WhatsApp discovered a disturbing security breach early this month when they found that dozens of users had been hacked. The Facebook subsidiary found that the hack occurred when one or two missed calls were received from an unfamiliar number, enabling the malicious code was shipped onto their phone via that missed call, without any user intervention.

“We are deeply concerned about the abuse of such capabilities,” WhatsApp said in a statement.

The unnamed spokesperson said that a number of people, perhaps dozens, were infected with the malware which the company discovered in early May.

A researcher at University of Toronto’s Citizen Lab – an internet watchdog – called the hack ‘a very scary vulnerability’. He said, “there’s nothing a user could have done, short of not having the app.” WhatsApp is one of the most widely used apps in the world with over 1.5 billion users.

Citizen Lab added that they think the attack was linked to a vulnerability that WhatsApp was already trying to patch. This tracks with the comment from the WhatsApp spokesperson who said that engineers discovered the hack of the in-app voice calls when they were making additional security enhancements to that same feature.

Upon discovering the breach, a team of engineers in San Francisco and London worked round the clock to fix issue. WhatsApp began rolling out a fix on Friday, 10 May and the updated version of WhatsApp was issued on Monday. They also immediately contacted Citizen Lab and human rights groups as well as the relevant US authorities to inform them of the hack.

The Financial Times identified Israel’s NSO Group as the ‘actor’ responsible for the creation of the spyware behind the hack. The NSO Group is a technology firm focused on cyber intelligence.

In a statement, a WhatsApp spokesperson said, “we’re certainly not refuting any of the coverage you’ve seen”, referring to the news about the leak which has been widely reported by international press.

The spokesperson added “This attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems. We have briefed a number of human rights organisations to share the information we can, and to work with them to notify civil society.”

The company said it has disclosed the issue to the US Department of Justice last week and have provided information to assist US authorities in their investigations.

The reach of Israeli cyber intelligence firm

NSO in a statement did not deny that it was the creator of the spyware that was used in the WhatsApp hack.

“NSO’s technology is licensed to authorized government agencies for the sole purpose of fighting crime and terror. The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions,” the statement said.

“We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system. Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies. NSO would not or could not use its technology in its own right to target any person or organization, including this individual,” it added.

The hack has brought to life concerns and questions over the NSO’s spyware technology which can be used to hijack smartphones and control their cameras, turning them into pocket-sized surveillance devices without the users even knowing.

According to an article by the Times of Israel, NSO’s spyware has been used to hack journalists, lawyers, human rights defenders and dissidents. The spyware, called Pegasus, has also been implicated in the tragic killing of Saudi journalist Jamal Khashoggi who was killed in the Saudi consulate in Israel last year and whose body is yet to be found.

Several alleged targets of this spyware including close friends of Khashoggi and several Mexican civil society figures are currently suing the company in Israeli Court over the hacking.

Another target of that same NSO spyware last year was an Amnesty International staffer. As such, the non-profit said it is joining a legal bid to force Israel’s Defence Ministry to suspend NSO’s export licence.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

Public should not jump into conclusion on corruption investigation of PAP town council GM like what some speculators did

Workers’ Party has issued a statement, calling for the public not to…

总理说续与工友们同一阵线? 且来看看本地打工族们处境

昨日,新加坡总理李显龙出席职总四年一度的全国代表大会。他在会上致词时称,人民行动党政府重申对工友们的承诺,将一直与工友站在一起,保障他们的福祉。 他说,半世纪前,先贤承诺在经济和社会发展上照顾新加坡工友,而几个世代的行动党和职总领袖都合力达成这个目的。且会竭尽所能确保工友和他们的后代们的福祉,与新加坡同进步。 他呼吁,执政党与职总必须帮助员工妥善应付转型,训练他们胜任新岗位,协助他们应付行业的日新月异,确保他们能继续就业。 此外,他指出在许多国家因为员工觉得生活没改善,经济增长但工友被抛在后头;精英和社会脱节只顾自身利益看不起平民,导致社会契约瓦解。愤怒群众想破坏对他们没用的体制。 对于香港现今的处境,他认为全球化的新加坡面向世界不可能完全免疫于这类潜在的分裂力量。如果发生在我国,后果不堪设想,对新加坡的信任将毁于一旦。 而我国如何避免这种结果?其中一个关键基础是行动党和职总之间的紧密关系,而许多行动党议员,也是来自职总。再者,行动党致力促进工友的福祉和未来,包括房屋、医疗保健、教育、交通等等。 李显龙认为,在当前充满不确定性的世界局势,加之新兴业务的侵扰,总理认为要“牵着工友们的手,让他们有信心,一起度过难关。” 承诺之后的现实 尽管总理承诺将继续捍卫工友们的福祉,不过我们且来看看,当前本地打工族们的处境? 且不论生活成本高昂、房价等因素,先看看人力部公布的第二季度劳动市场报告。尽管今年上半年就业人数持续增加,但今年上半年共有5550人被裁退,同去年同期(共5350人)不相上下。 值得一提的是,PMET(是专业人士、经理、执行员与技师)在第二季度被裁退职业类别中,仍是占比最高的,达到77巴仙。 而根据今年4月人力部长杨莉明在国会答复,在2018年,有5400位本地PMET被裁员。…

疫情影响不能群聚 支持者把群众大会“搬上”虚拟游戏平台!

选举蛩音将近,各党也如火如荼在作准备。不过昨日选举局宣布,若选举在解封第二阶段期间召开,将无法进行大型现场集会,包括群众大会等。各政党要如何接触群众呢? 大家如今是各出奇招,有些走传统路线,解封后到各路拜访;也有者当起行走广告,在T恤上印上扫码,不用接触也能做宣传!不过,也有支持者开有趣玩笑,“建议”把群众大会搬到虚拟游戏平台“动物森友会”(Animal Crossing)! 游戏玩家Ng Yi Shu,在“动物森友会”中帮忙“布置”场地,看似要在动物森友会中办虚拟“集会”,其实只是支持者将动物森友会的截图进行图像处理,满足支持者前往现场集会,期待感受满满热情的现场。 工人党官方专页随后也打趣转发帖文,写道,“既然不能办现场集会,那不如在动物森友会里见面?” 而其他的组图也显示,支持者也顺便帮行动党布置了宣传柜台。“集会”现场还可看到演讲台、周边T恤、雨伞、杯子等等,即逗趣又有模有样。 其实小编想说,如果集会真的在动物森友会里办,也应该是很有创意的。