U.S. markets close in 3 hours 44 minutes
  • S&P 500

    -0.84 (-0.02%)
  • Dow 30

    -79.37 (-0.20%)
  • Nasdaq

    -27.63 (-0.17%)
  • Russell 2000

    +10.30 (+0.50%)
  • Crude Oil

    -0.89 (-1.11%)
  • Gold

    +28.50 (+1.36%)
  • Silver

    +0.62 (+2.66%)

    +0.0024 (+0.22%)
  • 10-Yr Bond

    +0.0410 (+0.98%)

    +0.0039 (+0.31%)

    +0.4420 (+0.29%)
  • Bitcoin USD

    +3,696.72 (+5.88%)
  • CMC Crypto 200

    0.00 (0.00%)
  • FTSE 100

    -42.17 (-0.55%)
  • Nikkei 225

    +198.43 (+0.50%)

WhatsApp blames — and sues — mobile spyware maker NSO Group over its zero-day calling exploit

A WhatsApp logo is seen on an iPhone screen in this photo illustration in Warsaw, Poland on March 5, 2019. (Photo by Jaap Arriens/NurPhoto via Getty Images)

WhatsApp has filed a suit in federal court accusing Israeli mobile surveillance maker NSO Group of creating an exploit that was used hundreds of times to hack into targets' phone.

The lawsuit, filed in a California federal court, said the mobile surveillance outfit "developed their malware in order to access messages and other communications after they were decrypted" on target devices.

The attack worked by exploiting an audio-calling vulnerability in WhatsApp. Users may appear to get an ordinary call, but the malware would quietly infect the device with spyware, giving the attackers full access to the device.

In some cases it happened so quickly, the target's phone may not have rung at all.

Because WhatsApp is end-to-end encrypted, it's near-impossible to access the messages as they traverse the internet. But in recent years, governments and mobile spyware companies have begun targeting the devices where the messages were sent or received. The logic goes that if you hack the device, you can obtain its data.

That's what WhatsApp says happened.

WhatsApp, owned by Facebook, quickly patched the vulnerability. Although blame fell fast on NSO Group, WhatsApp did not publicly accuse the company at the time — until now.

In an op-ed posted shortly after the suit was filed, WhatsApp head Will Cathcart said the messaging giant "learned that the attackers used servers and Internet-hosting services that were previously associated" with NSO Group, and that certain WhatsApp accounts used during the attacks were traced back to the company.

"While their attack was highly sophisticated, their attempts to cover their tracks were not entirely successful," said Cathcart.

The attack involved disguising the malicious code as call settings, allowing the surveillance outfit to deliver the code as if it came from WhatsApp's signaling servers. Once the malicious calls were delivered to the target's phone, they "injected the malicious code into the memory of the target device — even when the target did not answer the call," the complaint read. When the code was run, it sent a request to the surveillance company's servers, and downloaded additional malware to the target's device.

In total, some 1,400 targeted devices were affected by the exploit, the lawsuit said.

Most people were unaffected by the WhatsApp exploit. But WhatsApp said that more than 100 human rights defenders, journalists and "other members of civil society" were targeted by the attack.

Other targets included government officials and diplomats.

In a statement, NSO Group said: "In the strongest possible terms, we dispute today’s allegations and will vigorously fight them."