Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Facebook Google Microsoft Apple

NSO Spyware 'Targets Big Tech Cloud Services' (ft.com) 27

The Israeli company whose spyware hacked WhatsApp has told buyers its technology can surreptitiously scrape all of an individual's data from the servers of Apple, Google, Facebook, Amazon and Microsoft, Financial Times reported on Friday. [Editor's note: the link may be paywalled; alternative source] From the report: NSO Group's flagship smartphone malware, nicknamed Pegasus, has for years been used by spy agencies and governments to harvest data from targeted individuals' smartphones. But it has now evolved to capture the much greater trove of information stored beyond the phone in the cloud, such as a full history of a target's location data, archived messages or photos, according to people who shared documents with the Financial Times and described a recent product demonstration. The documents raise difficult questions for Silicon Valley's technology giants, which are trusted by billions of users to keep critical personal information, corporate secrets and medical records safe from potential hackers. NSO denied promoting hacking or mass-surveillance tools for cloud services. However, it did not specifically deny that it had developed the capability described in the documents.
This discussion has been archived. No new comments can be posted.

NSO Spyware 'Targets Big Tech Cloud Services'

Comments Filter:
  • "The company maintains that its software is only sold to responsible governments to help foil terrorist attacks and crimes."

    'responsible governments' sounds like an oxymoron.

  • by joh ( 27088 ) on Friday July 19, 2019 @10:21AM (#58951092)

    This seems to work by the malware on the phone capturing login data, sending this out and then a server elsewhere basically cloning the phone and syncing all data as if it were another device of the user. This doesn't add much over having malware running on your phone in the first place. As soon as your device is compromised you're screwed anyway.

    • This seems to work by the malware on the phone capturing login data, sending this out and then a server elsewhere basically cloning the phone and syncing all data as if it were another device of the user. This doesn't add much over having malware running on your phone in the first place. As soon as your device is compromised you're screwed anyway.

      That is exactly what the article says.

      But I do not think the title is misleading because the article goes on to explain that this is exactly how the malicious actor will then be able to gain access to all of your cloud data in addition to the data available directly on or through your phone.

  • This is why I will have an iPhone. Too much functionality relies on going through the cloud.
  • ... the margins on sales of data will be so thin that civilians will have access, much line DNA data.

  • NSO denied promoting hacking or mass-surveillance tools for cloud services. However, it did not specifically deny that it had developed the capability described in the documents.

    Because charging by the individual is far more profitable. Nice.

"If it ain't broke, don't fix it." - Bert Lantz

Working...