stealing phone tools from the company, including the group's electronic technology, software, Sensitive gadgets and trying to sell them for $ 50 million on the dark web.
The NSO group spearheaded the development of spyware targeting iPhones in 2016, making it vulnerable to government-sponsored attacks. In a report published by Citizen Labs and Lookout Security, spyware was caught on coordinators and activists, including Ahmed Mansour, Human Rights in the United Arab Emirates.
Last year, the spy version of Android Pegasu was found to be unwanted users with sophisticated and sophisticated features. It can be controlled by SMS and has self destructive capabilities. It can also get more comms data. And valuable data from Gmail, Facebook, Skype, Twitter, and others. In addition, it can control the device's camera and microphone and perform key encryption and can also capture screen shots.
According to the court, this programmer was able to fully access the sensitive data and used it to download sensitive tools on an external drive that was later found under his bed. When the data were downloaded, the thief steered to the dark Web markets where he planned to sell the deal in exchange for encrypted currencies that would avoid authorities tracking his location or the date of his transactions. He was offered a potential buyer and pretended to be a hacker who stole data from the NSO group.
However, the potential buyer suspected of wrongdoing reported the incident to the company and the group contacted the police on July 5 and the suspect was immediately arrested by Lahav 433, the Serious Crimes Unit. According to reports, the suspect failed to sell the stolen data. In that the group could have collapsed.
"The accused committed these crimes out of greed, despite his knowledge, even if he closed his eyes to her vision, and that his crimes could harm the security of the state and lead to the collapse of a company employing 500 workers
----------
By Imre Messinaisa