- Joined
- May 15, 2016
- Messages
- 3,878
- Likes
- 2,573
- Points
- 1,730
Facebook lawyers presented the court with evidence refuting the allegations of the NSO Group.
The lawsuit between Facebook and the Israeli spyware maker NSO Group, which began in October 2019, revealed new details. According to court documents, Facebook made a connection between one of the IP addresses and 720 cases of attacks on WhatsApp users in the spring of 2019, during which the zero-day WhatsApp VoIP vulnerability was exploited.
An exploit for 0-day vulnerability made it possible to infect the phone with the Pegasus malware, which then checked the NSO Group's C & C servers for new commands. In 720 cases of attacks, the IP address of the remote server was 104,223.76.220, and in three cases it was 54.93.81.200. The first IP address belongs to QuadraNet Enterprises, a data center provider in Los Angeles, California.
According to representatives of the NSO Group, the company does not engage in espionage, but only sells its technology to the governments of other countries, for the actions of which it is not responsible. Also, a special blocking mechanism is supposedly built into the NSO Group software, eliminating the use of tools to crack phones in the United States.
Facebook lawyers presented the court with evidence refuting these allegations. According to lawyers, NSO had a contract with QuadraNet Enterprises, which allowed it to use the server to carry out attacks using Pegasus malware. In addition, the court document listed “subdomains that allegedly were hosted on Amazon’s servers with the date of the attacks.”
This lawsuit began in October 2019. WhatsApp, a Facebook-owned company, has sued the NSO Group, which supposedly helped government intelligence agencies crack the phones of about 1.4 thousand users around the world, including diplomats, opposition members, journalists, and senior officials.
The lawsuit between Facebook and the Israeli spyware maker NSO Group, which began in October 2019, revealed new details. According to court documents, Facebook made a connection between one of the IP addresses and 720 cases of attacks on WhatsApp users in the spring of 2019, during which the zero-day WhatsApp VoIP vulnerability was exploited.
An exploit for 0-day vulnerability made it possible to infect the phone with the Pegasus malware, which then checked the NSO Group's C & C servers for new commands. In 720 cases of attacks, the IP address of the remote server was 104,223.76.220, and in three cases it was 54.93.81.200. The first IP address belongs to QuadraNet Enterprises, a data center provider in Los Angeles, California.
According to representatives of the NSO Group, the company does not engage in espionage, but only sells its technology to the governments of other countries, for the actions of which it is not responsible. Also, a special blocking mechanism is supposedly built into the NSO Group software, eliminating the use of tools to crack phones in the United States.
Facebook lawyers presented the court with evidence refuting these allegations. According to lawyers, NSO had a contract with QuadraNet Enterprises, which allowed it to use the server to carry out attacks using Pegasus malware. In addition, the court document listed “subdomains that allegedly were hosted on Amazon’s servers with the date of the attacks.”
This lawsuit began in October 2019. WhatsApp, a Facebook-owned company, has sued the NSO Group, which supposedly helped government intelligence agencies crack the phones of about 1.4 thousand users around the world, including diplomats, opposition members, journalists, and senior officials.