The Amazon billionaire Jeff Bezos had his mobile phone “hacked” in 2018 after receiving a WhatsApp message that had apparently been sent from the personal account of the crown prince of Saudi Arabia, as reported by the Guardian. The encrypted message from the number used by Mohammed bin Salman is believed to have included a malicious file that infiltrated the phone of the world’s richest man, according to the results of a digital forensic analysis.
A United Nations expert said Jeff Bezos’ experience should sound alarms because even with his wealth and resources, it took months of investigation by specialists to figure out what had happened. “It basically means that we are all extremely vulnerable." https://t.co/WYHRxWj4ps
— The New York Times (@nytimes) January 23, 2020
Experts Comments
Linkedin Message
@Rosa Smothers, SVP of Cyber Operations, provides expert commentary at @Information Security Buzz.
"Hacking humans is often easier and takes less time than a straight forward network approach...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Rosa Smothers, SVP of Cyber Operations, provides expert commentary at @Information Security Buzz.
"Hacking humans is often easier and takes less time than a straight forward network approach...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Linkedin Message
@Jake Moore, Cybersecurity Specialist, provides expert commentary at @Information Security Buzz.
"Groups such as the NSO are very capable of carrying out vulnerability checks on operating systems...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Jake Moore, Cybersecurity Specialist, provides expert commentary at @Information Security Buzz.
"Groups such as the NSO are very capable of carrying out vulnerability checks on operating systems...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Linkedin Message
@Roger Grimes, Data-driven Defence Evangelist , provides expert commentary at @Information Security Buzz.
"They can give us the necessary details without revealing confidential data. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Roger Grimes, Data-driven Defence Evangelist , provides expert commentary at @Information Security Buzz.
"They can give us the necessary details without revealing confidential data. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Linkedin Message
@Eoin Keary, CEO and Cofounder, provides expert commentary at @Information Security Buzz.
"oram Golandsky is the VP of technologies and Infosec at the NSO group...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Eoin Keary, CEO and Cofounder, provides expert commentary at @Information Security Buzz.
"oram Golandsky is the VP of technologies and Infosec at the NSO group...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Linkedin Message
@Craig Young, Principal Security Researcher , provides expert commentary at @Information Security Buzz.
"It is entirely possible that Bezos phone was compromised by simply receiving the message with a crafted file. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Craig Young, Principal Security Researcher , provides expert commentary at @Information Security Buzz.
"It is entirely possible that Bezos phone was compromised by simply receiving the message with a crafted file. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Jarno Niemelä, Principal Researcher , provides expert commentary at @Information Security Buzz.
"In the case of Jeff Bezos there is no public indication of OS level root exploits being used. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments
Facebook Message
@Jarno Niemelä, Principal Researcher , provides expert commentary at @Information Security Buzz.
"In the case of Jeff Bezos there is no public indication of OS level root exploits being used. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/jeff-bezos-phone-hacked-by-saudi-crown-prince-expert-comments