+0.41 WhatsApp voice calls were used to inject spyware on phones (www.ft.com S:+0.22 )
939 points by EwanToo 2482 days ago | 283 comments on HN | Moderate positive Editorial · v3.7 · 2026-02-28 09:17:13
Summary Privacy & Surveillance Advocates
This Financial Times investigative article documents a WhatsApp vulnerability enabling Israeli spyware company NSO Group to inject Pegasus surveillance onto thousands of phones, with particular targeting of human rights lawyers, journalists, activists, and dissidents. The article extensively covers the privacy violation, WhatsApp's emergency protective response, and ongoing legal and regulatory efforts by civil rights organizations, governments, and victims to prevent abuse. The reporting strongly advocates for privacy rights, accountability in surveillance technology, and international oversight of surveillance exports.
Article Heatmap
Preamble: +0.26 — Preamble P Article 1: ND — Freedom, Equality, Brotherhood Article 1: No Data — Freedom, Equality, Brotherhood 1 Article 2: +0.20 — Non-Discrimination 2 Article 3: +0.34 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: +0.40 — Right to Remedy 8 Article 9: +0.30 — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.60 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: +0.20 — Freedom of Thought 18 Article 19: +0.38 — Freedom of Expression 19 Article 20: +0.30 — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: +0.30 — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: +0.54 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.41 Structural Mean +0.22
Weighted Mean +0.37 Unweighted Mean +0.35
Max +0.60 Article 12 Min +0.20 Article 2
Signal 11 No Data 20
Confidence 21% Volatility 0.12 (Low)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.43 Editorial-dominant
FW Ratio 55% 21 facts · 17 inferences
Evidence: High: 2 Medium: 7 Low: 2 No Data: 20
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.23 (2 articles) Security: 0.34 (1 articles) Legal: 0.35 (2 articles) Privacy & Movement: 0.60 (1 articles) Personal: 0.20 (1 articles) Expression: 0.34 (2 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.42 (2 articles)
HN Discussion 20 top-level · 30 replies
rhamzeh 2019-05-13 23:16 UTC link
neonate 2019-05-13 23:25 UTC link
galadran 2019-05-13 23:50 UTC link
Interesting!

Google's Project Zero team investigated WhatsApp's and Facetime's video conferencing last year:

"Overall, WhatsApp signalling seemed like a promising attack surface, but we did not find any vulnerabilities in it. There were two areas where we were able to extend the attack surface beyond what is used in the basic call flow. First, it was possible to send signalling messages that should only be sent after a call is answered before the call is answered, and they were processed by the receiving device. Second, it was possible for a peer to send voip_options JSON to another device. WhatsApp could reduce the attack surface of signalling by removing these capabilities."

"Using this setup, I was able to fuzz FaceTime calls and reproduce the crashes. I reported three CVEs in FaceTime based on this work."

WhatsApp: https://googleprojectzero.blogspot.com/2018/12/adventures-in...

Facetime: https://googleprojectzero.blogspot.com/2018/12/adventures-in...

In both cases, the close source nature of the applications stymied their efforts. Looks like NSO was willing to spend more time and resources!

aaomidi 2019-05-13 23:56 UTC link
How were they able to install spyware on iOS devices?
bjourne 2019-05-14 00:02 UTC link
All my life I've thought spyware was developed primarily by evil Russian and Chinese hackers. But apparently also by Israeli developers with their government's blessing and open endorsement. That's some very shady stuff.

Before someone says something about government surveillance of fiber cables. Yes, that is also bad, but exploiting vulnerabilities to install spyware on peoples phones... It crosses yet another line that shouldn't ever be crossed.

roywiggins 2019-05-14 00:11 UTC link
It's not just the NSO group. Hacking Team is not exactly shy about the services they offer.

https://en.wikipedia.org/wiki/Hacking_Team

FinFisher: https://en.wikipedia.org/wiki/FinFisher

MiniPanzer: https://en.wikipedia.org/wiki/MiniPanzer_and_MegaPanzer

JacobHenner 2019-05-14 00:26 UTC link
Wonder if this affects Signal, too.
thelittleone 2019-05-14 00:56 UTC link
I guess these types of vulnerabilities could be placed intentionally. It would allow certain agencies to again access via "exploit" and all the while claim they support user privacy. These companies are under pressure from governments (like the recent Australian government law to requiring access to encrypted messages). Seems like a decent solution for company and governments.
OrgNet 2019-05-14 03:35 UTC link
Yeah, don't install any Facebook app... use the web if you need to use their service... same advice has always been true.
EGreg 2019-05-14 05:11 UTC link
We need open source software to decentralize large companies’ closed server farms and WhatsApp.
ezequiel-garzon 2019-05-14 07:24 UTC link
It seems to me that if this is possible an OS software upgrade of some sort is urgently required, in addition to possible updates of WhatsApp. How come there isn’t coverage of this as Android and iOS vulnerabilities?
whycomb 2019-05-14 08:03 UTC link
Updated WhatsApp on my iphone just now. The version I got was 2.19.50. According to the CVE it's still vulnerable. Unable to get 2.19.51 which is the first fixed version. Is this just me? Or is everyone else updating to a still-vulnerable version?
billysielu 2019-05-14 08:18 UTC link
"update the app" is the sum of the advice?

how about telling us how to check if this exploit was used, how to remove the spyware, etc?

scraegg 2019-05-14 08:37 UTC link
What about Wechat? There are lots of seemingly pretty girls trying to voice or video call these days. Either I'm suddenly rich in their eyes or there's something fishy going on.
0898 2019-05-14 08:48 UTC link
Just to be clear – does this affect iPhone, or just Android?
ricg 2019-05-14 09:30 UTC link
Can the WhatsApp-injected spyware escape the iOS App Sandbox?
lol768 2019-05-14 10:37 UTC link
CVE-2019-3568 suggests this was a buffer overflow. I'd like to understand why this was implemented in native code - Android seems to have an `android.net.rtp` package?

Is this simply for performance, or to enable code-sharing across Android and iOS? Is there anything about WhatsApp's use-case that would prevent an implementation using managed code?

stunt 2019-05-14 11:22 UTC link
I wonder! Should we call it a vulnerability or a leaked backdoor?

Besides, I think if it was from any other developer, probably it would be removed from the AppStore and force delete from user devices.

ccnafr 2019-05-14 12:17 UTC link
I like it how Facebook doesn't mention anything in the WhatsApp changelog about this.
leoh 2019-05-14 14:47 UTC link
Spooky. I just travelled to Israel and this evening, at around 3 AM, iOS notified me that WhatsApp had been accessing my location in the background, which I had never seen before except when sharing my location with a friend.
icelancer 2019-05-14 00:08 UTC link
There was Stuxnet, which was almost certainly a joint US/Israeli operation (likely other minor players involved), and plenty of other programs we never hear about.
askvictor 2019-05-14 00:20 UTC link
Or Android devices for that matter; app code is sandboxed and signed, and requires user interaction to download any non store code
wahern 2019-05-14 00:34 UTC link
Yeah, there's a cottage industry of security firms who sell exploits to the U.S. government directly or indirectly through big defense contractors. Many, and I personally have assumed _most_ (but without checking), are American firms.

And, frankly, the Israeli industry has much to gain by advertising their prowess in order to bolster their IT security bone fides internationally. American firms are probably more discrete, so tabulating widely published exploits by country of origin wouldn't be a great metric to determine which country is doing the most work crafting exploits.

bjourne 2019-05-14 00:49 UTC link
Wow! I had no idea there was a whole industry selling spyware to dictatorships. Surveillance equipment, yes, but not actual hacking tools. Really sickening. Must be why governments in Europe are so afraid of Huawei building 5G networks - they will only run Chinese spyware.
coreman 2019-05-14 00:51 UTC link
All my life I've thought spyware was developed primarily by evil Russian and Chinese hackers. But apparently also by Israeli developers with their government's blessing and open endorsement. That's some very shady stuff.

Gamma Group is an Anglo-German company that provides similar surveillance software with government blessing and endorsement. Hacking Team (Italian company) sells similar surveillance software to various European governments. Before an embarrassing data breach in 2015 they also used to sell surveillance software to various totalitarian regimes outside Europe.

nvr219 2019-05-14 00:56 UTC link
right?
StanislavPetrov 2019-05-14 01:00 UTC link
>All my life I've thought spyware was developed primarily by evil Russian and Chinese hackers.

You've led a very sheltered life if you think the Russians and the Chinese have been more evil than the Americans or the Israelis. I suggest reading history - a lot of it. When it comes to governments there are no good guys, only bad guys.

bouncycastle 2019-05-14 01:03 UTC link
It's not a decent solution, because it doesn't take much to find these vulnerabilities, just a matter of time.
p0rkbelly 2019-05-14 01:04 UTC link
The industry calls this a "bug-door" and yes, plausible deniability is key. Most of this has been hypothetical possibility. This case does not fit that bill though as the vendor discovered it was being used by another country, prevented the exploit against a user, fixed it, and alerted the authorities. Would be more peculiar if it was a US-based company selling the spyware.
pvg 2019-05-14 01:10 UTC link
In both cases, the close source nature of the applications stymied their efforts.

Why do you say that? In the WhatsApp case, they were able to repeatedly modify the code and also yank it out and run it in their own controlled environment, etc.

joecool1029 2019-05-14 01:13 UTC link
My gut tells me no. Signal switched over to using the Signal Protocol for call signaling. It had used a few different signaling standards over the years (when it used to be called Redphone).

However, it's impossible to really know for sure as the server component for calls is a proprietary black box.

quickthrower2 2019-05-14 01:29 UTC link
> Before someone says something about government surveillance of fiber cables.

Anything that goes unencrypted over the internet is (a) public and (b) liable to be changed by anyone on transit. It's like a travelling wikipedia article.

snowwrestler 2019-05-14 01:46 UTC link
Most likely by exploiting an iOS vulnerability . (Which might be unrelated to the WhatsApp bug, other than using it as a vector.)
ec109685 2019-05-14 02:10 UTC link
NSO wasn't the group that did the WhatsApp hack. They are the software the hacker installs after they exploit has been found.
noelsusman 2019-05-14 02:19 UTC link
I would be shocked if any moderately wealthy government hasn't crossed that line. This is child's play for cyber warfare.
ridaj 2019-05-14 02:24 UTC link
Do a Google search for "underhanded C contest".
ngold 2019-05-14 05:46 UTC link
You the real mvp. Thanks.
floatingatoll 2019-05-14 08:04 UTC link
Gaining control of WhatsApp gains access to any API accessible to WhatsApp. Incompetent reporting may be at fault.

On Android, WhatsApp seeks a wide array of permission-controlled APIs. It does so on iOS as well. Once granted, the app has access to any data available through access-allowed APIs.

App code goes through an audit process to ensure that the app isn’t using accessible APIs inappropriately, and doesn’t permit unapproved code execution.

This vulnerability allows an attacker to execute unapproved code in the WhatsApp context. Any API that iOS or Android offer WhatsApp under normal circumstances is now attacker-controlled.

The two questions unanswered by the press to date are simple. On iOS and on Android, can the attacker’s code be terminated by force-quitting and uninstalling WhatsApp?

Either the attack is persistent only because it sets up shop inside the app, which may have OS-granted background and/or screen-off execution rights, and thus can be terminated simply by quitting and removing the app — or, the attack gains persistence beyond the confines of the app.

Media reports are unclear on this point. If the OS offers apps endpoints that an app executing attacker-controlled code can use to infect the OS with persistent attack code that executes outside the app’s boundaries and remains after app uninstallation, then that’s absolutely a flaw in the design of the OS. As you say, “Android and iOS vulnerabilities”.

Is this the case?

majjam 2019-05-14 08:10 UTC link
Just updated via UK iOS app store and its 2.19.50
scraegg 2019-05-14 08:40 UTC link
I'm not sure what can be done nowadays. In the past you would say, format disks and go back to a backup before the threatening event happened. But nowadays all our stuff is in the cloud and you can only go back to the state from 10 minutes ago, and all our disks are flash drives that you can't fully format as an end user. Maybe you can just accept that some virusses will always be there and act accordingly.
keyme 2019-05-14 09:11 UTC link
Affects both
jmkni 2019-05-14 09:28 UTC link
IIRC FinFisher was founded by the same guy who created Backtrack (now Kali Linux)?
kristofferR 2019-05-14 10:29 UTC link
kristofferR 2019-05-14 10:32 UTC link
The spyware is only inside the WhatsApp sandbox.
Tepix 2019-05-14 10:40 UTC link
Have you tried pulling down on the updates screen of the iOS app store? It refreshes the list of apps to be updated.
Theboda 2019-05-14 10:43 UTC link
Thanks!
entropy_ 2019-05-14 11:03 UTC link
You need to go to the app store app, then the updates tab and pull down to refresh(yes, the updates tab, not WhatsApp listing in the store). When you do that, you'll see the newest version becomes available for update. This happens whenever an update is set to phased release and hasn't reached 100% yet.
toyg 2019-05-14 11:40 UTC link
That’s the more traditional scamming/phishing, which has been going on since the days of ICQ...
1f60c 2019-05-14 11:56 UTC link
I was wondering the same. I would hope no, but even so, WhatsApp has plenty of permissions that make it a valuable target.
Editorial Channel
What the content says
+0.80
Article 12 Privacy
High A: privacy A: data protection
Editorial
+0.80
SETL
+0.63

Article is fundamentally about privacy violation: unauthorized voice calls enable remote surveillance, microphone/camera activation, email/message access, and location tracking without consent. Calls disappear from logs to hide intrusion. Extensive documentation of the privacy harm, technical vulnerability, and protective/legal response

+0.70
Article 30 No Destruction of Rights
High A: abuse prevention A: oversight
Editorial
+0.70
SETL
+0.53

Article is fundamentally about preventing abuse of surveillance technology: NSO and government clients are deploying spyware without proper oversight or accountability. Article extensively documents the abuse and advocates for prevention via transparency, legal action, and export license revocation. Amnesty International quote: 'NSO Group sells its products to governments who are known for outrageous human rights abuses'

+0.50
Article 3 Life, Liberty, Security
Medium A: security A: protection
Editorial
+0.50
SETL
+0.45

Article extensively documents threats to bodily autonomy and personal security (remote camera/microphone activation enabling tracking, location harvesting); frames WhatsApp's emergency response and researcher intervention as protective measures

+0.50
Article 19 Freedom of Expression
Medium A: expression A: press freedom
Editorial
+0.50
SETL
+0.39

Article extensively documents surveillance targeting individuals exercising expression (journalists, activists, lawyers advocating against abuse). Article quotes a targeted lawyer saying the targeting is evidence that 'abuses are continuing.' FT's publication of this reporting despite surveillance threats implicitly affirms the importance of freedom of expression

+0.40
Article 8 Right to Remedy
Medium A: remedy A: justice
Editorial
+0.40
SETL
ND

Article prominently documents multiple legal remedies: lawsuits by victims (Mexican journalists, Saudi dissident), human rights lawyers coordinating cases against NSO in Israel, Amnesty International filing for export license cancellation; frames these as legitimate accountability mechanisms

+0.30
Preamble Preamble
Medium A: dignity A: freedom A: justice
Editorial
+0.30
SETL
+0.17

Article documents violations of human dignity and freedom through mass surveillance, establishing foundation for UDHR protection of fundamental rights against state/corporate overreach

+0.30
Article 9 No Arbitrary Detention
Medium A: protection F: targeting
Editorial
+0.30
SETL
ND

Article documents systematic targeting of individuals based on their identity/beliefs and describes surveillance enabling tracking that could facilitate arbitrary detention or persecution

+0.30
Article 20 Assembly & Association
Medium F: association targeting
Editorial
+0.30
SETL
ND

Article documents surveillance targeting groups working collectively: Mexican journalists/government critics coordinating, Saudi dissident working with civil rights groups, UK lawyer coordinating lawsuits with international allies

+0.30
Article 28 Social & International Order
Low A: accountability A: governance
Editorial
+0.30
SETL
ND

Article references government oversight and accountability: Israeli ministry of defence export control, US Department of Justice disclosure, international legal coordination. Implicitly advocates for state/international institutions to establish order respecting rights

+0.20
Article 2 Non-Discrimination
Medium F: discrimination
Editorial
+0.20
SETL
ND

Article identifies surveillance targets by political/ideological identity (journalists, activists, dissidents, lawyers) rather than conduct; documents status-based targeting

+0.20
Article 18 Freedom of Thought
Low F: surveillance chilling
Editorial
+0.20
SETL
ND

Article documents surveillance targeting activists and critics, which implicitly impacts their ability to develop and express thought without state/corporate interference

ND
Article 1 Freedom, Equality, Brotherhood

Article does not address equal human dignity as a concept

ND
Article 4 No Slavery

Not addressed in article

ND
Article 5 No Torture

Not addressed in article

ND
Article 6 Legal Personhood

Not addressed in article

ND
Article 7 Equality Before Law

Not addressed in article

ND
Article 10 Fair Hearing

Not addressed in article

ND
Article 11 Presumption of Innocence

Not addressed in article

ND
Article 13 Freedom of Movement

Not addressed in article

ND
Article 14 Asylum

Not addressed in article

ND
Article 15 Nationality

Not addressed in article

ND
Article 16 Marriage & Family

Not addressed in article

ND
Article 17 Property

Not addressed in article

ND
Article 21 Political Participation

Not addressed in article

ND
Article 22 Social Security

Not addressed in article

ND
Article 23 Work & Equal Pay

Not addressed in article

ND
Article 24 Rest & Leisure

Not addressed in article

ND
Article 25 Standard of Living

Not addressed in article

ND
Article 26 Education

Not addressed in article

ND
Article 27 Cultural Participation

Not addressed in article

ND
Article 29 Duties to Community

Not addressed in article

Structural Channel
What the site does
+0.30
Article 12 Privacy
High A: privacy A: data protection
Structural
+0.30
Context Modifier
ND
SETL
+0.63

FT's accessibility features enable wider audience access to privacy information; investigative journalism structure supports privacy advocacy

+0.30
Article 30 No Destruction of Rights
High A: abuse prevention A: oversight
Structural
+0.30
Context Modifier
ND
SETL
+0.53

FT's investigative journalism itself prevents abuse through transparency and public accountability; publication enables civil society oversight

+0.20
Preamble Preamble
Medium A: dignity A: freedom A: justice
Structural
+0.20
Context Modifier
ND
SETL
+0.17

FT structure (publication, transparency, comment section) enables discourse on dignity and freedom violations

+0.20
Article 19 Freedom of Expression
Medium A: expression A: press freedom
Structural
+0.20
Context Modifier
ND
SETL
+0.39

FT's publication and comment section enable public discourse; comment section allows reader expression

+0.10
Article 3 Life, Liberty, Security
Medium A: security A: protection
Structural
+0.10
Context Modifier
ND
SETL
+0.45

FT's investigative publication documenting the threat and response contributes to public security awareness

ND
Article 1 Freedom, Equality, Brotherhood

Not applicable

ND
Article 2 Non-Discrimination
Medium F: discrimination

Not applicable

ND
Article 4 No Slavery

Not applicable

ND
Article 5 No Torture

Not applicable

ND
Article 6 Legal Personhood

Not applicable

ND
Article 7 Equality Before Law

Not applicable

ND
Article 8 Right to Remedy
Medium A: remedy A: justice

Not applicable

ND
Article 9 No Arbitrary Detention
Medium A: protection F: targeting

Not applicable

ND
Article 10 Fair Hearing

Not applicable

ND
Article 11 Presumption of Innocence

Not applicable

ND
Article 13 Freedom of Movement

Not applicable

ND
Article 14 Asylum

Not applicable

ND
Article 15 Nationality

Not applicable

ND
Article 16 Marriage & Family

Not applicable

ND
Article 17 Property

Not applicable

ND
Article 18 Freedom of Thought
Low F: surveillance chilling

Not applicable

ND
Article 20 Assembly & Association
Medium F: association targeting

Not applicable

ND
Article 21 Political Participation

Not applicable

ND
Article 22 Social Security

Not applicable

ND
Article 23 Work & Equal Pay

Not applicable

ND
Article 24 Rest & Leisure

Not applicable

ND
Article 25 Standard of Living

Not applicable

ND
Article 26 Education

Not applicable

ND
Article 27 Cultural Participation

Not applicable

ND
Article 28 Social & International Order
Low A: accountability A: governance

Not applicable

ND
Article 29 Duties to Community

Not applicable

Supplementary Signals
Epistemic Quality
0.75 medium claims
Sources
0.8
Evidence
0.8
Uncertainty
0.7
Purpose
0.9
Propaganda Flags
0 techniques detected
Solution Orientation
0.56 mixed
Reader Agency
0.6
Emotional Tone
measured
Valence
-0.4
Arousal
0.6
Dominance
0.5
Stakeholder Voice
0.65 7 perspectives
Speaks: corporationinstitutionindividualsmarginalized
About: governmentcorporationindividualsmarginalized
Temporal Framing
present immediate
Geographic Scope
global
Israel, United Kingdom, Mexico, Saudi Arabia, Canada, Middle East, San Francisco, London, Tel Aviv, Toronto, Washington
Complexity
moderate medium jargon general
Transparency
0.50
✓ Author
Audit Trail 1 entries
2026-02-28 09:17 eval Evaluated by claude-haiku-4-5-20251001: +0.37 (Moderate positive)