NSO Group, the Spyware Developer, Is Carving a Route Back into Trump’s America

In recent reports, connections between key figures linked to the NSO Group and former President Donald Trump have come to light, raising concerns about potential political and cybersecurity implications. Bryan Lanza, a partner at Mercury Public Affairs and a veteran ally of Trump, was involved in consulting for NSO Group between 2020 and 2021. His longstanding relationship with Trump may influence how NSO Group navigates the complex regulatory landscape surrounding cybersecurity, particularly as the company faces scrutiny following its placement on the U.S. Entity List.

Michael Flynn, Trump’s former national security adviser, reportedly received nearly $100,000 from NSO Group’s parent firms and was recently appointed by Trump to serve on a West Point advisory board. This connection underscores the intersection of cybersecurity interests and political influences, particularly in light of Flynn’s controversial role during his time in the Trump administration. Additionally, Jeff Miller, who has been instrumental in fundraising for Trump, received substantial financial support from an NSO-aligned entity, further entwining the lobbying efforts of the company with the former administration’s high-profile supporters.

Rod Rosenstein, former deputy attorney general under Trump, has been cited in various capacities involving NSO Group, including representing the company in a lawsuit. His history of involvement in significant Trump-related legal matters, such as justifying the firing of FBI Director James Comey, adds another layer of complexity to the narrative surrounding NSO Group’s operations and its potential influence within U.S. government realms.

As of early March, before Vogel Group registered as a lobbyist for NSO Group, there was little indication that the Trump administration planned to facilitate the removal of the company from the Entity List. This lack of movement on the regulatory front could limit NSO’s ability to operate within the cybersecurity framework in the United States, as expressed by Lavie, a spokesperson from the company. Lavie downplayed the severity of the Entity List designation, asserting that it primarily impacts American firms by necessitating permission for transactions involving technology sales.

From a lobbying perspective, NSO Group appears to be strategically targeting both the executive branch and Congress to enhance its influence over how laws regarding cybersecurity products are enforced. Engaging congressional members could provide indirect support in the lengthy administrative processes required for companies to be removed from the Entity List, which involves multiple governmental departments.

During the transition to the Biden administration, NSO Group’s outreach included numerous Republican senators and representatives, showcasing a clear intent to solidify its ties within political circles. The company’s efforts included sharing its annual transparency report with key security personnel in the new administration, thereby positioning itself as a knowledgeable entity in the ongoing cybersecurity discussions.

The implications of NSO Group’s connections to high-profile political allies pose significant questions about accountability and regulatory governance in the cybersecurity domain. The incorporation of tactics from the MITRE ATT&CK framework, such as initial access and persistence, could elucidate the methods employed throughout NSO’s lobbying efforts. Understanding adversary tactics will be crucial for businesses aiming to safeguard against potential repercussions arising from these evolving dynamics in political and cybersecurity landscapes.

As the situation develops, the intersection of cybersecurity and political affiliations will likely remain a focal point for business leaders concerned about risks in an increasingly interconnected landscape. Awareness and proactive measures will be essential as organizations navigate the challenges posed by lobbying practices and regulatory compliance in this area.

Source