Yazılar

US Court Rules WhatsApp Victorious in Lawsuit Against NSO Group Over Pegasus Spyware Hack

WhatsApp has secured a significant legal victory against the NSO Group, the Israeli company responsible for developing the notorious Pegasus spyware. On Friday, a US District Court judge ruled in favor of WhatsApp, finding that NSO Group was responsible for hacking the devices of 1,400 individuals by using WhatsApp’s servers to infect them with the spyware. This ruling also determined that NSO Group violated both federal US hacking laws and California state laws, along with breaching WhatsApp’s terms of service in the process.

The decision was handed down by US District Court Judge Phyllis Hamilton, who granted WhatsApp’s motion for summary judgment. In her ruling, Judge Hamilton stated that NSO Group had infringed upon the federal Computer Fraud and Abuse Act (CFAA), as well as California’s Comprehensive Computer Data Access and Fraud Act (CDAFA). The ruling marks a significant step in the ongoing legal battle between WhatsApp, owned by Meta, and NSO Group, which has faced scrutiny over its involvement in surveillance activities.

In addition to the favorable judgment for WhatsApp, a separate trial will be held in March 2025 to determine the damages that NSO Group owes WhatsApp as a result of its actions. Judge Hamilton also instructed both parties to inform the court by January 17, 2025, if there are any motions related to expert testimony that need to be resolved before the trial on damages begins. This marks a crucial phase in the case, with WhatsApp seeking compensation for the harm caused by the spyware attack.

The ruling is being seen as a crucial step in holding the NSO Group accountable for its role in enabling the widespread use of surveillance technology, and it could set a significant precedent for future cases involving spyware and data breaches. WhatsApp’s victory is part of a broader push to protect privacy and data security in the digital age, sending a strong message to companies that engage in unauthorized surveillance and hacking activities.

Rapido Addresses Security Vulnerability That Exposed User and Driver Data

Rapido, the popular ride-hailing platform, has reportedly resolved a security flaw that exposed sensitive user and driver information. According to a report, the flaw was tied to a feedback form, which unintentionally revealed personal data such as full names, email addresses, and phone numbers of individuals submitting feedback. This issue, discovered by a security researcher, raised significant concerns about the potential misuse of this information in scams or other malicious activities. Rapido has since acknowledged the problem and taken swift action to secure the portal, safeguarding the data of its users and drivers.

Security Researcher Uncovers Vulnerability

The flaw was uncovered by security researcher Renganathan P, who identified a vulnerable feedback website used by Rapido to collect responses from both users and drivers. According to TechCrunch, the problem stemmed from an application programming interface (API) that transmitted the collected feedback to a third-party service. This misconfigured API inadvertently exposed personal data, making it accessible to anyone who could identify the issue.

User and Driver Data at Risk

The exposed portal reportedly revealed crucial personal details, including the names, email addresses, and phone numbers provided by individuals using the feedback form. Such information could be exploited for phishing attacks, scams, or other fraudulent activities, amplifying the need for immediate remediation of the issue.

Rapido’s Response to the Breach

In response to the discovery, Rapido acted promptly to set the affected portal to private, effectively mitigating the vulnerability. The company has assured users and drivers that the issue has been resolved and steps have been taken to prevent similar incidents in the future. This case highlights the importance of rigorous security measures in safeguarding user data and maintaining trust in digital platforms.

Chinese Hack of U.S. Treasury Targets Economic Sanctions Office

A cyberattack by Chinese government hackers successfully breached the U.S. Treasury’s office responsible for administering economic sanctions, the Washington Post reported on Wednesday. According to unnamed U.S. officials, the hackers infiltrated the Office of Foreign Assets Control (OFAC), the Office of Financial Research (OFR), and even targeted the office of U.S. Treasury Secretary Janet Yellen.

The Treasury Department had already disclosed the breach earlier this week in a letter to lawmakers, describing it as a “major incident” where unclassified documents were stolen. However, the department did not reveal the specific departments or individuals affected by the attack.

In response to the Washington Post‘s report, Liu Pengyu, a spokesperson for the Chinese Embassy in Washington, dismissed the U.S. claims as “irrational” and lacking factual basis, calling them “smear attacks” against China. The statement emphasized that China opposes all forms of cyberattacks but did not specifically address the report regarding the targeted offices.

The Treasury Department has not yet commented on the details revealed in the Washington Post report. According to the sources cited by the paper, Chinese government hackers were likely focused on gathering intelligence about Chinese entities that the U.S. might consider sanctioning in the future.

The Treasury’s earlier disclosure mentioned that the breach involved third-party cybersecurity service provider BeyondTrust. Chinese entities and individuals have been frequent targets of U.S. sanctions, which are a key component of Washington’s foreign policy towards Beijing. Last month, U.S. Treasury Secretary Janet Yellen confirmed that the U.S. would not rule out sanctions on Chinese banks in its efforts to curb Russia’s oil revenue and limit access to foreign supplies, in connection with the ongoing war in Ukraine.