Hack Pegasus iPhone NSO is a sophisticated group repeatedly creating headlines this year. Security researchers found that attackers could hack iPhone without user knowledge. Google researchers then describe a 0 day hack as one of the most sophisticated attacks of all time. Following security reports, Apple patches vulnerabilities and began to notify the hacked iphone owner. Also, Apple sued the same Israeli Cybersecurity company as the US government placed it on a list of famous entities. Do not do business with US technology companies, NSO is in serious trouble. May face potential destruction and additional legal implications. And it turned out that the problem of Pegasus NSO began in the most unexpected way: a small agreement in the African country.

The report revealed that the totalitarian government used Pegasus NSO to attack funders, journalists, and potential political enemies. Pegasus exploits vulnerabilities that allow attackers to send malicious iMessage to iPhone users. The victim’s telephone will not make a sound, and the target will not see the notification. There will be no message to read or interact at all.

Just like that, the hackers can spy on the iPhone target thanks to a very sophisticated NSO attack that collects a lot of attention in recent months.

A new report from the Financial Times focuses on a group NSO agreement that might rotate in the current scandal that threatens the company’s future.

Pegasus sales tones that might damage NSO

According to the report, NSO throws Pegasus to the son of President Uganda in February 2019, asking Lieutenant General Muhoozi Kainquaraba if he wants to hack the phone in the world secretly. The answer is apparently. The two parties signed an agreement between $ 10 million and $ 20 million, only representing a small portion of the company’s income. Estimates say that NSO produces $ 243 million in 2020.

Two years after NSO Pegasus dealing with the Ugandan government, someone in the region tried to hack the cellphone of 11 American diplomats, report notes. This is an iPhone user placed at the US Embassy in Uganda.

Although it is not clear whether the hackers or Uganda striker from neighboring Rwanda tried to attack the US iPhone in Uganda, this might trigger the sequence of events that ultimately lead to problems related to Pegasus NSO.

The company reportedly instructed its customers not to attack our telephone numbers so the US government would not take action. But 11 targets in Embassy Uganda use local telephone numbers combined with Apple IDs that use the state department’s e-mail.

The Times noted that the parties involved in this activity have not confirmed this finding. NSO was investigating Pegasus’s attack in Uganda, and it was no longer doing business in Africa. The Uganda government does not comment on this problem. Israeli and the US officials also refused to confirm that Pegasus’s attack on Uganda triggered the NSO black list eventually.

More problems might follow

The problem of Pegasus NSO is far from being completed. After the prohibition, the company cannot buy highly needed technology equipment from US companies. Furthermore, NSO may not finance previous loans, because of losing a business for rivals. Employing a promising hacker might be another problem after the Pegasus disaster.

In addition, the report notes that existing NSO employees “live” in Israel to avoid questions from the US and its allies. In addition, 18 US senators wanted to give NSO sanctions under the Magnitsky Act. If that happens, NSO will not be able to deal with the US banking system. His employees will be prohibited from traveling to the US.