WhatsApp confirms Israeli spyware used to snoop on Indian journalists and activists before 2019 General Elections

Updated on 05-Nov-2019
HIGHLIGHTS

Facebook-owned WhatsApp alleged that over 1,400 WhatsApp users were targets of surveillance by Pegasus.

The NSO group which made the Pegasus spyware strongly denied WhatsApp’s allegations.

Pegasus made use of a voice calling vulnerability on WhatsApp to infect users.

WhatsApp has revealed that Israeli spyware Pegasus was used to snoop on Indian journalists and human rights activists in a disclosure that followed a lawsuit in a US federal court in San Francisco on Tuesday. Facebook-owned WhatsApp alleged that over 1,400 WhatsApp users were targets of surveillance by Pegasus.

While WhatsApp declined to mention the number of people compromised, or even their identities, a WhatsApp spokesperson told The Indian Express that the company was aware of the issue and had contacted each one of them. The spokesperson did state the number of people targeted were “not an insignificant number.”

The report by Indian Express claims at least two dozen academics, lawyers, Dalit activists and journalists across India were alerted by WhatsApp that their phones have been under surveillance for a two-week period till May 2019. The time period coincides with the 2019 General Elections in India.

The NSO group which built the Pegasus spyware strongly denied WhatsApp’s allegations. In a statement to the Indian Express, the NSO said, “In the strongest possible terms, we dispute today’s allegations and will vigorously fight them. Our technology is not designed or licensed for use against human rights activists and journalists.”

Doubts about NSO’s technology were first raised back in May when Amnesty International filed an lawsuit in an Israeli court alleging the Pegasus spyware created by the NSO Group has been used to keep tabs on its staff and other human rights activists.

The NSO Group claimed that it licenses the software only to vetted and legitimate government agencies.

How does Pegasus work?

The Pegasus spyware doesn’t intercept WhatsApp messages from one end or the other. Instead, it convinces the target to either click on a ‘exploit link’ after which, the pegasus spyware is installed without the user’s knowledge. The spyware then begins contacting the command and control servers to receive and execute commands. The software can send back voice calls, text messages, calendar events, contact lists, passwords and even turn on the phone’s camera and microphone. In later versions, Pegasus did not even have to send a clickable link. It could infect the phone through a missed video call on WhatsApp.

As a result, while WhatsApp’s messages continued to remain encrypted end-to-end, the spyware was able to capture the data simply by monitoring what’s being typed on screen.

Digit NewsDesk

Digit News Desk writes news stories across a range of topics. Getting you news updates on the latest in the world of tech.

Connect On :