Yazılar

Meta Wins $168 Million in Landmark Case Against NSO Group Over WhatsApp Spyware Abuse

Meta Platforms has secured a significant legal victory, winning a $168 million verdict against Israeli spyware company NSO Group in a long-running lawsuit over the unauthorized use of WhatsApp servers to deploy spyware on users’ devices. The ruling marks the first major courtroom win against a surveillance firm for the deployment of illegal spyware.

A California jury awarded Meta $444,719 in compensatory damages and $167.3 million in punitive damages, capping a six-year legal battle that began with a 2019 lawsuit. In December, a federal judge had already ruled that NSO unlawfully exploited a WhatsApp vulnerability to implant surveillance software.

Meta hailed the outcome as a step forward for privacy and security”, adding that the verdict sets a precedent in holding spyware developers accountable.

A Rare Glimpse Into the Spyware Industry

The trial revealed rare insights into NSO’s operations:

  • Between 2018 and 2020, NSO charged governments $7 million to hack up to 15 devices simultaneously.

  • Cross-border hacking features cost an additional $1–2 million.

  • NSO maintained a 140-person research team with a $50 million budget, some of which was used to exploit smartphone security flaws.

  • Court testimony confirmed customers included Uzbekistan, Saudi Arabia, and Mexico.

Despite NSO’s claim that its software is intended to fight terrorism and crime, human rights advocates, such as Natalia Krapiva of Access Now, labeled the firm a poster child for surveillance abuses.” She called the ruling a signal to the spyware industry: There will be consequences if you act carelessly or brazenly.”

Continued Secrecy and Legal Resistance

NSO has indicated plans to appeal the verdict, saying it would pursue all legal remedies. Much of the case remained shrouded in secrecy, with Judge Phyllis Hamilton criticizing the firm for withholding evidence and ignoring court orders. The Israeli government even intervened, seizing documents to prevent their disclosure in U.S. courts.

This case, which reached as far as the U.S. Supreme Court, has been closely watched by privacy advocates, surveillance industry players, and governments worldwide, as it underscores both the legal vulnerability of spyware firms and the growing demand for greater accountability in cyber surveillance practices.

India’s NSE and BSE Restrict Overseas Website Access Amid Cybersecurity Concerns

India’s two largest stock exchanges, the National Stock Exchange (NSE) and BSE Ltd, have temporarily curbed access to their websites for overseas users, according to three sources familiar with the matter. The move is precautionary in nature and does not impact foreign investors’ ability to trade on Indian markets, the sources emphasized.

The decision followed a joint meeting of the exchanges on Tuesday, where cybersecurity threats were discussed, one source said. While no specific attacks have been confirmed, the BSE acknowledged cyber threat monitoring as part of its protective protocol, adding that access is being granted on a case-by-case basis.

The restriction comes amid heightened regional tensions, particularly in light of ongoing geopolitical friction between India and Pakistan, though the sources did not directly link the decision to recent conflict-related developments.

BSE, being a critical market infrastructure institution (MII), proactively and continuously monitors risksand based on such monitoring… blocks certain websites/locations to protect users and systems,” a BSE spokesperson said in a statement to Reuters.

Indian markets continue to operate normally, and there is no indication of disruption to core trading systems. The move reflects growing caution among global financial institutions as cyberattacks targeting sensitive financial infrastructure increase in frequency and sophistication.

The NSE has not yet commented on the development.

SK Group Chairman Chey Apologizes for Major SK Telecom Data Breach, Pledges Security Overhaul

SK Group Chairman Chey Tae-won issued a public apology on Wednesday following a significant data breach at SK Telecom, South Korea’s largest mobile carrier, which has sparked alarm among its 23 million users over potential theft of personal and financial information.

The breach, detected on April 18, was attributed to a malware attack, and has led to widespread concern and customer action. Thousands have visited SK Telecom outlets to replace their USIM (Universal Subscriber Identity Module) cards, which the company is offering free of charge.

Chey, speaking for the first time since the breach became public, said, I believe we need to look at this as a matter of national defence, not just (data) security.” He acknowledged a need for a more comprehensive and strategic approach to cybersecurity, noting that the company previously treated such threats as a standard IT issue handled internally.

In response to the breach, SK Telecom has launched a USIM Protection Service, which it says provides equivalent protection to replacing the USIM card. Chey confirmed he enrolled in the service but had not yet replaced his own card.

The chairman also pledged a full-scale security review involving external cybersecurity experts to prevent similar incidents in the future and restore public trust in the company’s data protection capabilities.