Sold Equipment to Uzbekistan 'Secret Police'".Forensic News. RetrievedSeptember 4, 2021.
  76. ^Bergman, Ronen; Shane, Scott (January 28, 2019)."The Case of the Bumbling Spy: A Watchdog Group Gets Him on Camera".The New York Times.ISSN 0362-4331. RetrievedFebruary 1, 2022.
  77. ^abSatter, Raphael (April 20, 2021)."AP Exclusive: Undercover spy exposed in NYC was 1 of many".AP News. RetrievedFebruary 1, 2022.
  78. ^ab"N12 - כך קטר הכפישה חברת סייבר ישראלית" [This is how Qatar defamed an Israeli cyber company].Mako (website) (in Hebrew). February 9, 2019. RetrievedFebruary 1, 2022.
  79. ^Newman, Lily Hay."How Hackers Broke WhatsApp With Just a Phone Call".Wired.ISSN 1059-1028. RetrievedOctober 30, 2019.
  80. ^Doffman, Zak."WhatsApp Has Exposed Phones To Israeli Spyware -- Update Your Apps Now".Forbes. RetrievedJune 6, 2019.
  81. ^"Police Tracked a Terror Suspect—Until His Phone Went Dark After a Facebook Warning".Wall Street Journal. January 2, 2020. RetrievedJanuary 3, 2020.
  82. ^Leblanc, Travis; Mornin, Joseph; Grooms, Daniel (October 29, 2019)."Facebook Inc. v. NSO Group Technologies Limited (3:19-cv-07123)"(PDF). RetrievedOctober 29, 2019.
  83. ^Stephanie Kirchgaessner (April 7, 2020)."NSO Group points finger at state clients in WhatsApp spying case".The Guardian.
  84. ^Stephanie Kirchgaessner (April 29, 2020)."WhatsApp: Israeli firm 'deeply involved' in hacking our users".The Guardian.
  85. ^Davies, Harry; Kirchgaessner, Stephanie (July 25, 2024)."Israel tried to frustrate US lawsuit over Pegasus spyware, leak suggests".The Guardian.ISSN 0261-3077.Archived from the original on May 9, 2025. RetrievedMay 12, 2025.
  86. ^"Meta wins $168 million verdict against spyware company NSO".NBC News. May 6, 2025.Archived from the original on May 7, 2025. RetrievedMay 12, 2025.
  87. ^Ha, Anthony (October 18, 2025)."Spyware maker NSO Group blocked from WhatsApp".TechCrunch.Archived from the original on October 20, 2025. RetrievedOctober 23, 2025.
  88. ^"US court bars Israeli spyware firm from targeting WhatsApp users".Al Jazeera. October 18, 2025.Archived from the original on October 23, 2025. RetrievedOctober 18, 2025.
  89. ^Goodin, Dan (October 20, 2025)."NSO permanently barred from targeting WhatsApp users with Pegasus spyware".Ars Technica.Archived from the original on October 21, 2025. RetrievedOctober 21, 2025.
  90. ^"Apple sues Israeli spyware firm NSO Group".BBC. November 23, 2021. RetrievedOctober 21, 2025.
  91. ^Schectman, Joel; Bing, Christopher (February 17, 2022)."How a Saudi woman's iPhone revealed hacking around the world".Reuters.
  92. ^Poireault, Kevin (September 16, 2024)."Apple to Drop Spyware Lawsuit Over Security Concerns".Infosecurity Magazine. RetrievedOctober 21, 2025.
  93. ^Starks, Tim (September 30, 2024)."NSO Group indicates rare agreement with Apple over dismissal of lawsuit".CyberScoop. RetrievedOctober 21, 2025.

External links

Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=NSO_Group&oldid=1318297903"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp