LIVE NOW /
Watch Good Morning Connecticut

What we know, and don’t, about the alleged Bezos phone hack

News

FILE – In this Oct. 14, 2019 file photo, Saudi Arabia’s Crown Prince Mohammed bin Salman speaks to Russian President Vladimir Putin during the talks in Riyadh, Saudi Arabia. United Nations experts Wednesday, Jan. 22, 2020 called for an “immediate investigation” by the United States and others into information they received that suggests that Jeff Bezos’ phone was hacked after receiving a file sent from Saudi Crown Prince Mohammed bin Salman’s WhatsApp account. (AP Photo/Alexander Zemlianichenko, Pool)

BOSTON (AP) — U.N. human rights experts are asking Washington to investigate a suspected Saudi hack that may have siphoned data from the personal smartphone of Jeff Bezos, Amazon founder and owner of The Washington Post. But the forensic evidence they cite comes from an incomplete study of Bezos’s phone, raising multiple questions.

Here’s a quick guide to what’s known, and what remains unknown, about their findings.

WHAT HAPPENED TO BEZOS’ PHONE?

According to a report overseen by a former longtime FBI agent and top cybersecurity official in the Obama administration, evidence on the phone suggests it was infected by spyware in May 2018 via a WhatsApp message from the account of Saudi Crown Prince Mohammed bin Salman. That message included a video file that the firm’s investigators say likely contained malware.

Bezos’ personal security adviser had been advised in February 2019 to have the phone examined by an intelligence official who has not been named. Bezos went public with the suspected hack shortly thereafter, saying the National Enquirer tabloid had threatened to publish his private messages and photos.

ARE THE FORENSIC FINDINGS CONCLUSIVE?

Not at all. Outside security researchers highlighted several issues with the forensics report, which was overseen by Anthony Ferrante, who is senior managing director of FTI Consulting’s cybersecurity operations and had worked on the National Security Council under President Barack Obama.

For instance, the FTI report, dated November and obtained Wednesday by the Vice News site Motherboard, said researchers didn’t find any malware on the phone, nor any evidence that Bezos’ phone had surreptitiously communicated with known spyware command servers.

Further, an examination of the crucial root file system — where top-flight hackers often hide their malware — was still pending when the report was written. IPhone security expert Will Strafach, CEO of Guardian Firewall, said that if the FTI investigators didn’t look at the root file system, they didn’t do a thorough forensic exam.

“I think the U.N. intentions are good but the details really matter here and the public reporting falls short of any real firm smoking gun,” said Strafach.

Other security experts questioned the FTI team’s forensic chops, wondering on Twitter and in blog postswhy it was unable to decrypt the software that would have delivered the malware payload along with the video file.

Alex Stamos of Stanford University tweeted: “The funny thing is that it looks like FTI potentially has the murder weapon sitting right there, they just haven’t figured out how to test it.”

FTI’s Ferrante did notrespond to emails and text messages seeking comment. The company said in a statement that all FTI’s work for clients is confidential and that FTI does not “comment on, confirm or deny client engagements.” Facebook said the outfit did not reach out to WhatsApp to request assistance with its probe.

COULD HACKERS HAVE ERASED ALL EVIDENCE OF INTRUSION?

Absolutely, said Strafach. Elite hackers plant malware that erases itself after surreptitiously sending sensitive data to command servers.

“It scoops up everything they want and removes itself so there’s no trace, no evidence,” he said. “Anyone who knows what they are doing are going to cover up their tracks.”

Sophisticated mobile spyware — such as a package called Pegasus, made by the Israeli hacker-for-hire company NSO Group — is designed to bypass detection and mask its activity. Saudi Arabia is reported to have used Pegasus against dissidents and human rights activists within weeks of the suspected Bezos hack.

On Wednesday, NSO Group “unequivocally” denied that its technology was used in the Bezos hack.

WHY IS THE UNITED NATIONS INVOLVED?

One of the two U.N. officials seeking answers in the case, Agnes Callamard. focuses on extrajudicial killings and has already investigated the Saudi government’s role in the October 2018 murder in Turkey of Saudi critic and Washington Post columnist Jamal Khashoggi.

The other, David Kaye, is the U.N. point person on free expression. He focuses on the growing and lawless use of malicious spyware to monitor and intimidate human-rights defenders and journalists.

Both are independent experts in the U.N.’s human rights arm, not employees of the international organization.

Kaye said via text message that he received the FTI report in November. He also said he did not know whether FTI investigators have examined the Bezos’ phone root file system.

ARE OTHER PUBLIC FIGURES AT RISK?

It’s difficult to say at the moment. Prince Mohammed has attended gatherings with numerous U.S. entertainers, technology executives and sports-team owners. A senior administration official, speaking on condition of anonymity to discuss internal matters, said Jared Kushner, a White House aide and son-in-law to President Donald Trump, has communicated with the crown prince via WhatsApp.

WHY ISN’T THE U.S. GOVERNMENT MORE INVOLVED?

A top U.S. Justice Department official, Adam S. Hickey, would not say whether federal investigators were looking into the allegations. Trump has been reluctant to condemn the Saudi prince over the Khashoggi killing and often expresses satisfaction with his government’s purchases of U.S. weapons.

-—-

Associated Press writer Jonathan Lemire contributed from New York.

___

This story has been corrected to refer to Anthony Ferrante as senior managing director of FTI’s cybersecurity operations, rather than its head.

Copyright 2020 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Don't Miss

More Don't Miss