NSO Group’s lawyer Joe Akrotirianakis confirmed this, saying the “single exception” to Pegasus not being able to target +1 numbers “was a specially configured version of Pegasus to be used in demonstration to potential U.S. government customers.”
The FBI reportedly chose not to deploy Pegasus following its test.
How NSO Group’s government customers use Pegasus
NSO’s CEO Shohat explained that Pegasus’ user interface for its government customers does not provide an option to choose which hacking method or technique to use against the targets they are interested in, “because customers don’t care which vector they use, as long as they get the intelligence they need.”
In other words, it’s the Pegasus system in the backend that picks out which hacking technology, known as an exploit, to use each time the spyware targets an individual.
NSO Group’s headquarters shares the same building as Apple
In a funny coincidence, NSO Group’s headquarters in Herzliya, a suburb of Tel Aviv in Israel, is in the same building as Apple, whose iPhone customers are also frequently targeted by NSO’s Pegasus spyware. Shohat said NSO occupies the top five floors and Apple occupies the remainder of the 14-floor building.
“We share the same elevator when we go up,” Shohat said during testimony.
The fact that NSO Group’s headquarters are openly advertised is somewhat interesting on its own. Other companies that develop spyware or zero-days like the Barcelona-based Variston, which shuttered in February, was located in a co-working space while claiming on its official website to be located somewhere else.
NSO Group admitted that it kept targeting WhatsApp users after the lawsuit was filed
Following the spyware attack, WhatsApp filed its lawsuit against NSO Group in November 2019. Despite the active legal challenge, the spyware maker kept targeting the chat app’s users, according to NSO Group’s research and development vice president Tamir Gazneli.