Israeli spyware targeted Americans

NSO hijacked hundreds of smartphones via a security vulnerability in WhatsApp. (Tim Reckmann/Flickr)

An Israeli company enabled the hacking of American citizens’ phones – possibly including some belonging to government officials.

The NSO Group’s spy software used a security vulnerability in WhatsApp to hijack the phones of at least 1,400 people in the spring, a Reuters report revealed on Thursday.

The news agency spoke to sources familiar with an internal WhatsApp investigation into the breach.

The targets were spread across more than 20 countries, many of them US allies, Reuters reported.

Their sources stated that a “significant” number of the known victims were high-profile government and military officials.

Some of the victims are in the United States, the United Arab Emirates, Bahrain, Mexico, Pakistan and India, according to Reuters’ sources.

But the news agency stated it “could not verify whether the government officials were from those countries or elsewhere.”


WhatsApp – a smartphone messaging service owned by Facebook – first revealed the attack soon after it patched up the vulnerability in May.

The spyware, named Pegasus, is an incredibly sophisticated and dangerous cyberweapon which allows its operator to essentially hijack entire smartphones – not only WhatsApp.

A now-fixed security flaw in WhatsApp was the point of infection.

The spyware’s controllers can steal contact lists, passwords, text messages and listen in on phone calls.

Pegasus even gives snoopers the ability to switch on the phone’s camera and microphone, effectively turning it into a weapon against its owner.


It has been known for some years now that NSO Group and other Israeli cyberwarfare mercenaries have allowed and enabled the targeting of human rights defenders, journalists and politicians around the world.

But this latest report last week shows that Americans too are being targeted by whoever NSO is selling its multi-million-dollar software to.

WhatsApp filed a lawsuit in California last week against NSO, and the internal report seen by the Reuters sources is seemingly part of that case.

According to Canadian cyber security organization Citizen Lab, the breach involved “over 100 cases of abusive targeting of human rights defenders and journalists.”

Although NSO has in the past defended its actions claiming its products are meant to help only legitimate governments catch criminals and “terrorists,” the internal WhatsApp investigation reportedly shows that that is untrue.

“Prior to notifying victims,” Reuters reported, “WhatsApp checked the target list against existing law enforcement requests for information relating to criminal investigations, such as terrorism or child exploitation cases.”

According to Reuters’ sources, not a single one of those targeted was an alleged criminal or terrorist.

Similar to other internet firms, WhatsApp maintains an online portal through which government law enforcement agencies can request information on its users.




I've had firsthand experience with this Zionist effort. Back in August 2018, I was entering Palestine via Jordan for a social justice conference where I was scheduled to make a presentation. Of course, I had to go thru Israeli customs in order to get to Ramallah. To make a long story short, I was not allowed to enter because I was accused of being either a BDS sympathizer or supporter. During the 6.5 hour interrogation period, my iPhone was taken. I assumed that they had sophisticated software to get around the face ID and six digit passcode. They also had confiscated my iPad. They knew who I was and my more than 50 year history of antizionism (from my SNCC days thru the 1970 NY Times op-ed ad on AfroAmerican Intellectuals in Solidarity with Palestinians).

Needless to say, whatever info they gleaned from my phone and tablet is now part of the Israeli intelligence archive on all of their enemies. Let's be clear: the Israeli government has some of the most sophisticated encryption breaking software on the planet. And the US intelligence network is hooked into it. This means we have to be even more diligent about how we communicate and organize via the internet and all kinds of phones.

It also means that we have to be as intelligent software savvy as the Israelis and the US (and Gangsta Capitalist Russia!). I am confident that this is already happening and no one needs to go into specifics....

Asa Winstanley

Asa Winstanley's picture

Asa Winstanley is an investigative journalist who lives in London. He is an associate editor of The Electronic Intifada and co-host of our podcast.

He is author of the bestselling book Weaponising Anti-Semitism: How the Israel Lobby Brought Down Jeremy Corbyn (OR Books, 2023).