Security News
NSO Group - the Israeli-based maker of the notorious, military-grade Pegasus spyware that's been linked to cyberattacks against dissidents, activists and NGOs at the hands of repressive regimes - has been blacklisted by the United States. NSO Group is one of four spyware developers or traffickers that the U.S. Commerce Department added to its "Entity List" on Wednesday, effectively banning trade with the company.
The U.S. Commerce Department on Wednesday added four companies, including Israel-based spyware companies NSO Group and Candiru, to a list of entities engaging in "Malicious cyber activities." The agency said the two companies were added to the list based on evidence that "These entities developed and supplied spyware to foreign governments that used these tools to maliciously target government officials, journalists, businesspeople, activists, academics, and embassy workers."
The U.S. Commerce Department on Wednesday added four companies, including Israel-based spyware companies NSO Group and Candiru, to a list of entities engaging in "Malicious cyber activities." The agency said the two companies were added to the list based on evidence that "These entities developed and supplied spyware to foreign governments that used these tools to maliciously target government officials, journalists, businesspeople, activists, academics, and embassy workers."
The U.S. has sanctioned four companies located in Israel, Russia, and Singapore for the development of spyware or the sale of hacking tools used by state-sponsored hacking groups. Israeli companies NSO Group and Candiru are being sanctioned for creating and selling spyware used to target journalists and activists.
India's Supreme Court has taken the unusual step of commissioning a Technical Committee to investigate whether the national government used the NSO Group's "Pegasus" spyware on its citizens. Discomfort with India's use of Pegasus has bubbled along ever since, helped by several petitions that sought to determine the extend of government spyware usage, and whether or not it was constitutional.
A new variant of the Android info-stealer called FakeCop has been spotted by Japanese security researchers, who warn that the distribution of the malicious APK is picking up pace. Osumi, Yusuke October 19, 2021 Masked as a popular security tool.
A set of seemingly innocuous Android apps have been infecting Israeli users with spyware since 2018, and the campaign continues to this day. The spyware-laden apps were discovered by researchers at Qihoo 360 who found various apps disguised as social applications, Threema, Al-Aqsa Radio, Al-Aqsa Mosque, Jerusalem Guide, PDF viewer, Wire, and other applications.
Citizen Lab is reporting that a New York Times journalist was hacked with the NSO Group’s spyware Pegasus, probably by the Saudis. The world needs to do something about these cyberweapons arms...
More than six years after proposing export restrictions on "Intrusion software," the US Commerce Department's Bureau of Industry and Security has formulated a rule that it believes balances the latitude required to investigate cyber threats with the need to limit dangerous code. The BIS on Wednesday announced an interim final rule that defines when an export license will be required to distribute what is basically commercial spyware, in order to align US policy with the 1996 Wassenaar Arrangement, an international arms control regime.
A prominent Togolese human rights defender has been targeted with spyware by a threat actor known for striking victims in South Asia, marking the hacking group's first foray into digital surveillance in Africa. Amnesty International tied the covert attack campaign to a collective tracked as "Donot Team", which has been linked to cyber offensives in India and Pakistan, while also identifying apparent evidence linking the group's infrastructure to an Indian company called Innefu Labs.