Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,170
- Points
- 113
The Israeli government has taken extraordinary measures to derail a major U.S. lawsuit that threatened to expose closely guarded secrets about one of the world's most notorious hacking tools, according to leaked files.
Data leak from the Israeli Ministry of Justice
A leak from the Israeli Ministry of Justice indicates that the Israeli government seized documents and computers from the NSO Group to prevent the transfer of potentially incriminating materials as part of a lawsuit in the United States. This was reported by The Guardian at the end of July 2024.
According to The Guardian, the stakes are prohibitively high, as a court case could reveal extremely sensitive information related to the spy software called Pegasus, one of the most famous hacking tools in the world.
Pegasus is a hacking program, or spyware, that is developed and sold under license to governments around the world by the Israeli company NSO Group. The software can infect millions of phones running iOS or Android operating systems. Pegasus can bypass your phone's security and install spyware that gives you full access to your mobile device. The software can also access every message that the user has ever sent or received on the device. The software can access every photo, video, and email, and the software can also turn on the microphone or camera on the user's device, even when they are not using a smartphone. Pegasus can also gain access to the American Global Positioning System (GPS), and then track the location of the victim user.
In 2019, WhatsApp proved that Pegasus used the WhatsApp messenger to send its malicious code to more than 1.4 thousand devices, using a zero-day vulnerability BY devices. WhatsApp is owned by Meta. According to the messenger developers, who conducted an internal investigation, it was enough to make one WhatsApp call to the victim's smartphone, and the malware was installed on the victim's phone. At the same time, the victim did not even need to answer this call, a missed call was enough, and it is also not necessary to use this particular messenger for this purpose. Pegasus also has a self-destruct function to destroy all evidence of the presence of spyware on the device. The program completely cleans all traces of its presence, leaving almost no chance of detection, which is why it was not detected for a long time.It was necessary to provide specific evidence of interference in the operation of devices in court.
Israeli authorities have confiscated documents related to the Pegasus spyware from the developer company NSO Group. This is done so that the NSO does not comply with the requirements of the US court on WhatsApp's request to provide information about the technology used. The US government has blacklisted an Israeli company in 2021 for selling hacking tools to repressive regimes.
NSO Group's clients include both authoritarian regimes and democratic countries such as the United States, Norway, Sweden, Denmark, Australia, the Netherlands, Canada, Germany, South Korea, and Japan. It is alleged that the use of Israeli technology violated and violates human rights around the world. Developer company NSO Group has also sold its spy software to Saudi Arabia, the United Arab Emirates( UAE), Hungary to India, and many other countries.
The seizure of files and computers based on an Israeli court's non-disclosure order from NSO Group offices in July 2020, which has only just become known, confirms the close relationship between the Israeli authorities and the private company NSO Group, as well as their common interests in monitoring and controlling mobile and other devices.
According to The Guardian, the actions of the Israeli authorities significantly affected the course of the case. Representatives of NSO Group claim that the company's participation in the trial is limited by legal restrictions in Israel.
Pegasus Spyware Program
Pegasus is the most advanced spyware program ever developed. This is actually the most invasive form of surveillance imaginable. Mobile device users hope that any personal data or aspects of their lives can be kept secret on their personal device. Using end-to-end encryption in WhatsApp or the user uses an encrypted communication channel is simply meaningless if Pegasus is located on the device of the intended victim.
This spyware uses various methods to hack the device, such as sending links and then opening the link on the victim's device, or using pre-prepared wireless networks and then connecting the device to this network. Pegasus can also infect both iOS and Android while remaining virtually invisible, or in another way that Pegasus attacks user phones, this is the so-called zero-day vulnerability (0-day).
The earliest fully operational version of Pegasus discovered, which was discovered in 2016, infected phones with targeted phishing – text messages or emails that tricked the victim into clicking a malicious link. Since 2018, cyber attacks using 0-day vulnerabilities have already begun.
Data leak from the Israeli Ministry of Justice
A leak from the Israeli Ministry of Justice indicates that the Israeli government seized documents and computers from the NSO Group to prevent the transfer of potentially incriminating materials as part of a lawsuit in the United States. This was reported by The Guardian at the end of July 2024.
According to The Guardian, the stakes are prohibitively high, as a court case could reveal extremely sensitive information related to the spy software called Pegasus, one of the most famous hacking tools in the world.
Pegasus is a hacking program, or spyware, that is developed and sold under license to governments around the world by the Israeli company NSO Group. The software can infect millions of phones running iOS or Android operating systems. Pegasus can bypass your phone's security and install spyware that gives you full access to your mobile device. The software can also access every message that the user has ever sent or received on the device. The software can access every photo, video, and email, and the software can also turn on the microphone or camera on the user's device, even when they are not using a smartphone. Pegasus can also gain access to the American Global Positioning System (GPS), and then track the location of the victim user.
In 2019, WhatsApp proved that Pegasus used the WhatsApp messenger to send its malicious code to more than 1.4 thousand devices, using a zero-day vulnerability BY devices. WhatsApp is owned by Meta. According to the messenger developers, who conducted an internal investigation, it was enough to make one WhatsApp call to the victim's smartphone, and the malware was installed on the victim's phone. At the same time, the victim did not even need to answer this call, a missed call was enough, and it is also not necessary to use this particular messenger for this purpose. Pegasus also has a self-destruct function to destroy all evidence of the presence of spyware on the device. The program completely cleans all traces of its presence, leaving almost no chance of detection, which is why it was not detected for a long time.It was necessary to provide specific evidence of interference in the operation of devices in court.
Israeli authorities have confiscated documents related to the Pegasus spyware from the developer company NSO Group. This is done so that the NSO does not comply with the requirements of the US court on WhatsApp's request to provide information about the technology used. The US government has blacklisted an Israeli company in 2021 for selling hacking tools to repressive regimes.
NSO Group's clients include both authoritarian regimes and democratic countries such as the United States, Norway, Sweden, Denmark, Australia, the Netherlands, Canada, Germany, South Korea, and Japan. It is alleged that the use of Israeli technology violated and violates human rights around the world. Developer company NSO Group has also sold its spy software to Saudi Arabia, the United Arab Emirates( UAE), Hungary to India, and many other countries.
The seizure of files and computers based on an Israeli court's non-disclosure order from NSO Group offices in July 2020, which has only just become known, confirms the close relationship between the Israeli authorities and the private company NSO Group, as well as their common interests in monitoring and controlling mobile and other devices.
According to The Guardian, the actions of the Israeli authorities significantly affected the course of the case. Representatives of NSO Group claim that the company's participation in the trial is limited by legal restrictions in Israel.
Pegasus Spyware Program
Pegasus is the most advanced spyware program ever developed. This is actually the most invasive form of surveillance imaginable. Mobile device users hope that any personal data or aspects of their lives can be kept secret on their personal device. Using end-to-end encryption in WhatsApp or the user uses an encrypted communication channel is simply meaningless if Pegasus is located on the device of the intended victim.
This spyware uses various methods to hack the device, such as sending links and then opening the link on the victim's device, or using pre-prepared wireless networks and then connecting the device to this network. Pegasus can also infect both iOS and Android while remaining virtually invisible, or in another way that Pegasus attacks user phones, this is the so-called zero-day vulnerability (0-day).
The earliest fully operational version of Pegasus discovered, which was discovered in 2016, infected phones with targeted phishing – text messages or emails that tricked the victim into clicking a malicious link. Since 2018, cyber attacks using 0-day vulnerabilities have already begun.