[ad_1]
A former employee of the Israeli NSO telephone company was accused of stealing the company's spyware and trying to sell them on the darknet, did one learned Thursday morning.
NSO has developed cyber-weapons used by dozens of intelligence apparatus, armed forces and law enforcement agencies around the world. His most important product is a spyware known as Pegasus. The software can infect mobile phones, allowing someone to record calls, remotely access the camera 's camera, view text messages, and send them to the camera. get GPS coordinates, etc. The software can be installed remotely on any mobile device without the knowledge of the owner.
The employee, who was informed of his imminent dismissal in April, was working at the company's quality badurance department. He was charged last week, but it was only Thursday that the publication of the indictment was allowed.
According to the indictment, realizing that he was going to lose his job, the employee copied the top secret code of the company's networks – a code that could harm security in several countries, including Israel, if it fell into the wrong hands. Following his dismissal, he contacted a foreign entity and tried to sell a hard drive containing the code for $ 50 million.
The ONS said in a statement that she had quickly identified the violation and the suspect, adding that no material had been shared with a third party and that no data was compromised.
However, for a period of three weeks between the time the employee appeared at a removal hearing and the time the hearing actually took place, he had the sensitive code on a record at him. He could have fled the country, perhaps to a state with which Israel does not have an extradition treaty. In this case, the sypware could have fallen into the hands of enemy countries, terrorist groups or criminal organizations.
NSO was founded in 2010 by three veterans of the first intelligence unit of the Army, 8200: Niv Carmi, Omri Lavie and Shalev Hulio.
Last year, the company sold its Pegasus software to Mexican federal agencies, which used the program to infiltrate mobile devices held by lawyers, journalists and activists fighting against government corruption in Mexico, reported the New York Times.
In August 2016, US researchers claimed that the group's technology was being used against a political dissident in the United Arab Emirates, a journalist in Mexico, and a minority party politician in Kenya.
[ad_2]
Source link