- Everything we know so far about Peacock, NBC’s new streaming service Tuesday 7:42 PM
- Selena Gomez producing docuseries about immigration for Netflix Tuesday 7:11 PM
- How to stream Manchester City vs. Shakhtar Donetsk in Champions League action Tuesday 6:14 PM
- Milo Yiannopoulos threatens to crash furry convention he is barred from Tuesday 5:54 PM
- How to stream Juventus vs. Atletico Madrid in Champions League action Tuesday 5:52 PM
- How to stream Real Madrid vs. PSG in Champions League action Tuesday 5:24 PM
- No-fly zone implemented over Area 51 ahead of Alienstock festival Tuesday 5:16 PM
- TikTok accused of censoring content about Hong Kong protests Tuesday 5:04 PM
- Smoke ’em, pass ’em, Week 3: At the Bakery Tuesday 4:38 PM
- Alex Trebek says he will be undergoing chemotherapy again Tuesday 4:27 PM
- Dan Crenshaw roasted after attacking Sanders’ call for veteran care Tuesday 4:19 PM
- How to stream NXT for its USA network debut Tuesday 4:12 PM
- This website will show you how AI classifies you Tuesday 3:22 PM
- School tells Black 4-year-old to cut his hair or wear a dress Tuesday 3:17 PM
- Lizzo called a ‘snitch’ for accusing Postmates runner of stealing food Tuesday 2:30 PM
A severe vulnerability in the popular messaging platform WhatsApp allowed hackers to remotely compromise phones just by calling them.
The issue, first reported by the Financial Times, allowed hackers to take over both iPhone and Android devices and install powerful malware even if the target did not answer the call.
Once installed, the malware could do everything from collect private messages to activate the phone’s microphone and camera.
WhatsApp, which boasts more than 1.5 billion users, says it discovered the vulnerability earlier this month while improving the app’s security.
According to the Financial Times, NSO Group, an Israeli spyware company known to work with governments, is responsible for the malware. The company’s exploits have repeatedly been linked to the hacks of journalists, human rights workers, dissident, and lawyers.
While WhatsApp did not name the NSO Group specifically, it did not deny the Financial Times’ reporting. Speaking with Ars Technica, a WhatsApp representative stated that “an advanced cyber actor” was behind the incident.
“The attack has all the hallmarks of a private company reportedly that works with governments to deliver spyware that takes over the functions of mobile phone operating systems,” WhatsApp said.
John Scott-Railton, a senior researcher with surveillance watchdog group Citizen Lab, says one of those targeted by the WhatsApp attack was a human rights lawyer based in the U.K. Scott-Railton also stated that the lawyer was representing, among other clients, a Saudi dissident in Canada currently suing NSO Group.
Perhaps most famously, NSO Group malware was used against journalist and Saudi government critic Jamal Khashoggi, who was killed and dismembered shortly after being lured into the Saudi Consulate in Istanbul last year.
Following news of the WhatsApp issue, Amnesty International, which had its employees targeted with NSO Group spyware last year, announced Monday that it would join a lawsuit against the Israeli company. The aim of the lawsuit is to have the Israeli government revoke NSO Group’s export license for selling its spyware to hostile regimes.
- Man accidentally swallows AirPod—and hears it working in his stomach
- Report: Apple limiting apps that help users control their screen time
- Teen hits Apple with $1 billion lawsuit over alleged face recognition arrest
H/T Financial Times
Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.