How a Software Glitch in an Activist’s iPhone Exposed NSO Group and Hacking Around the World

An unusual error in NSO’s spyware allowed Saudi women’s rights activist Loujain al-Hathloul to discover a trove of evidence.

Advertisement
By Reuters | Updated: 19 February 2022 12:21 IST
Highlights
  • Al-Hathloul is one of Saudi Arabia’s most prominent activists
  • The discovery amounted to a hacking blueprint
  • NSO spokesperson said it does not operate the hacking tools it sells

Citizen Lab and al-Hathloul’s find provided the basis for Apple’s November 2021 lawsuit against NSO

A single activist helped turn the tide against NSO Group, one of the world's most sophisticated spyware companies now facing a cascade of legal action and scrutiny in Washington over damaging new allegations that its software was used to hack government officials and dissidents around the world.

It all started with a software glitch on her iPhone.

An unusual error in NSO's spyware allowed Saudi women's rights activist Loujain al-Hathloul and privacy researchers to discover a trove of evidence suggesting the Israeli spyware maker had helped hack her iPhone, according to six people involved in the incident. A mysterious fake image file within her phone, mistakenly left behind by the spyware, tipped off security researchers.

Advertisement

The discovery on al-Hathloul's phone last year ignited a storm of legal and government action that has put NSO on the defensive. How the hack was initially uncovered is reported here for the first time.

Advertisement

Al-Hathloul, one of Saudi Arabia's most prominent activists, is known for helping lead a campaign to end the ban on women drivers in Saudi Arabia. She was released from jail in February 2021 on charges of harming national security.

Soon after her release from jail, the activist received an email from Google warning her that state-backed hackers had tried to penetrate her Gmail account. Fearful that her iPhone had been hacked as well, al-Hathloul contacted the Canadian privacy rights group Citizen Lab and asked them to probe her device for evidence, three people close to al-Hathloul told Reuters.

Advertisement

After six months of digging through her iPhone records, Citizen Lab researcher Bill Marczak made what he described as an unprecedented discovery: a malfunction in the surveillance software implanted on her phone had left a copy of the malicious image file, rather than deleting itself, after stealing the messages of its target.

He said the finding, computer code left by the attack, provided direct evidence NSO built the espionage tool.

Advertisement

“It was a game changer,” said Marczak “We caught something that the company thought was uncatchable.”

The discovery amounted to a hacking blueprint and led Apple to notify thousands of other state-backed hacking victims around the world, according to four people with direct knowledge of the incident.

Citizen Lab and al-Hathloul's find provided the basis for Apple's November 2021 lawsuit against NSO and it also reverberated in Washington, where US officials learned that NSO's cyberweapon was used to spy on American diplomats.

In recent years, the spyware industry has enjoyed explosive growth as governments around the world buy phone hacking software that allows the kind of digital surveillance once the purview of just a few elite intelligence agencies.

Over the past year, a series of revelations from journalists and activists, including the international journalism collaboration Pegasus Project, has tied the spyware industry to human rights violations, fueling greater scrutiny of NSO and its peers.

But security researchers say the al-Hathloul discovery was the first to provide a blueprint of a powerful new form of cyberespionage, a hacking tool that penetrates devices without any interaction from the user, providing the most concrete evidence to date of the scope of the weapon.

In a statement, an NSO spokesperson said the company does not operate the hacking tools it sells – “government, law enforcement and intelligence agencies do.” The spokesperson did not answer questions on whether its software was used to target al-Hathloul or other activists.

But the spokesperson said the organisations making those claims were “political opponents of cyber intelligence,” and suggested some of the allegations were “contractually and technologically impossible.” The spokesperson declined to provide specifics, citing client confidentiality agreements.

Without elaborating on specifics, the company said it had an established procedure to investigate alleged misuse of its products and had cut off clients over human rights issues.

Discovering the blueprint

Al-Hathloul had good reason to be suspicious — it was not the first time she was being watched.

A 2019 Reuters investigation revealed that she was targeted in 2017 by a team of US mercenaries who surveilled dissidents on behalf of the United Arab Emirates under a secret program called Project Raven, which categorised her as a “national security threat” and hacked into her iPhone.

She was arrested and jailed in Saudi Arabia for almost three years, where her family says she was tortured and interrogated utilizing information stolen from her device. Al-Hathloul was released in February 2021 and is currently banned from leaving the country.

Reuters has no evidence NSO was involved in that earlier hack.

Al-Hathloul's experience of surveillance and imprisonment made her determined to gather evidence that could be used against those who wield these tools, said her sister Lina al-Hathloul. “She feels she has a responsibility to continue this fight because she knows she can change things.”

The type of spyware Citizen Lab discovered on al-Hathloul's iPhone is known as a “zero click,” meaning the user can be infected without ever clicking on a malicious link.

Zero-click malware usually deletes itself upon infecting a user, leaving researchers and tech companies without a sample of the weapon to study. That can make gathering hard evidence of iPhone hacks almost impossible, security researchers say.

But this time was different.

The software glitch left a copy of the spyware hidden on al-Hathloul's iPhone, allowing Marczak and his team to obtain a virtual blueprint of the attack and evidence of who had built it.

“Here we had the shell casing from the crime scene,” he said.

Marczak and his team found that the spyware worked in part by sending picture files to al-Hathloul through an invisible text message.

The image files tricked the iPhone into giving access to its entire memory, bypassing security and allowing the installation of spyware that would steal a user's messages.

The Citizen Lab discovery provided solid evidence the cyberweapon was built by NSO, said Marczak, whose analysis was confirmed by researchers from Amnesty International and Apple, according to three people with direct knowledge of the situation.

The spyware found on al-Hathloul's device contained code that showed it was communicating with servers Citizen Lab previously identified as controlled by NSO, Marczak said. Citizen Lab named this new iPhone hacking method "ForcedEntry." The researchers then provided the sample to Apple last September.

Having a blueprint of the attack in hand allowed Apple to fix the critical vulnerability and led them to notify thousands of other iPhone users who were targeted by NSO software, warning them they had been targeted by “state-sponsored attackers.”

It was the first time Apple had taken this step.

While Apple determined the vast majority were targeted through NSO's tool, security researchers also discovered spy software from a second Israeli vendor QuaDream leveraged the same iPhone vulnerability, Reuters reported earlier this month. QuaDream has not responded to repeated requests for comment.

The victims ranged from dissidents critical of Thailand's government to human rights activists in El Salvador.

Citing the findings obtained from al-Hathloul's phone, Apple sued NSO in November in federal court alleging the spyware maker had violated US laws by building products designed “to target, attack, and harm Apple users, Apple products, and Apple.” Apple credited Citizen Lab with providing "technical information" used as evidence for the lawsuit, but did not reveal that it was originally obtained from al-Hathloul's iPhone.

NSO said its tools have assisted law enforcement and have saved "thousands of lives." The company said some of the allegations attributed to NSO software were not credible, but declined to elaborate on specific claims citing confidentiality agreements with its clients.

Among those Apple warned were at least nine US State Department employees in Uganda who were targeted with NSO software, according to people familiar with the matter, igniting a fresh wave of criticism against the company in Washington.

In November, the US Commerce Department placed NSO on a trade blacklist, restricting American companies from selling the Israeli firm software products, threatening its supply chain.

The Commerce Department said the action was based on evidence that NSO's spyware was used to target “journalists, businesspeople, activists, academics, and embassy workers.”

In December, Democratic Senator Ron Wyden and 17 other lawmakers called for the Treasury Department to sanction NSO Group and three other foreign surveillance companies they say helped authoritarian governments commit human rights abuses.

“When the public saw you had US government figures getting hacked, that quite clearly moved the needle,” Wyden told Reuters in an interview, referring to the targeting of US officials in Uganda.

Lina al-Hathloul, Loujain's sister, said the financial blows to NSO might be the only thing that can deter the spyware industry. “It hit them where it hurts,” she said.

© Thomson Reuters 2022


Can Realme 9 Pro and 9 Pro+ win their respective segments? We discuss this on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo Y31 Series With 6,500mAh Battery Launched in India: See Price
  2. Samsung Begins Rolling Out One UI 8 Update to the Galaxy S25 Series
  3. Flipkart Big Billion Days Sale: Discounts on Motorola Phones Announced
  4. iOS 26 Update Brings These New Features to AirPods Pro 3, Pro 2, AirPods 4
  5. Samsung Galaxy S25 FE With 50-Megapixel Camera Launched in India: See Price
  6. Check What's New for Your iPhone in Apple's Latest iOS 26 Update
  7. Vivo V60e 5G Design, Price Leaked; May Use Same Chip as Vivo V50e
  8. iQOO 15 Live Image Leaked; Company Reveals Display Details
  9. Oppo F31 Pro+ 5G Review
  10. GTA 6 Will Be the 'Largest Game Launch in History', Says Rockstar Games
  1. Xiaomi 17 Pro Design Render Gives Us a Good Look at Its Leica-Branded Rear Cameras, Secondary Display
  2. Clair Obscur: Expedition 33 Has Sold 4.4 Million Copies in Less Than Six Months of Launch
  3. Materialists Now Streaming on Netflix: What You Need to Know About Dakota Johnson’s Starrer Movie
  4. The Trial Season 2 OTT Release Date: When and Where to Watch Kajol’s Legal Drama Series Online
  5. Ghaati OTT Release Reportedly Revealed Online: When and Where to Watch Anushka Shetty-Starrer Movie Online?
  6. American Express Launches NFT Passport Stamps to Commemorate Travel Memories
  7. Huawei Watch GT 6, GT 6 Pro Price, Specifications Leak Ahead of September 19 Launch: Report
  8. iPhone 17 Pro Max in Cosmic Orange Colourway Reportedly Out of Stock in the US, India
  9. Samsung Galaxy Tab A11, Galaxy Tab A11+ Leaked Renders Hint at Design, Specifications
  10. Apple Adds New and Upgraded Apple Intelligence Features for iPhone, iPad and Mac Devices
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.