NSO seeks to overturn WhatsApp case, saying it is ‘catastrophic’ for the spyware maker

The NSO Group on Wednesday filed an appeal aimed at overturning a judge’s ruling that it must stop targeting the WhatsApp platform with its spyware.

On October 17, Northern California federal judge Phyllis Hamilton issued the order, determining that NSO improperly leveraged WhatsApp infrastructure to target 1,400 of the Meta-owned messaging platform’s users with its zero-click Pegasus spyware. 

In a court filing ahead of the ruling, NSO told the judge that blocking it from targeting WhatsApp infrastructure to implant its spyware could “put NSO’s entire enterprise at risk” and “force NSO out of business.” 

In a motion to stay the order pending the outcome of the appeal, the NSO Group again focused on the “catastrophic” damage the permanent injunction will do its business, saying that if the ruling isn’t stayed NSO will “suffer irreparable, potentially existential injuries.”

NSO said that the permanent injunction goes against the public interest because it disrupts numerous law enforcement, intelligence and counterterrorism operations.

The spyware manufacturer also argued that the judge misstated how Pegasus works and incorrectly applied the Computer Fraud and Abuse Act (CFAA) by wrongly interpreting the mechanism through which it harnessed WhatsApp for its targeting.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

New Android malware can capture private messages, researchers warn

Next Post

Salesforce cuts off access to third-party app after discovering ‘unusual activity’

Related Posts

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the "invalid cast vulnerability" SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely to be
Read More

MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign

The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The cyber espionage activity targeted users in Turkey, Israel, and Azerbaijan, according to a report from Fortinet FortiGuard Labs. "This malware enables remote control of compromised systems by allowing
Read More

The State of AI in the SOC 2025 – Insights from Recent Study 

Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can
Read More