US Court Finds NSO Group Breached Hacking Laws with Pegasus Spyware
In a significant legal decision, a U.S. federal judge ruled that the Israeli spyware manufacturer, NSO Group, violated American hacking laws by exploiting vulnerabilities in WhatsApp’s software. This ruling emerged from a lawsuit initiated by WhatsApp, a subsidiary of Meta Platforms, which accused NSO Group of deploying its notorious Pegasus spyware on over 1,400 devices through zero-click attacks that took advantage of zero-day vulnerabilities. The court concluded that these actions constituted breaches of the Computer Fraud and Abuse Act and California’s Computer Data Access and Fraud Act.
The implications of this ruling extend beyond the courtroom and into the realm of privacy rights. WhatsApp’s leadership heralded the judgment as a substantial victory for privacy advocates. It highlights growing concerns over the use of sophisticated spy tools that can infiltrate personal devices without the knowledge or consent of their owners.
Meanwhile, in a separate incident, Japan Airlines was targeted by a cyberattack on December 26, 2024, causing significant disruptions to domestic flights. The attack, believed to be a distributed denial of service (DDoS) incident, led to delays of more than 30 minutes for 24 flights as the airline’s network was overwhelmed. Although the attack affected ticket sales and internal operations, Japan Airlines confirmed that it did not compromise flight safety or leak customer data, with systems restored swiftly to normal operation. This event occurred at a particularly inconvenient time, coinciding with the busy year-end holiday travel season, which left many passengers anxious and stranded at Tokyo’s Haneda Airport.
Shifting focus to Europe, the European Space Agency’s online merchandise store suffered a cyber intrusion that resulted in the compromise of customer payment information. Attackers employed malicious JavaScript to craft counterfeit payment pages during the checkout process, deceiving users into entering their payment details. The e-commerce security firm Sansec uncovered the breach, which used an exfiltration domain designed to resemble the legitimate ESA store, raising alarms about potential risks not only for customers but for ESA employees due to the website’s integration with ESA systems.
In another significant development, the Federal Trade Commission finalized an order mandating that Marriott International and its subsidiary, Starwood Hotels, enhance their data security protocols. This order follows a series of breaches that exposed the personal information of 344 million customers, including sensitive data from a breach of Starwood’s database. As part of the settlement, Marriott is required to implement a comprehensive security program that includes encryption measures, limited data retention practices, and enhanced monitoring and auditing protocols. This directive aims to prevent future incidents, reflecting the heightened regulatory scrutiny on corporate data protections in the wake of repeated breaches.
Lastly, Apache Software Foundation has issued an urgent update to mitigate a critical SQL injection vulnerability present in its Traffic Control software. The vulnerability, rated with a CVSS score of nine, enables users with administrative roles to execute arbitrary SQL commands, which poses significant security risks for organizations relying on the software to manage scalable content delivery networks. Users are advised to upgrade promptly to the latest version to mitigate these vulnerabilities.
These incidents, ranging from high-profile legal judgments to operational disruptions and data breaches, underscore the growing risks organizations face in today’s cyber landscape. As the threats evolve, compliance with emerging regulatory frameworks and the adoption of robust cybersecurity measures have never been more critical for protecting sensitive information and securing organizational assets from malicious actors. Businesses must understand the tactics and techniques outlined in the MITRE ATT&CK framework, which revolves around tactics such as initial access, persistence, and privilege escalation, as they enhance their defensive postures against increasingly sophisticated cyber threats.