TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSO Group Hacked

248 pointsby thgalmost 4 years ago

15 comments

Shankalmost 4 years ago
I suppose that broadly, the takeaway here (and in all of this) that I’ve missed is that fundamentally, this list of phones that were targeted shouldn’t exist, or shouldn’t be leakable in this way, if we want to believe that NSO Group is targeting the most genuine targets.<p>To frame it differently: NSO Group sells tools to governments that are apparently trustworthy. Its security and system architecture should be decentralized enough that a list of all targets should be extremely difficult to obtain. If the list is obtainable, then what else is? Are their exploit toolkits just as leakable? Are the internal controls not sufficient to stop these leaks?<p>How can we continue to allow orgs like NSO Group to exist if they surely can’t keep something like their entire target list safe? Even if we assume of the targets are legitimate threats (which, again, requires enough suspension of disbelief to hold a small army at this point), why would we want that list leakable? If they’re all the most legitimate targets, then that list is essentially 50k people who can now discover this fact and change their patterns to hide. It’s pretty bad to tip off “all the people who we find important enough to 0-day” if that assumption holds.<p>Now the real question? I’m not sure I know what we can do, actionably. Call Congress and ask them to care?
评论 #27903035 未加载
评论 #27905615 未加载
评论 #27903727 未加载
评论 #27905506 未加载
评论 #27903832 未加载
评论 #27905959 未加载
rollulusalmost 4 years ago
The &quot;hacked&quot; part is only an assumption, isn&#x27;t it? The leaked information could also come from, say, a whistleblower. An employee that suddenly developed a sense of ethics.
评论 #27903536 未加载
评论 #27903018 未加载
评论 #27902837 未加载
评论 #27902847 未加载
bertilalmost 4 years ago
I understand that the title makes an assumption that the first paragraph has to walk away from in its last sentence, but I appreciate Schneier’s nuance when framing the question. The spying isn’t new. The list is probably broader than many people assumed, but the real news is that NSO own security isn’t great.<p>More importantly, if you believe that digital-weapons-for-hire are not a good idea, spreading doubt about their reliability is probably more effective than painting those companies as invincible hackers. They made an architectural choice that exposed their clients. Therefore, if you are a prospect for a similar technology, think hard when they present their tools, and challenge decisions that might expose you.
评论 #27903907 未加载
pajkoalmost 4 years ago
Here is a detailed analysis: <a href="http:&#x2F;&#x2F;info.lookout.com&#x2F;rs&#x2F;051-ESQ-475&#x2F;images&#x2F;lookout-pegasus-technical-analysis.pdf" rel="nofollow">http:&#x2F;&#x2F;info.lookout.com&#x2F;rs&#x2F;051-ESQ-475&#x2F;images&#x2F;lookout-pegasu...</a><p>Official manual: <a href="https:&#x2F;&#x2F;archive.org&#x2F;details&#x2F;nso-pegasus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;archive.org&#x2F;details&#x2F;nso-pegasus&#x2F;</a>
评论 #27905617 未加载
Shindialmost 4 years ago
Right here is another argument in favor of string privacy protection. Even if NSO was a righteous and holy actor (spoiler: it&#x27;s not), they can be hacked any time and now that data is public.<p>Same reason govts shouldn&#x27;t spy on their citizens: even when you fully believe in your own govt, they can be hacked.
评论 #27906691 未加载
评论 #27908836 未加载
qeternityalmost 4 years ago
If I were a similarly acronym’ed three letter intelligence agency that wanted to shut down a private sector competitor, this is exactly what I would do.
评论 #27906784 未加载
teekertalmost 4 years ago
The iOS tool scans a backup, but the Android tool &quot;check-for-infection tool&quot; checks for messages pointing to NSO domains. I recently got a strange massage, is this list public?
评论 #27906589 未加载
Arjuna144almost 4 years ago
My first reaction to this was that all would need mobile phones with physical off switches for camera&#x2F;microphone and internet but even such swtiches do not protect against such advanced spy operations. I think such software should be treated like weapons of war for which there are international regulations and obervations
评论 #27905593 未加载
traszalmost 4 years ago
Too bad it didn’t include the list of employees.
评论 #27905247 未加载
anigbrowlalmost 4 years ago
What a shame &#x2F;s
dogma1138almost 4 years ago
Is there any good explanation of what that list actually is and where it came from?
jokoonalmost 4 years ago
Yeah, well, not really happy about this, because the goal was probably to delete traces of involvement and clients.<p>Some people will also probably turn up dead, unless they hide or seek asylum.
tzuryalmost 4 years ago
time to shut down this company.
yawaworht1978almost 4 years ago
Live by the hack, die by the hack, i suppose.
Goetyalmost 4 years ago
So how do we defend the defenseless?
评论 #27903405 未加载