A single line in a contract between the spyware company NSO Group and the Ghanaian telecom regulator suggests the existence of an infection technique that was previously unknown.
The contract is part of the documentation for the ongoing court case between WhatsApp and NSO. A single entry titled ‘MMS Fingerprint’ is labeled as ‘Infection Assisting Tools’. NSO claims that it can reveal the target device and its operating system ‘without user interaction, engagement, or message opening’ and can be used against Android, Blackberry, and iOS.
Also read: Will AI Help Hackers More Than the Enterprises in 2024?
There is no known MMS fingerprint infection route. Cathal McDaid, VP of technology at Swedish telecoms security firm Enea investigated to learn more.
Read More: Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed