UAE Using Israeli Spy Technology

The United Arab Emirates has been accused of purchasing Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

The revelation was made by the University of Toronto’s Citizen Lab after human rights activist Ahmed Mansoor sent them a suspicious link which, had been sent to him via a text message.

The link claimed to contain “new secrets” about detainees being tortured in UAE prisons.

 “We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based ‘cyber war’ company that sells Pegasus, a government-exclusive ‘lawful intercept’ spyware product,” said Citizen Lab in a statement.

“Once infected, Mansoor’s phone would have become a digital spy in his pocket, capable of employing his iPhone’s camera and microphone to snoop on activity in the vicinity of the device, recording his WhatsApp and Viber calls, logging messages sent in mobile  chat apps, and tracking his movements,” it added.

The lab, which focuses on advanced research and development at the intersection of Information and Communication Technologies (ICTs), human rights, and global security, said that the UAE government was “the likely operator behind the targeting,” and noted that the attack was traced back to software designed by Israel’s NSO Group, which writes and sells spyware to clients, including foreign governments.

The NSO, which is reportedly run by former members of the Israeli army’s Unit 8200 electronic surveillance branch, refrained from commenting whether it had sold the software to Abu Dhabi as they “cannot confirm the specific cases.”

“The agreements signed with the company’s customers require that the company’s products only be used in a lawful manner. Specifically, the products may only be used for the prevention and investigation of crimes,” said NSO spokesman Zamir Dahbash.

The discovery prompted Apple to release an urgent software update aimed at blocking the exploitation used by the spyware.

Mansoor, a prominent and internationally recognized human rights activist, has been arrested and tortured in the past and has also been the target of sophisticated malware written by a private intelligence firm.

“The targeting of these activists and dissidents is a taste of what’s to come,” Citizen Lab researcher Bill Marczak. “What they’re facing today will be faced by ordinary users tomorrow,” he added.

Ein News:     Ein News

 

« Are US Voting Machines Secure From Hackers?
Australian Government Networks Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.