{"id":43800,"date":"2021-11-08T16:19:38","date_gmt":"2021-11-08T16:19:38","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32799\/Palestinian-Activists-Mobile-Phones-Hacked-Using-NSO-Spyware.html"},"modified":"2021-11-08T16:19:38","modified_gmt":"2021-11-08T16:19:38","slug":"palestinian-activists-mobile-phones-hacked-using-nso-spyware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/","title":{"rendered":"Palestinian Activists&#8217; Mobile Phones Hacked Using NSO Spyware"},"content":{"rendered":"<p class=\"dcr-o5gy41\">The mobile phones of six Palestinian human rights defenders, some of whom work for organisations that were recently \u2013 and controversially \u2013 accused by <a href=\"https:\/\/www.theguardian.com\/world\/israel\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">Israel<\/a> of being terrorist groups, were previously hacked by sophisticated spyware made by NSO Group, according to a report.<\/p>\n<p class=\"dcr-o5gy41\">An investigation by Front Line Defenders (FLD), a Dublin-based human rights group, found that the mobile phones of Salah Hammouri, a Palestinian rights defender and lawyer whose Jerusalem residency status has been revoked, and five others were hacked using Pegasus, NSO\u2019s signature spyware. In one case, the hacking was found to have occurred as far back as July 2020.<\/p>\n<p class=\"dcr-o5gy41\">FLD\u2019s findings were independently confirmed with \u201chigh confidence\u201d by technical experts at Citizen Lab and Amnesty International\u2019s security lab, the world\u2019s leading authorities on such hacks.<\/p>\n<p class=\"dcr-o5gy41\">The revelation is likely to provoke further criticism of Israel\u2019s recent decision to target Palestinian human rights activists. UN human rights experts have called the designation of the groups as terror organisations a \u201cfrontal attack\u201d on the Palestinian human rights movement and on human rights everywhere, and said it appeared to represent an abuse of the use of anti-terrorism legislation by Israeli authorities.<\/p>\n<p class=\"dcr-o5gy41\">Investigations by the Guardian and other media outlets have found multiple cases of governments using NSO spyware to target journalists and human rights advocates who are perceived as threats, often by autocratic regimes such as Saudi Arabia that have been sold the technology. Targets in the past have included the fiancee and wife of the murdered journalist Jamal Khashoggi, as well as Carine Kanimba, the daughter of the jailed Rwandan dissident Paul Rusesabagina. NSO has said it investigates all allegations of abuse and that its technology is meant to be used by governments to fight terrorism and other serious crimes.<\/p>\n<p class=\"dcr-o5gy41\">The case of the six Palestinians also raises new questions about how Israel itself may use spyware to target critics of the government or others who are seen as threatening the country.<\/p>\n<p class=\"dcr-o5gy41\">The <a href=\"https:\/\/www.theguardian.com\/us-news\/2021\/nov\/03\/nso-group-pegasus-spyware-us-blacklist\" data-link-name=\"in body link\">Biden administration placed NSO on a US blacklist<\/a> last week, a move that will make it exceedingly difficult for the Israeli company to buy any US-originating technology or services. The administration said it took the decision after it found evidence that the Israeli spyware maker had acted \u201ccontrary to the foreign policy and national security interests of the US\u201d.<\/p>\n<p class=\"dcr-o5gy41\">There is no technical evidence confirming that the state of Israel ordered the hacks of the six Palestinians, but three of the six individuals work for organisations that have been targeted and accused of crimes by Israeli authorities. NSO has said it sells its spyware only to government clients for the purposes of fighting serious crime and terrorism, and the company is closely regulated by the Israeli ministry of defence. <\/p>\n<p class=\"dcr-o5gy41\">A spokesperson for NSO Group said: \u201cDue to contractual and national security considerations, we cannot confirm or deny the identity of our government customers. As we stated in the past, NSO Group does not operate the products itself; the company licence approved government agencies to do so, and we are not privy to the details of individuals monitored.<\/p>\n<p class=\"dcr-o5gy41\">\u201cNSO Group develops critical technologies for the use of law enforcement and intelligence agencies around the world to defend the public from serious crime and terror. These technologies are vital for governments in the face of platforms used by criminals and terrorists to communicate uninterrupted.\u201d<\/p>\n<p class=\"dcr-o5gy41\">The Israeli government did not immediately respond to a request for comment by the Guardian. The Israeli prime minister\u2019s office and the defence ministry denied that Pegasus had been used to hack the Palestinians\u2019 phones, according to the New York Times.<\/p>\n<figure id=\"0fe8ffa5-5302-4d21-af0c-07e09423e174\" class=\" dcr-10khgmf\">\n<div class=\"dcr-1b267dg\"><picture itemprop=\"contentUrl\"><source srcset=\"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=620&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=10134cadd7f76d8e5018896f48b8b10d 1240w, https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=605&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=e300beb6c970be6c32e7458e9845dd59 1210w, https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0 890w\" sizes=\"(min-width: 660px) 620px, 100vw\" media=\"(-webkit-min-device-pixel-ratio: 1.25), (min-resolution: 120dpi)\"><source srcset=\"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=620&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=1f03084de4fb9c2ae45cfd0fbea828f4 620w, https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=605&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=2276440b406e52ff493c27b77500cfd5 605w, https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=5ca0748d585e87ad0d44a85ae534b76e 445w\" sizes=\"(min-width: 660px) 620px, 100vw\"><img decoding=\"async\" alt=\"NSO building\" src=\"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\" height=\"3721\" width=\"6201\" loading=\"lazy\" class=\"dcr-1989ovb\"><\/picture><\/div><figcaption class=\"dcr-qumu7i\"><span class=\"dcr-1o7qj7t\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-19x4pdv\">A branch of NSO Group near the southern Israeli town of Sapir. The Biden administration placed NSO on a US blacklist last week.<\/span> Photograph: Sebastian Scheiner\/AP<\/figcaption><\/figure>\n<p class=\"dcr-o5gy41\">The groups concerned are known to document allegations of human rights abuses by Israel and the Palestinian Authority. The six are Al-Haq, Addameer, Defense for Children International \u2013 Palestine, the Bisan Center for Research and Development, the Union of Palestinian Women\u2019s Committees, and the Union of Agricultural Work Committees.<\/p>\n<p class=\"dcr-o5gy41\">Three of the six activists who were hacked agreed to be identified. They are Hammouri, who is also a French national, Ubai Al-Aboudi, the executive director at the Bisan Center, who is also a US citizen, and Ghassan Halaika, a researcher for Al-Haq.<\/p>\n<p class=\"dcr-o5gy41\">Ron Deibert, a Canadian professor and the head of Citizen Lab at the University of Toronto, noted that the group\u2019s own forensic analysis showed that the hacking of the individuals had occurred prior to Israel\u2019s designation of the groups as terrorist organisations.<\/p>\n<p class=\"dcr-o5gy41\">Pegasus gives government operators complete control over a victim\u2019s device, including being able to use microphones and cameras remotely. \u201cThe possibility that a government operator could plant falsely incriminating data on a victim\u2019s phone can also not be excluded, given this total control,\u201d said Deibert.<\/p>\n<p class=\"dcr-o5gy41\">The Israeli defence ministry has previously claimed that the six organisations were linked to the Popular Front for the Liberation of Palestine (PFLP), a secular political movement with an armed wing that has in the past carried out attacks against Israel.<\/p>\n<p class=\"dcr-o5gy41\">The groups \u201cwere active under the cover of civil society organisations, but in practice belong and constitute an arm of the [PFLP] leadership, the main activity of which is the liberation of Palestine and destruction of Israel\u201d, the ministry said.<\/p>\n<p class=\"dcr-o5gy41\">FLD\u2019s report was shared with Forbidden Stories, the French nonprofit that coordinated a recent investigation into NSO and the use of its Pegasus software by its government clients by a consortium of media outlets, including the Guardian.<\/p>\n<p class=\"dcr-o5gy41\">FLD condemned the hacking of the individuals. It examined 75 phones and found that six contained traces of malware specifically associated with Pegasus. FLD also claimed that the hacking of the Palestinians \u2013 some of whom are dual nationals \u2013 would have allowed authorities to spy on conversations between the individuals and others, including Israeli citizens, who could also have been surveilled. FLD said any such surveillance, if it occurred, would be a breach of Israeli law.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32799\/Palestinian-Activists-Mobile-Phones-Hacked-Using-NSO-Spyware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8740],"class_list":["post-43800","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentprivacyphonecyberwarisraelspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Palestinian Activists&#039; Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Palestinian Activists&#039; Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-08T16:19:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Palestinian Activists&#8217; Mobile Phones Hacked Using NSO Spyware\",\"datePublished\":\"2021-11-08T16:19:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/\"},\"wordCount\":1014,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\\\/0_0_6201_3721\\\/master\\\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\",\"keywords\":[\"headline,government,privacy,phone,cyberwar,israel,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/\",\"name\":\"Palestinian Activists' Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\\\/0_0_6201_3721\\\/master\\\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\",\"datePublished\":\"2021-11-08T16:19:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\\\/0_0_6201_3721\\\/master\\\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\\\/0_0_6201_3721\\\/master\\\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,phone,cyberwar,israel,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyphonecyberwarisraelspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Palestinian Activists&#8217; Mobile Phones Hacked Using NSO Spyware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Palestinian Activists' Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/","og_locale":"en_US","og_type":"article","og_title":"Palestinian Activists' Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-08T16:19:38+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Palestinian Activists&#8217; Mobile Phones Hacked Using NSO Spyware","datePublished":"2021-11-08T16:19:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/"},"wordCount":1014,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0","keywords":["headline,government,privacy,phone,cyberwar,israel,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/","url":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/","name":"Palestinian Activists' Mobile Phones Hacked Using NSO Spyware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0","datePublished":"2021-11-08T16:19:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/578336a1655a4442c2927c60c8e9d8f63a4ed0f3\/0_0_6201_3721\/master\/6201.jpg?width=445&amp;quality=45&amp;auto=format&amp;fit=max&amp;dpr=2&amp;s=3ca654af71c423da36fab24833a929c0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/palestinian-activists-mobile-phones-hacked-using-nso-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,phone,cyberwar,israel,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyphonecyberwarisraelspyware\/"},{"@type":"ListItem","position":3,"name":"Palestinian Activists&#8217; Mobile Phones Hacked Using NSO Spyware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43800"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43800\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}