![]() ![]() WhatsApp engineers also identified the issue and worked extensively to fix the bug. However, what they uncovered was a digital footprint similar to that which is known to have belonged to NSO technology in the past. Researchers at Citizen Lab, a research group at the University of Toronto, conducted extensive forensic examinations of the handset and found no trace of embedded malware. The lawyer is believed to have been engaged in a lawsuit against NSO and became suspicious when receiving random WhatsApp calls from Sweden. In the past it is believed to have been used to target a UK-based lawyer, a Saudi dissident, a citizen of Qatar and Mexican journalists and activists. However, it has repeatedly been found deployed to hack journalists, lawyers, human rights defenders and dissidents. The military-grade software produced by NSO is only available to nations that have purchased the sophisticated and extremely powerful Pegasus technology. However, there are fears the now exposed vulnerability could be manipulated by less sophisticated hackers and may be used to target regular people. It is highly unlikely that anyone other than high-profile targets or individuals of interest to NSO will have been hacked by Pegasus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |