2/ Apple's lawsuit, filed moments ago in Northern California hits NSO hard.
- Seeks to hold NSO & parent accountable for abuses
- ALSO Requests permanent injunction banning NSO from using Apple products.
Directly hits NSO's core development & biz activities.
3/ NSO poked the hornet's nest for years, and @Apple wasn't satisfied with simply suing the spyware company..
Apple just pledged millions to groups working cyber surveillance... plus any damages that they extract from NSO.
Apple's wrath is poetic.
4/ Notifying NSO victims is another major step.
After @WhatsApp, Apple is the 2nd major company to do so.
✅Helps victims recognize what's going on
✅puts NSO's government customer base on notice: their abuses might be exposed next.
5/ NSO's accelerating tailspin, current status...
In recent weeks:
✅US🇺🇸 sanctioned NSO
✅ Court ruled that @WhatsApp's lawsuit against them could go ahead
✅ Reports that NSO is headed towards possible default.
Now, a massive lawsuit from Apple.
6/ NSO's profitable spyware is predictably used for repression by many dictators.
This didn't scare off unscrupulous investors.
Other spyware companies are now chasing their lead..
Now, NSO's *crisis* sends a different signal: your fortunes could come crashing down.
7/ NSO's spyware doesn't just harm human rights.
It hurts tech companies.
After years of spending efforts on technical means of control (e.g. patching & securing their products), big platforms have decided it was time to punch back in a different way:
In court.
8/ I see @Apple's lawsuit as partly triggered by findings & efforts of so many of our @citizenlab peers:
Most importantly though: the victims that bravely came forwards. Here's why...
9/ The FORCEDENTRY zero-click exploit is prominently mentioned @apple's lawsuit.
It was discovered when a spyware victim let us check their phone.
This is as it should be: targets of dictatorial surveillance contributing to fighting back & helping protect us all.
10/ Immediate effects of @Apple filing suit against NSO:
✅ NSO an even more radioactive investment.
✅ Investors that stuck with NSO look not only amoral, but foolish.
✅ Scares off risk-averse government customers.
✅ Chilling effect on spyware industry.
11/ It would take a huge internal effort for a massive company to undertake any one of these:
✔Lawsuit
✔Victim Notification
✔Attribution
✔Civil society support.
12/ Addendum to tweet #4: @billyleonard at TAG reminds me that @Google / @android should also be on the list of companies that have notified NSO victims in the past.
2/ Companies like Paragon (founded in Israel, former Israeli intelligence ppl, recently sold to a US owner) make hacking American technology companies their business model.
And then selling these capabilities to foreign governments.
How can this be?
3/ Honestly it is astonishing that a company that works tirelessly to hack & undermine the security of American products is now US-owned.
The missing factor: building contracts with the US government & lobbying.
The goal of these contracts, I believe, isn't just profit. It's getting protection & building government dependency on their technology.
Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
2/ First, a mercenary spyware myth has just been busted.
Because the leak shows an Intellexa employee directly accessing a customer deployment.
Prior to the #PredatorFiles leak, spyware companies basically always claimed they couldn't access customer deployments & didn't know what was going on there.
They used this to avoid responsibility & claim ignorance when faced with abuses.
3/ And it gets crazier. The leak shows Intellexa casually accessing a core backbone of Predator deployment of a government customer.
Seemingly without the gov's knowledge.
Suggests that Intellexa can look over their shoulder & watch their sensitive targeting.
NEW: 🇨🇳Chinese hackers ran massive campaign by tricking Claude's agentic AI.
Vibe hacking ran 80-90% of the operation without humans.
Massive scale (1000s of reqs/sec).
Agents ran complex multi-step tasks, shepherded by a human.
Long predicted. Welcome to the new world.
Fascinating report by @AnthropicAI 1/
2/ The old cybersecurity pitch: unpatched systems are the threat.
The next generation concern might be unpatched cognition.
The attacker jailbroke the cognitive layer of @anthropic's Claude code, successfully convincing the system of false intent (that it was a security exercise)
3/ One of the key points in @AnthropicAI's report is just how limited the human time required was to run such a large automated campaign.
Obviously powerful stuff, highlighting the impact of orchestration.
And concerning for the #cybersecurity world for all sorts of reasons, ranging from attack scale, adaptability & cost reductions...