Alexa
  • Directory of Taiwan

What we know, and don't, about the alleged Bezos phone hack

FILE - In this Oct. 14, 2019 file photo, Saudi Arabia's Crown Prince Mohammed bin Salman speaks to Russian President Vladimir Putin during the talks i...
FILE - In this Dec. 14, 2017, file photo, Jeff Bezos attends the premiere of "The Post" at The Newseum in Washington. United Nations experts on Wednes...
FILE - In this Dec. 15, 2014 file photo, Saudi journalist Jamal Khashoggi speaks during a press conference in Manama, Bahrain.  United Nations experts...

FILE - In this Oct. 14, 2019 file photo, Saudi Arabia's Crown Prince Mohammed bin Salman speaks to Russian President Vladimir Putin during the talks i...

FILE - In this Dec. 14, 2017, file photo, Jeff Bezos attends the premiere of "The Post" at The Newseum in Washington. United Nations experts on Wednes...

FILE - In this Dec. 15, 2014 file photo, Saudi journalist Jamal Khashoggi speaks during a press conference in Manama, Bahrain. United Nations experts...

BOSTON (AP) — U.N. human rights experts are asking Washington to investigate a suspected Saudi hack that may have siphoned data from the personal smartphone of Jeff Bezos, Amazon founder and owner of The Washington Post. But the forensic evidence they cite comes from an incomplete study of Bezos's phone, raising multiple questions.

Here's a quick guide to what's known, and what remains unknown, about their findings.

WHAT HAPPENED TO BEZOS' PHONE?

According to a cybersecurity firm run by a former Obama administration official, e vidence on the phone suggests it was infected by spyware in May 2018 via a WhatsApp message from the account of Saudi Crown Prince Mohammed bin Salman. That message included a video file that the firm's investigators say likely contained malware.

Bezos' personal security adviser had been advised in February 2019 to have the phone examined by an intelligence official who has not been named. Bezos went public with the suspected hack shortly thereafter, saying the National Enquirer tabloid had threatened to publish his private messages and photos.

ARE THE FORENSIC FINDINGS CONCLUSIVE?

Not at all. Outside security researchers highlighted several issues with the forensics report by FTI Consulting, run by former Obama administration National Security Council cybersecurity official Anthony Ferrante.

For instance, the FTI report, dated November and obtained Wednesday by the Vice News site Motherboard, said researchers didn't find any malware on the phone, nor any evidence that Bezos’ phone had surreptitiously communicated with known spyware command servers.

Further, an examination of the crucial root file system — where top-flight hackers often hide their malware — was still pending when the report was written. iPhone security expert Will Strafach, CEO of Guardian Firewall, said that if the FTI investigators didn't look at the root file system, they didn't do a thorough forensic exam.

“I think the U.N. intentions are good but the details really matter here and the public reporting falls short of any real firm smoking gun,” said Strafach.

Other security experts questioned the FTI team's forensic chops, wondering on Twitter and in blog posts why it was unable to decrypt the software that would have delivered the malware payload along with the video file.

Alex Stamos of Stanford University tweeted: “The funny thing is that it looks like FTI potentially has the murder weapon sitting right there, they just haven't figured out how to test it.”

Ferrante of FTI did not respond to emails and text messages seeking comment.

COULD HACKERS HAVE ERASED ALL EVIDENCE OF INTRUSION?

Absolutely, said Strafach. Elite hackers plant malware that erases itself after surreptitiously sending sensitive data to command servers.

"It scoops up everything they want and removes itself so there's no trace, no evidence," he said. "Anyone who knows what they are doing are going to cover up their tracks."

Sophisticated mobile spyware — such as a package called Pegasus, made by the Israeli hacker-for-hire company NSO Group — is designed to bypass detection and mask its activity. Saudi Arabia i s reported to have used Pegasus against dissidents and human rights activists within weeks of the suspected Bezos hack.

On Wednesday, NSO Group “unequivocally” denied that its technology was used in the Bezos hack.

WHY IS THE UNITED NATIONS INVOLVED?

One of the two U.N. officials seeking answers in the case, Agnes Callamard. focuses on extrajudicial killings and has already investigated the Saudi government's role in the October 2018 murder in Turkey of Saudi critic and Washington Post columnist Jamal Khashoggi.

The other, David Kaye, is the U.N. point person on free expression. He focuses on the growing and lawless use of malicious spyware to monitor and intimidate human-rights defenders and journalists.

Both are independent experts in the U.N.'s human rights arm, not employees of the international organization.

ARE OTHER PUBLIC FIGURES AT RISK?

It's difficult to say at the moment. Prince Mohammed has attended gatherings with numerous U.S. entertainers, technology executives and sports-team owners. A senior administration official, speaking on condition of anonymity to discuss internal matters, said Jared Kushner, a White House aide and son-in-law to President Donald Trump, has communicated with the crown prince via WhatsApp.

WHY ISN'T THE U.S. GOVERNMENT MORE INVOLVED?

A top U.S. Justice Department official, Adam S. Hickey, would not say whether federal investigators were looking into the allegations. Trump has been reluctant to condemn the Saudi prince over the Khashoggi killing and often expresses satisfaction with his government's purchases of U.S. weapons.

—-

Associated Press writer Jonathan Lemire contributed from New York.