Jeff Bezos Allegations Put Phone Hacking Tech in the Spotlight

Here is how smartphones can be hijacked and a look at the potential consequences.

Advertisement
By Reuters | Updated: 25 January 2020 11:13 IST
Highlights
  • Smartphone apps often carry potential flaws
  • It is virtually impossible to guarantee total security
  • NSO and other spyware vendors are found to help hackers

Smartphones are effectively pocket-sized computers that have enabled various potential security problems

Allegations that Amazon.com boss and Washington Post owner Jeff Bezos had his phone hacked by Saudi Crown Prince Mohammed bin Salman have put a spotlight on the security of smartphones and the secretive tools used to hack them.

Smartphones are effectively pocket-sized computers that run apps on operating systems such as Apple's iOS or Google's Android. Those devices have enabled a new world of connectivity - unlimited free calls over WhatsApp, for example, or an atlas worth of up-to-the-second maps from Google - but also a parade of potential security problems.

Advertisement

Here is how smartphones can be hijacked and a look at the potential consequences and the thriving market in surveillance vendors helping the world's spies get access to people's secrets.

How it works
Smartphones operate through a collection of apps, sometimes scores of them, running over an operating system, which in turn runs on a complex piece of hardware embedded with receptors, lenses, and sensors.

Advertisement

Each one carries potential flaws - sometimes called bugs - that can cause a system to crash or behave unexpectedly when sent a rogue command or a malicious file. Even small openings like that can allow hackers to take control of a device. It is akin to illicitly lowering a coat hanger through a tiny seam in the car door to unlock a vehicle.

Many developers work hard to ensure those seams stay sealed, but with millions of lines of code to choose from, it is virtually impossible to guarantee total safety.

Advertisement

"There is no software that is bugless," said Oded Vanunu, a researcher with Israeli cybersecurity firm Checkpoint who often finds flaws in popular messaging programs.

Once hackers are in, the possibilities are vast - and frightening. Anyone with full control of a smartphone can turn it into a powerful surveillance device, silently tracking users' locations while quietly copying their emails, instant messages, photos and more.

Advertisement

A 2015 technical document from NSO Group - one of the better known spyware vendors - outlines the capability of its Pegasus spyware programme to monitor the smallest details of a target's life, throwing up alerts if a target enters a certain area, for example, or if two targets meet, or if a certain phone number is called.

The document, made public as part of a lawsuit against NSO by communications firm WhatsApp, shows how keystrokes can be logged, phone calls can be intercepted and a feature dubbed "room tap" uses a phone's microphone to soak up ambient sound wherever the device happens to be.

The document says the spyware can be installed by enticing targets to click malicious links or rogue text messages, but spies particularly prize the quieter "push message" installations that remotely and invisibly install themselves on users' phones.

Who it targets
NSO and other spyware vendors have long argued that their products are used responsibly - only sold to governments for legitimate purposes. NSO has denied any link to the alleged Bezos hack. Saudi officials dismiss allegations of their involvement as absurd.

Years of investigative work from Internet watchdog group Citizen Lab - which has a well-documented record of exposing international cyber espionage campaigns - and a drumbeat of court cases and leaked documents have called such assertions as these of responsible use into question.

In October of last year messaging company WhatsApp sued NSO in California, alleging that the spyware firm had taken advantage of a bug in the app's video calling protocol to hack 1,400 users around the world in the period between April 29 and May 10, 2019, alone.

Disclosures from other companies such as Italy's now-defunct Hacking Team and the spyware company now known as FinSpy have also raised questions about the business. Hacking Team's spyware was implicated in spying campaigns against dissidents in Ethiopia and the Middle East, for example, while researchers have recently found evidence that FinSpy's software was used in Turkey.

Both companies' tools work similarly to NSO's — using flaws in smartphones to subvert the devices entirely.

© Thomson Reuters 2020

 
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. YouTube's 'Ask YouTube' AI Chatbot Offers Smart Replies With Videos, Shorts
  2. Best Party Speakers in India for Home and Outdoor Use
  3. AirDrop via Quick Share Expands to These Two Smartphone Brands
  4. 'Consumers Pay for the Value You Bring to Them': Take-Two on GTA 6 Price
  1. AirDrop via Quick Share Reportedly Expands to Oppo Find X9 Ultra, Vivo X300 Ultra
  2. OpenAI, Amazon Announce Multi-Year Strategic Partnership as Microsoft’s Exclusive Deal Ends
  3. US Judge Rejects Former FTX CEO Sam Bankman-Fried’s Bid for New Trial
  4. Valve Says It's 'Hard at Work' on Steam Deck 2
  5. OnePlus Nord CE 6, Nord CE 6 Lite Availability Details Announced Ahead of May 7 Launch Date
  6. Smartphone Buyers in India Prioritise AI and Real-World Usage, Flipkart Report Shows
  7. Google Pixel 11 Series’ Tensor G6 Chipset Could Be Significantly Faster Than Last Year’s Tensor G5 SoC, Leak Suggests
  8. Oppo Reno 16 Pro Key Specifications Leaked; Tipped to Launch in H2 2026
  9. Samsung Galaxy S27 Tipped to Arrive With Redesigned Camera Layout to Accomodate Qi2 Magnetic Charging
  10. Anthropic’s Claude Can Now Complete Creative Tasks in Adobe, Blender and Autodesk
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.