WhatsApp & Spyware: A Call‑Digger’s Tale
Picture this: a hacker rings a phone, and even without answer, a sneaky code slinks into the device. That’s the scoop behind WhatsApp’s latest security patch.
What the Hack Was Trying To Do
- Target both iPhones and Android users via a malicious call script.
- Install spyware that can take over daily phone functions—think the same style used by intelligence agencies.
- Send the payload even if the call is missed, making it hard to detect.
Who Got Poked?
Analysis points to a select group of users, including a UK lawyer and human‑rights campaigners. Citizen Lab at the University of Toronto reports an attempt to target a human‑rights lawyer—an attack that WhatsApp has reportedly blocked.
Who’s Behind the Code?
- NSO Group, an Israeli cyber‑security firm famed for its surveillance tools.
- NSO claims that it never identifies or operates targets; its tech is used only by governments and law‑enforcement agencies.
Reactions & Next Steps
- WhatsApp says the attack had the hallmarks of an advanced cyber actor tied to intelligence services, and it has advised human‑rights organizations to share the findings.
- Amnesty International is calling for the Israeli Ministry of Defence to revoke NSO’s export license and is backing legal action.
- De‑epic title: “No Targeting, No Free Ride”—NSO’s claim that it doesn’t target anyone directly.
In short, the hackers had their eyes on high‑profile individuals, but WhatsApp rolled out a fix fast enough to stop many from getting caught in the spyware spiderweb. Keep your phone updated and stay one step ahead—because in the digital world, a single missed call can be a wild card.