NSO Group: Israeli firm 'impersonated Facebook to spread spyware'
An investigation from news site Motherboard claims a Facebook security lookalike domain was set up to spread NSO's Pegasus hacking tool. It also claimed to have found evidence that servers inside the United States were used to spread the spying tool. NSO denies the allegations, labelling them "recycled conjecture"... Pegasus spyware, once installed, can read text messages and other data on the phone, track its location with GPS, and access the microphone and camera.
... Motherboard's latest investigation revolves around a former NSO employee who, it is claimed, provided it with details of a server allegedly designed to distribute the spyware by tricking people into clicking links... [A NSO] spokesman said... "As we have repeatedly made clear, NSO products are offered to and operated solely by verified and authorised government agencies."... Motherboard also alleged that one of the servers used to launch the malware was located within the United States - something that NSO says is not possible... A Facebook spokesperson said: "NSO Group is responsible for cyber-attacks against human rights activists, journalists, and diplomats, in violation of US law. "We are committed to protecting the security of our community and are seeking to hold them accountable in court."