1 PRIME MINISTER OYUN-ERDENE VISITS EGIIN GOL HYDROPOWER PLANT PROJECT SITE WWW.MONTSAME.MN PUBLISHED:2025/04/30      2 ‘I FELT CAUGHT BETWEEN CULTURES’: MONGOLIAN MUSICIAN ENJI ON HER BEGUILING, BORDER-CROSSING MUSIC WWW.THEGUARDIAN.COM PUBLISHED:2025/04/30      3 POWER OF SIBERIA 2: ECONOMIC OPPORTUNITY OR GEOPOLITICAL RISK FOR MONGOLIA? WWW.THEDIPLOMAT.COM PUBLISHED:2025/04/29      4 UNITED AIRLINES TO LAUNCH FLIGHTS TO MONGOLIA IN MAY WWW.MONTSAME.MN PUBLISHED:2025/04/29      5 SIGNATURE OF OIL SALES AGREEMENT FOR BLOCK XX PRODUCTION WWW.RESEARCH-TREE.COM  PUBLISHED:2025/04/29      6 MONGOLIA ISSUES E-VISAS TO 11,575 FOREIGNERS IN Q1 WWW.XINHUANET.COM PUBLISHED:2025/04/29      7 KOREA AN IDEAL PARTNER TO HELP MONGOLIA GROW, SEOUL'S ENVOY SAYS WWW.KOREAJOONGANGDAILY.JOINS.COM  PUBLISHED:2025/04/29      8 MONGOLIA TO HOST THE 30TH ANNUAL GENERAL MEETING OF ASIA SECURITIES FORUM WWW.MONTSAME.MN PUBLISHED:2025/04/29      9 BAGAKHANGAI-KHUSHIG VALLEY RAILWAY PROJECT LAUNCHES WWW.UBPOST.MN PUBLISHED:2025/04/29      10 THE MONGOLIAN BUSINESS ENVIRONMENT AND FDI: CHALLENGES AND OPPORTUNITY WWW.MELVILLEDALAI.COM  PUBLISHED:2025/04/28      849 ТЭРБУМЫН ӨРТӨГТЭЙ "ГАШУУНСУХАЙТ-ГАНЦМОД" БООМТЫН ТЭЗҮ-Д ТУРШЛАГАГҮЙ, МОНГОЛ 2 КОМПАНИ ҮНИЙН САНАЛ ИРҮҮЛЭВ WWW.EGUUR.MN НИЙТЭЛСЭН:2025/04/30     ХУУЛЬ БУСААР АШИГЛАЖ БАЙСАН "БОГД УУЛ" СУВИЛЛЫГ НИЙСЛЭЛ ӨМЧЛӨЛДӨӨ БУЦААВ WWW.NEWS.MN НИЙТЭЛСЭН:2025/04/30     МЕТРО БАРИХ ТӨСЛИЙГ ГҮЙЦЭТГЭХЭЭР САНАЛАА ӨГСӨН МОНГОЛЫН ГУРВАН КОМПАНИ WWW.EAGLE.MN НИЙТЭЛСЭН:2025/04/30     "UPC RENEWABLES" КОМПАНИТАЙ ХАМТРАН 2400 МВТ-ЫН ХҮЧИН ЧАДАЛТАЙ САЛХИН ЦАХИЛГААН СТАНЦ БАРИХААР БОЛОВ WWW.EAGLE.MN НИЙТЭЛСЭН:2025/04/30     ОРОСЫН МОНГОЛ УЛС ДАХЬ ТОМООХОН ТӨСЛҮҮД ДЭЭР “ГАР БАРИХ” СОНИРХОЛ БА АМБИЦ WWW.EGUUR.MN НИЙТЭЛСЭН:2025/04/30     МОНГОЛ, АНУ-ЫН ХООРОНД ТАВДУГААР САРЫН 1-НЭЭС НИСЛЭГ ҮЙЛДЭНЭ WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/04/29     ЕРӨНХИЙ САЙД Л.ОЮУН-ЭРДЭНЭ ЭГИЙН ГОЛЫН УЦС-ЫН ТӨСЛИЙН ТАЛБАЙД АЖИЛЛАЖ БАЙНА WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/04/29     Ц.ТОД-ЭРДЭНЭ: БИЧИГТ БООМТЫН ЕРӨНХИЙ ТӨЛӨВЛӨГӨӨ БАТЛАГДВАЛ БУСАД БҮТЭЭН БАЙГУУЛАЛТЫН АЖЛУУД ЭХЛЭХ БОЛОМЖ БҮРДЭНЭ WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/04/29     MCS-ИЙН ХОЁР ДАХЬ “УХАА ХУДАГ”: БНХАУ, АВСТРАЛИТАЙ ХАМТРАН ЭЗЭМШДЭГ БАРУУН НАРАНГИЙН ХАЙГУУЛЫГ УЛСЫН ТӨСВӨӨР ХИЙЖЭЭ WWW.EGUUR.MN НИЙТЭЛСЭН:2025/04/29     АМ.ДОЛЛАРЫН ХАНШ ТОГТВОРЖИЖ 3595 ТӨГРӨГ БАЙНА WWW.EGUUR.MN НИЙТЭЛСЭН:2025/04/29    

WhatsApp discovers 'targeted' surveillance attack www.bbc.com

Hackers were able to remotely install surveillance software on phones and other devices using a major vulnerability in messaging app WhatsApp, it has been confirmed.

WhatsApp, which is owned by Facebook, said the attack targeted a "select number" of users, and was orchestrated by "an advanced cyber actor".

A fix was rolled out on Friday.

The attack was developed by Israeli security firm NSO Group, according to a report in the Financial Times.

On Monday WhatsApp urged all of its 1.5bn users to update their apps as an added precaution.

The attack was first discovered earlier this month.

How was the security flaw used?
It involved attackers using WhatsApp's voice calling function to ring a target's device. Even if the call was not picked up, the surveillance software would be installed, and, the FT reported, the call would often disappear from the device's call log.

WhatsApp told the BBC its security team was the first to identify the flaw, and shared that information with human rights groups, selected security vendors and the US Department of Justice earlier this month.

"The attack has all the hallmarks of a private company reportedly that works with governments to deliver spyware that takes over the functions of mobile phone operating systems,” the company said on Monday in a briefing document note for journalists.

The firm also published an advisory to security specialists, in which it described the flaw as: "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.”

Who is behind the software?
The NSO Group is an Israeli company that has been referred to in the past as a "cyber arms dealer".

Its flagship software, Pegasus, has the ability to collect intimate data from a target device, including capturing data through the microphone and camera, and gathering location data.

In a statement, the group said: "NSO's technology is licensed to authorised government agencies for the sole purpose of fighting crime and terror.

"The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system.

"Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies. NSO would not or could not use its technology in its own right to target any person or organisation."

Who has been targeted?
WhatsApp said it was too early to know how many users had been affected by the vulnerability, although it added that suspected attacks were highly-targeted.

According to Facebook's latest figures, WhatsApp has around 1.5bn users worldwide.

Amnesty International, which said it had been targeted by tools created by the NSO Group in the past, said this attack was one human rights groups had long feared was possible.

"They're able to infect your phone without you actually taking an action," said Danna Ingleton, deputy programme director for Amnesty Tech. She said there was mounting evidence that the tools were being used by regimes to keep prominent activists and journalists under surveillance.

"There needs to be some accountability for this, it can't just continue to be a wild west, secretive industry."

On Tuesday, a Tel Aviv court will hear a petition led by Amnesty International that calls for Israel's Ministry of Defence to revoke the NSO Group's licence to export its products.



Published Date:2019-05-14