Who are the hackers who cracked the iPhone?
What do we know about a strange and secret group of the National Bureau of Statistics?
Very little – but after this week, an awful lot than we did before.
Group, a company based in Israel, but the American-owned,
specializing in the creation of what it calls the fight against crime and terrorism tools. But researchers in the field of security calls them something else: Cyber arms dealer.
On Thursday, it was to go to the National Bureau of Statistics group in the world headlines
after being credited with the creation of malware is capable of “tricks” iPhone with just one click of the screen,
and then install spy ring programs.
Brief: National Bureau of Statistics
Established in 2010, it had several different names
Based in Herzlia, Israel, and owned by US investment firm Francisco Partners
It may be helpful to $ 1BN
And found human security savvy rights lawyer Ahmed Mansour himself the target of the attack when he got the iPhone and promising message “secrets” about the torture happens in prisons in the United Arab Emirates.
He tapped on the link,
you may looted phone. Massive amounts of data: text messages, photos, emails and location data,
even what is being picked up by the microphone and camera device.
Fortunately, he did not. Instead, he passed on the message to the experts in the Citizen Lab Lookout, which peeled back the covers on what they described as a sophisticated cyber weapon discovered ever.
With it came the proof that it was the experience of the National Bureau of Statistics group at the heart of everything.
Great deals of money
Earlier this year, the United Kingdom launched based International Agency for International Privacy Energy Track World Trade cyber weapons database.
It was his intention to keep track of transactions between cyber weapons companies and governments.
Who are the hackers who cracked the iPhone?
The research was funded
by the likely range of elite intelligence unit 8200, a military-funded system of Israeli start-ups.
According to Forbes magazine,
the intelligence unit 8200 heavily involved in providing expertise and funding for online Stuxnet attack on Iran,
which was a joint operation
between the United States and Israel.
Included in the SSI has been multi-million transactions take place between the National Office of Statistics groups and government agencies in Mexico and Panama.
This is the tip of the iceberg – based press reports of sales on the leaks and anonymous sources,
and so there are likely many more well-known to the general public.
In 2015, the owners of the National Bureau of Statistics Group – the US-based venture capital firm Francisco Partners – were looking to sell the company worth about $ 1BN.
Has responded to requests from the BBC for further comment is not firm.
The National Bureau of Statistics group sells tools for governments is no secret – said in a statement issued in response to allegations that it was behind the attack on
Mr. Mansour, spokesman for the National Bureau of Statistics Group Zamir Dahbash: “The company sells only to government agencies adopted, and fully complies with stringent laws and regulations export control. ”
But the company has gone so far as to describe those who are their customers,
and exactly what they are buying. He did not say that he has no control on how to use the tools and for any purpose.
Whatever the origin of the National Bureau of Statistics Group,
The attack on Mr. Mansour, and that was working,
it would have used not one but three zero-day attacks.
To discover the one zero-day is rare, to find the three are outstanding.
The evidence came on the source of the attack when the experts looked at the messages received Mr. Mansour.
And included a link to a known field of Web to refer to servers developed by the Bureau of Statistics to its customers National Bureau Group.
When the researchers analyzed the spyware code,
but they noticed a clear reference to “Pegasus”, a specific name, by the National Bureau of Statistics group, to one of her spy products.
And it provided details about Pegasus year and last year,
when another company called cyber weapons, the team shredder, was in breach of the same extent. Material used for the marketing leaked Pegasus later.
When Apple was aware of the weaknesses of the iPhone,
they acted quickly, patching the problem in 10 days and pay out an update to all users.
And to neutralize this attack in particular, certainly, but there will likely be many more that remain hidden from view.
In a rare interview with Defense News, co-founder of the group National Bureau of Statistics, and Omri Lavi said, the attacks “Leave No Trace.”
Soon National Bureau of Statistics group will return the rest of the money spinning business cyber weapons back into the shadows.