Hack the company selling Israeli smartphone hack tools, hackers get the bitter end
NSO Group is an Israeli company, specializing in selling iPhone and Android device hacking tools. But recently, the company has been attacked by one of its employees, stealing many valuable intellectual property and bringing hackers and hackers for sale on the black web.
NSO Group is an Israeli company, specializing in selling iPhone and Android device hacking tools. But recently, the company has been attacked by one of its employees, stealing many valuable intellectual property and bringing hackers and hackers for sale on the black web.
How is NSO hacked?
A 38-year-old programmer stole the smartphone hack tools of the company he is working with, NSO. He turned off the security software on his computer and then copied the source code of the smartphone hack tools developed by the NSO Group into USB.
Next, he accessed the black web, declared himself a hacker, successfully broke into NSO's servers and stole the company's software. He sold stolen code for $ 50 million.
But one of his clients reported the incident to the Israeli Ministry of Justice. Not long after, this programmer was arrested. All the hacking tools that he stole were recovered, all customer data and information were safe.
Unfortunately for the former employee, the Israeli army also uses the NSO Group's hacking tools, so in addition to other charges he is accused of damaging national security.
See more:
- It's time to change the definition of hackers
- Warning: Dangerous security holes in Wordpress platform, hackers can take advantage to take control of the website
- The $ 5 million supercar is capable of hacking iPhone and Android smartphones from a distance of 500 meters
- Test knowledge about hacking
You should read it
- Basic hacking techniques - Part II
- Legal hacking tools can be useful for journalists
- Basic hacking techniques - Attendance - Part III
- What is hardware hacking? Is it worrisome?
- Spreading hacking tools helps Windows 7 still get updates even after Microsoft has stopped supporting
- Basic Hack Techniques - Part I
- 8 best Wifi analysis and hacking software
- Learn about Ethical hacking using Kali Linux and Raspberry Pi
- Growth Hacking growth strategy - Part 1
- Instagram account of a series of famous stars hacked and used as a means of fraud
- The method of Crack Passwords
- 8 collaboration tools need not register, use immediately after 10 seconds
Maybe you are interested
How to schedule posting to Fanpage on Facebook How to censor, block comments, unblock comments on Facebook Fanpage The simple way to retrieve deleted Facebook Fanpage 21 inspirational quotes from Lizzie Velasquez 'the ugliest girl in the world' and evidence for a true beauty Signs that you have chosen the right working environment Decipher the mystery behind the 'water bottle flipping' trick that is causing the world 'storm'