Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >U.S. State Department phones hacked with Israeli company spyware – sources
    Business

    U.S. State Department Phones Hacked With Israeli Company Spyware – Sources

    Published by maria gbaf

    Posted on December 6, 2021

    5 min read

    Last updated: January 28, 2026

    Add as preferred source on Google
    The image captures the signing ceremony of an energy deal between Greece and Israel, highlighting their commitment to regional stability and innovative projects in the Eastern Mediterranean. This agreement aims to establish a 'green' electricity corridor from Israel to the EU, crucial for energy cooperation.
    Greek and Israeli officials sign energy agreement for Eastern Mediterranean - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Quick Summary

    NSO Group spyware hacked U.S. State Department iPhones, targeting officials linked to Uganda. Apple has sued NSO, and investigations are ongoing.

    U.S. State Department iPhones Hacked by NSO Group Spyware

    By Christopher Bing and Joseph Menn

    WASHINGTON/SAN FRANCISCO (Reuters) – Apple Inc iPhones of at least nine U.S. State Department employees were hacked by an unknown assailant using sophisticated spyware developed by the Israel-based NSO Group, according to four people familiar with the matter.

    The hacks, which took place in the last several months, hit U.S. officials either based in Uganda or focused on matters concerning the East African country, two of the sources said.

    The intrusions, first reported here, represent the widest known hacks of U.S. officials through NSO technology. Previously, a list of numbers with potential targets including some American officials surfaced in reporting on NSO, but it was not clear whether intrusions were always tried or succeeded.

    Reuters could not determine who launched the latest cyberattacks.

    NSO Group said in a statement on Thursday that it did not have any indication their tools were used but canceled access for the relevant customers and would investigate based on the Reuters inquiry.

    “If our investigation shall show these actions indeed happened with NSO’s tools, such customer will be terminated permanently and legal actions will take place,” said an NSO spokesperson, who added that NSO will also “cooperate with any relevant government authority and present the full information we will have.”

    NSO has long said it only sells its products to government law enforcement and intelligence clients, helping them to monitor security threats, and is not directly involved in surveillance operations.

    Officials at the Uganda embassy in Washington did not comment. A spokesperson for Apple declined to comment.

    A State Department spokesperson declined to comment on the intrusions, instead pointing to the Commerce Department’s recent decision to place the Israeli company on an entity list, making it harder for U.S. companies to do business with them.

    NSO Group and another spyware firm were “added to the Entity List based on a determination that they developed and supplied spyware to foreign governments that used this tool to maliciously target government officials, journalists, businesspeople, activists, academics, and embassy workers,” the Commerce Department said in an announcement last month.

    EASILY IDENTIFIABLE

    NSO software is capable of not only capturing encrypted messages, photos and other sensitive information from infected phones, but also turning them into recording devices to monitor surroundings, based on product manuals reviewed by Reuters.

    Apple’s alert to affected users did not name the creator of the spyware used in this hack.

    The victims notified by Apple included American citizens and were easily identifiable as U.S. government employees because they associated email addresses ending in state.gov with their Apple IDs, two of the people said.

    They and other targets notified by Apple in multiple countries were infected through the same graphics processing vulnerability that Apple did not learn about and fix until September, the sources said.

    Since at least February, this software flaw allowed some NSO customers to take control of iPhones simply by sending invisible yet tainted iMessage requests to the device, researchers who investigated the espionage campaign said.

    The victims would not see or need to interact with a prompt for the hack to be successful. Versions of NSO surveillance software, commonly known as Pegasus, could then be installed.

    Apple’s announcement that it would notify victims came on the same day it sued NSO Group last week, accusing it of helping numerous customers break into Apple’s mobile software, iOS.

    In a public response, NSO has said its technology helps stop terrorism and that they’ve installed controls to curb spying against innocent targets.

    For example, NSO says its intrusion system cannot work on phones with U.S. numbers beginning with the country code +1.

    But in the Uganda case, the targeted State Department employees were using iPhones registered with foreign telephone numbers, said two of the sources, without the U.S. country code.

    Uganda has been roiled this year by an election with reported irregularities, protests and a government crackdown. U.S. officials have tried to meet with opposition leaders, drawing ire from the Ugandan government. Reuters has no evidence the hacks were related to current events in Uganda.

    A senior Biden administration official, speaking on condition he not be identified, said the threat to U.S. personnel abroad was one of the reasons the administration was cracking down on companies such as NSO and pursuing new global discussion about spying limits.

    The official added that the government has seen “systemic abuse” in multiple countries involving NSO’s Pegasus spyware.

    Sen. Ron Wyden, who is on the Senate Intelligence Committee, said: “Companies that enable their customers to hack U.S. government employees are a threat to America’s national security and should be treated as such.”

    Historically, some of NSO Group’s best-known past clients included Saudi Arabia, the United Arab Emirates and Mexico.

    The Israeli Ministry of Defense must approve export licenses for NSO, which has close ties to Israel’s defense and intelligence communities, to sell its technology internationally.

    In a statement, the Israeli embassy in Washington said that targeting American officials would be a serious breach of its rules.

    “Cyber products like the one mentioned are supervised and licensed to be exported to governments only for purposes related to counter-terrorism and severe crimes,” an embassy spokesperson said. “The licensing provisions are very clear and if these claims are true, it is a severe violation of these provisions.”

    (Reporting by Christopher Bing and Joseph Menn; editing by Chris Sanders and Edward Tobin)

    Key Takeaways

    • •NSO Group spyware hacked U.S. State Department iPhones.
    • •The hacks targeted officials in or focused on Uganda.
    • •NSO denies involvement but is investigating.
    • •Apple has sued NSO Group over the spyware use.
    • •The spyware exploited an iMessage vulnerability.

    Frequently Asked Questions about U.S. State Department phones hacked with Israeli company spyware – sources

    1What is the main topic?

    The article discusses the hacking of U.S. State Department iPhones using NSO Group's spyware.

    2Who developed the spyware?

    The spyware was developed by the Israel-based NSO Group.

    3What was the target of the hack?

    The hack targeted U.S. State Department officials, particularly those linked to Uganda.

    More from Business

    Explore more articles in the Business category

    Image for Independent Community Retailer of the Year (Locally Owned & Community-Focused) 2026: Nominations Open
    Independent Community Retailer of the Year (Locally Owned & Community-Focused) 2026: Nominations Open
    Image for Submit Your Nominations for Exporter of the Year (Non-Financial) 2026
    Submit Your Nominations for Exporter of the Year (Non-Financial) 2026
    Image for Apply Now: Work-Life Balance Program (Employee Wellbeing & Flexibility) 2026
    Apply Now: Work-Life Balance Program (Employee Wellbeing & Flexibility) 2026
    Image for Calling Entries: Best Workforce Engagement Program (Internal Engagement & Participation) 2026
    Calling Entries: Best Workforce Engagement Program (Internal Engagement & Participation) 2026
    Image for Submit Your Entry Today: Best Sustainability Advisory Firm (Non-Financial / Advisory-Only) 2026
    Submit Your Entry Today: Best Sustainability Advisory Firm (Non-Financial / Advisory-Only) 2026
    Image for Apply Now: Social Media Engagement (Non-Banking / Non-Financial Institutions) 2026
    Apply Now: Social Media Engagement (Non-Banking / Non-Financial Institutions) 2026
    Image for Nominations Open for Best Project Management Consultancy 2026
    Nominations Open for Best Project Management Consultancy 2026
    Image for Best Place to Work 2026 – Recognising Excellence in Workplace Culture
    Best Place to Work 2026 – Recognising Excellence in Workplace Culture
    Image for Best Payroll Solutions Provider 2026 – Call for Nominations
    Best Payroll Solutions Provider 2026 – Call for Nominations
    Image for Nominations Open: Best Licensing & Business Registration Company 2026
    Nominations Open: Best Licensing & Business Registration Company 2026
    Image for Apply Today for Best Customer Service 2026
    Apply Today for Best Customer Service 2026
    Image for Calling Entries: Best Creative Brick-and-Mortar Retailer of the Year (Physical Retail Experience) 2026
    Calling Entries: Best Creative Brick-and-Mortar Retailer of the Year (Physical Retail Experience) 2026
    View All Business Posts
    Previous Business PostJapan Government Considering Lifting FY2022 Economic Growth Forecast -Nhk
    Next Business PostToshiba Walked Away From Potential Buyout Talks and Brookfield Offer -Sources