NSO seeks to overturn WhatsApp case, saying it is ‘catastrophic’ for the spyware maker

The NSO Group on Wednesday filed an appeal aimed at overturning a judge’s ruling that it must stop targeting the WhatsApp platform with its spyware.

On October 17, Northern California federal judge Phyllis Hamilton issued the order, determining that NSO improperly leveraged WhatsApp infrastructure to target 1,400 of the Meta-owned messaging platform’s users with its zero-click Pegasus spyware. 

In a court filing ahead of the ruling, NSO told the judge that blocking it from targeting WhatsApp infrastructure to implant its spyware could “put NSO’s entire enterprise at risk” and “force NSO out of business.” 

In a motion to stay the order pending the outcome of the appeal, the NSO Group again focused on the “catastrophic” damage the permanent injunction will do its business, saying that if the ruling isn’t stayed NSO will “suffer irreparable, potentially existential injuries.”

NSO said that the permanent injunction goes against the public interest because it disrupts numerous law enforcement, intelligence and counterterrorism operations.

The spyware manufacturer also argued that the judge misstated how Pegasus works and incorrectly applied the Computer Fraud and Abuse Act (CFAA) by wrongly interpreting the mechanism through which it harnessed WhatsApp for its targeting.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

New Android malware can capture private messages, researchers warn

Next Post

Salesforce cuts off access to third-party app after discovering ‘unusual activity’

Related Posts

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. "It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of Firefox, said. "You can also review and manage individual AI features if you choose to use them. This
Read More

IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass

IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The vulnerability, tracked as CVE-2025-13915, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. It has been described as an authentication bypass flaw. "IBM API Connect could allow a remote attacker to bypass authentication mechanisms and gain
Read More

APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. "The campaign relies on basic tooling and the exploitation of legitimate services
Read More