Jeremy Jones, a spokesman for Optive, wrote in an email that his company “cooperated fully with the judiciary” and Optive “is not the subject of this investigation.” That’s right: the investigation is about three former U.S. intelligence and military personnel who worked illegally with the UAE. However, the role of Aquant as an exploit developer and seller was important enough to describe in detail the case before the Judiciary.
Exploitation of iMessage was the primary weapon in an emirate program Action, Which was run by DarkMater, an agency that existed as a private company but actually acted as a de facto spy agency for the UAE.
Reuters Report Action exists and exploits iMessage in 2019. But on Tuesday, the U.S. Fine Three former U.S. intelligence and military personnel are paid .6 1.68 million for their unlicensed work as hired hackers in the United Arab Emirates. These activities included purchasing equipment for the account and then running a hacking campaign funded by the UAE.
U.S. court documents state that these works were developed and sold by American companies but did not name the hacking companies. The role of Acuvent has not yet been announced.
Brian Vernandran, assistant director of the FBI’s cyber division, said in a statement: “This is a clear message to anyone, including former U.S. government employees, who thought of using cyberspace to gain export-controlled information for the benefit of foreign governments or foreign commercial companies রয়েছে there are risks and consequences.”
Prolific Exploitation Developer
Despite the United Arab Emirates being considered a close ally of the United States, Dark Matter was involved in cyber attacks against American targets. According to Court documents and Whistle blowers.
Helped by American partnership, skills and money, DarkMater has developed the UAE’s offensive hacking capabilities over several years, from almost anything to a terrifying and active operation. The group has spent heavily on recruiting American and Western hackers and sometimes conducting cyber operations in the country.
At the time of the sale, Aquant was a small research and development lab located in Denver, Colorado, that sells exclusively to iOS Explosives.
“The FBI will fully investigate individuals and companies that benefit from illegal criminal cyber activity. This is a clear message to anyone … there is a risk, and there will be consequences. ”
Brandon Vorndran, FBI
A decade ago, Aquant established a reputation as a great exploit developer by working with American military contractors and selling bugs to government customers. In an industry that usually values a code of silence, companies occasionally draw public attention.
“Acquant represents the opposite of cyberwar: a thriving market,” wrote journalist David Kushner. 2013 profile of the company On the rolling stone. It was the kind of company, he said, “capable of creating custom software that could access external systems and collect intelligence or even shut down a server for which they could pay up to 1 million.”
Following a continuum of integrations and acquisitions, Optiv came out of the hacking industry, but Acquant’s alumni network is strong – and still working on exploitation. Two high-profile activists went to the cofound of the iPhone hacking company Greshift Known for the ability to unlock the device.
The MIT Technology Review found that Aquant sold hacking exploits to multiple customers in both the government and private sector, including the United States and its allies – and that the exact iMessage exploits were sold to multiple customers at the same time.
Among the messaging apps discovered and exploited in recent years, iMessage Exploit is one of several complex bugs. The 2020 update has been sent to the iPhone’s operating system in its entirety Reconstruction IMessage security in an effort to make targeting harder.