The rights groups who uncovered the hacking of staff at Palestinian NGOs have not accused any particular government of ordering the Pegasus hack, but in a joint statement referenced NSO Group’s headquarters location in the Israeli city of Herzliya.
“NSO Group’s headquarters in Herzliya, 以色列, are less than a hundred kilometers from where the hacked Palestinian organizations work,” 声明说. “Not only has this technology been exported to countries where it has facilitated human rights abuse like Saudi Arabia and Mexico, but it is also being deployed locally and in some cases against Israeli [电话] 数字 — something which the NSO Group previously claimed was not possible.”
作为回应, NSO Group said: “Due to contractual and national security considerations, we cannot confirm or deny the identity of our government customers. As we stated in the past, NSO Group does not operate the products itself; the company license approved government agencies to do so, and we are not privy to the details of individuals monitored.”
NSO Group says its spyware helps “law enforcement and intelligence agencies around the world to defend the public from serious crime and terror.”
Cybersecurity analysts and human rights activists have long accused NSO Group, 特别是, of selling invasive and easy-to-use mobile hacking software to repressive governments.
NSO Group’s Pegasus spyware is said to have been used to spy on a journalist and activist in Morocco, the widow of a slain Mexican journalist and two women connected to murdered Saudi journalist Jamal Khashoggi, among other targets, according to security researchers.
US government officials have been concerned by the expansion of the market for hacking tools and the ability of foreign governments to quickly develop their own cyber capabilities using American expertise. 在九月, 例如, the Justice Department announced charges against three former US intelligence and military operatives for allegedly helping build a hacking program for the United Arab Emirates government.