Close Menu
Newstech24.com
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

Disney licenses 200 characters to OpenAI for Sora video generation program

11/12/2025

Jason Collins: I have Stage 4 glioblastoma

11/12/2025

A pair of Nintendo Switch 2 Joy-Con 2 controllers are $20 off at BJ’s

11/12/2025
Facebook Tumblr
Thursday, December 11
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home - Technology - Five things we learned from WhatsApp vs. NSO Group spyware lawsuit
Technology

Five things we learned from WhatsApp vs. NSO Group spyware lawsuit

By Admin10/05/2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Five things we learned from WhatsApp vs. NSO Group spyware lawsuit
Share
Facebook Twitter LinkedIn Pinterest Email

On Tuesday, WhatsApp scored a major victory against NSO Group when a jury ordered the infamous spyware maker to pay more than $167 million in damages to the Meta-owned company.

The ruling concluded a legal battle spanning more than five years, which started in October 2019 when WhatsApp accused NSO Group of hacking more than 1,400 of its users by taking advantage of a vulnerability in the chat app’s audio-calling functionality.

The verdict came after a week-long jury trial that featured several testimonies, including NSO Group’s CEO Yaron Shohat and WhatsApp employees who responded and investigated the incident. 

Even before the trial began, the case had unearthed several revelations, including that NSO Group had cut off 10 of its government customers for abusing its Pegasus spyware, the locations of 1,223 of the victims of the spyware campaign, and the names of three of the spyware maker’s customers: Mexico, Saudi Arabia, and Uzbekistan.

TechCrunch read the transcripts of the trial’s hearings and is highlighting the most interesting facts and revelations that came out. We will update this post as we learn more from the cache of more than 1,000 pages. 

Testimony described how the WhatsApp attack worked

The zero-click attack, which means the spyware required no interaction from the target, “worked by placing a fake WhatsApp phone call to the target,” as WhatsApp’s lawyer Antonio Perez said during the trial. The lawyer explained that NSO Group had built what it called the “WhatsApp Installation Server,” a special machine designed to send malicious messages across WhatsApp’s infrastructure mimicking real messages. 

“Once received, those messages would trigger the user’s phone to reach out to a third server and download the Pegasus spyware. The only thing they needed to make this happen was the phone number,” said Perez. 

NSO Group’s research and development vice president Tamir Gazneli testified that “any zero-click solution whatsoever is a significant milestone for Pegasus.”

NSO Group confirms it targeted an American phone number as a test for the FBI

Contact Us

Do you have more information about NSO Group, or other spyware companies? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

For years, NSO Group has claimed that its spyware cannot be used against American phone numbers, meaning any cell number that starts with the +1 country code.

In 2022, The New York Times first reported that the company did “attack” a U.S. phone but it was part of a test for the FBI. 

NSO Group’s lawyer Joe Akrotirianakis confirmed this, saying the “single exception” to Pegasus not being able to target +1 numbers “was a specially configured version of Pegasus to be used in demonstration to potential U.S. government customers.”

The FBI reportedly chose not to deploy Pegasus following its test.

How NSO Group’s government customers use Pegasus

NSO’s CEO Shohat explained that Pegasus’ user interface for its government customers does not provide an option to choose which hacking method or technique to use against the targets they are interested in, “because customers don’t care which vector they use, as long as they get the intelligence they need.” 

In other words, it’s the Pegasus system in the backend that picks out which hacking technology, known as an exploit, to use each time the spyware targets an individual.

NSO Group’s headquarters shares the same building as Apple

In a funny coincidence, NSO Group’s headquarters in Herzliya, a suburb of Tel Aviv in Israel, is in the same building as Apple, whose iPhone customers are also frequently targeted by NSO’s Pegasus spyware. Shohat said NSO occupies the top five floors and Apple occupies the remainder of the 14-floor building.

The fact that NSO Group’s headquarters are openly advertised is somewhat interesting on its own. Other companies that develop spyware or zero-days like the Barcelona-based Variston, which shuttered in February, was located in a co-working space while claiming on its official website to be located somewhere else. 

NSO Group admitted that it kept targeting WhatsApp users after the lawsuit was filed

Following the spyware attack, WhatsApp filed its lawsuit against NSO Group in November 2019. Despite the active legal challenge, the spyware maker kept targeting the chat app’s users, according to NSO Group’s research and development vice president Tamir Gazneli. 

Gazneli said that “Erised,” the codename for one of the versions of the WhatsApp zero-click vector, was in use from late-2019 up to May 2020. The other versions were called “Eden” and “Heaven,” and the three were collectively known as “Hummingbird.”


{content}

Source: {feed_title}

Like this:

Like Loading...

Related

group Lawsuit Learned NSO spyware WhatsApp
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

A pair of Nintendo Switch 2 Joy-Con 2 controllers are $20 off at BJ’s

11/12/2025

On Me raises $6M to shake up the gift card industry

11/12/2025

Ford and SK On are ending their U.S. battery joint venture

11/12/2025
Leave A Reply Cancel Reply

Don't Miss
Economy & Business
3 Mins Read

Disney licenses 200 characters to OpenAI for Sora video generation program

By Admin11/12/20253 Mins Read

Chairman of the board of directors of OpenAI Bret Taylor and Redfin CEO Glenn Kelman…

Like this:

Like Loading...

Jason Collins: I have Stage 4 glioblastoma

11/12/2025

A pair of Nintendo Switch 2 Joy-Con 2 controllers are $20 off at BJ’s

11/12/2025

On Me raises $6M to shake up the gift card industry

11/12/2025

New Trump Gold Card visa program launches for top talent investors

11/12/2025

Ford and SK On are ending their U.S. battery joint venture

11/12/2025

3 Reasons The Fed's Done Cutting Rates, For Now

11/12/2025

NASCAR settles federal antitrust case filed by 2 teams

11/12/2025

Babcock International: A Reasonable European Defense Play

11/12/2025

Sen. Ed Markey on TikTok, the FCC, and the First Amendment

11/12/2025
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

Disney licenses 200 characters to OpenAI for Sora video generation program

11/12/2025

Jason Collins: I have Stage 4 glioblastoma

11/12/2025

A pair of Nintendo Switch 2 Joy-Con 2 controllers are $20 off at BJ’s

11/12/2025

On Me raises $6M to shake up the gift card industry

11/12/2025

New Trump Gold Card visa program launches for top talent investors

11/12/2025
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.

%d