Jeff Bezos's Phone Hack

From Privacy Wiki
Jump to navigation Jump to search


Jeff Bezos's Phone Hack
Short Title Jeff Bezos iPhone X Was Hacked Through WhatsApp
Location United States
Date April 2018

Solove Harm Insecurity, Interrogation
Information Communication, Identifying, Behavioral, Preference, Physical Characteristics, Computer Device, Contact, Location, Account, Public Life, Social Network, Family
Threat Actors WhatsApp Inc. (Facebook Inc.), Unidentified hackers, Apple, Facebook

Individuals
Affected Jeff Bezos
High Risk Groups Wealthy
Tangible Harms

The phone of Amazon’s CEO Jeff Bezos was hacked, which allowed attackers to install spyware and copy a large amount of his personal information.

Description

In 2018 iPhone X owned by Amazon’s CEO Jeff Bezos was hacked. Experts claim the attack happened via a message that was sent to Bezos’ phone from Saudi crown prince, Mohammed bin Salman via WhatsApp in April 2018. The message contained the innocuous-seeming video file, with a tiny bit of malicious code. This malware is called Pegasus and was developed by the Tel-Aviv based NSO group. It is known for being created for the explicit purpose of prying into private online communications. Another spyware that was used in the incident is called Galileo and was developed by the Milan based Hacking Team. However, the experts didn’t explicitly link any of the two hacking groups to this particular attack. It remains unclear who is responsible for the incident.

The hackers gained access to Mr.Bezos’ entire phone, including his photos and private communications.

In the 24 hours after the WhatsApp message was sent, Mr. Bezos’ iPhone began sending large amounts of data, which increased approximately 29,000 percent over his normal data usage.

The malware managed to bypass Apple’s control system on the phone. Investigators also said that some other apps on the phone where being used while the data was leaking, and since they are normally not used by Mr.Bezos, it was concluded, that the apps were sending data to the attackers as well. Those included the Safari web browser and the Apple Mail program. Insecurity

Hacker's actions can be interpreted as probing for personal information through the smartphone, and therefore another violation identified here is Interrogation.

Laws and Regulations

Sources

https://www.nytimes.com/2020/01/24/opinion/jeff-bezos-phone-hack.html
https://www.nytimes.com/2020/01/22/technology/jeff-bezos-hack-iphone.html