Top Qs
Timeline
Chat
Perspective

WhatsApp snooping scandal

2019 scandal From Wikipedia, the free encyclopedia

Remove ads
Remove ads

On October 30, 2019, WhatsApp's parent company Facebook, Inc. confirmed that Pegasus, a sophisticated snooping software developed by Israel's NSO Group, was used to target Indian journalists, activists, lawyers and senior government officials. The journalists and activists are believed to have been targets of surveillance for a two-week period until May, when the Indian national election was held.[1][2]

The snooping scandal came out after WhatsApp filed a case in California's Northern District federal court against the NSO group, alleging the NSO group had developed the software used to infect 1,400 target devices with malware.[3]

The IT Ministry of India sought a detailed response from WhatsApp on the issue.[4] They responded that they had alerted the government on two occasions—once in May and for the second time in September 2019.[5][6][7] In response to Indian Government's order, WhatsApp informed the Computer Emergency Response Team of India in May and September that Pegasus spyware affected Indian WhatsApp users.[8]

Indian National Congress party alleged that the Narendra Modi-led government has been caught snooping on journalists, activists, lawyers and senior government officials.[9] They later alleged that their leaders, including general secretary Priyanka Gandhi, are also being targeted by this. They also claimed WhatsApp sent messages to different people whose phones were hacked. One such message was also received from the WhatsApp of Priyanka Gandhi a few months ago.[10]

Former Chief Financial officer of Infosys Mr. T.V. Mohandas Pai also demanded government to probe on the scandal and to come out with a report before the public.[11]

Remove ads

Broader context of Pegasus spyware usage

The WhatsApp incident was part of a larger pattern of Pegasus spyware abuse. Investigations by the Pegasus Project (2021) revealed that governments worldwide used the malware to target journalists, activists, and politicians, including associates of murdered Saudi journalist Jamal Khashoggi and staff of French President Emmanuel Macron.[12]

Technical details

The attack exploited CVE-2019-3568, a zero-click exploit vulnerability in WhatsApp's VoIP stack. The exploit allowed installation of Pegasus spyware without any user interaction.[13] WhatsApp patched the vulnerability through server-side fixes and client updates in May 2019.

Beyond lawsuits in the U.S. and India, the scandal prompted regulatory scrutiny in the European Union, where lawmakers questioned NSO Group's compliance with GDPR requirements.[14] The Israeli government subsequently tightened oversight of cyberweapon exports.

NSO Group's response

NSO Group maintained that Pegasus was licensed exclusively to governments for counterterrorism purposes. The company stated it had no visibility into how clients used the software, though this claim was disputed by researchers.[15]

Impact on WhatsApp

Following the disclosure, many users migrated to alternative messaging platforms like Signal and Telegram.[16] WhatsApp responded by enhancing its security communications and emphasizing its commitment to end-to-end encryption.

See also

References

Loading content...

Further reading

Loading content...
Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads