• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking iOS security Latest Cybersecurity News Mobile security

Amazon founder’s iPhone is hacked using the Saudi Prince’s What’sApp account

William Marshal Posted On January 23, 2020
0



Bezos iphone hack

Jeff Bezos, the founder of Amazon and the world’s richest man’s iPhone was hacked on May 2018. Bezos received a MP4 file in his WhatsApp account from the Saudi Prince Mohammad Bin Salmon. Moreover, this hack was left undetected for a couple of months according to the Guardian and the Tabloid newspaper. It is also believed huge amount of data was extracted from Bezos phone since the hack.

How was Bezos phone hacked?

According to the digital forensics report, a malicious MP4 file was sent from Salmon’s account to Bezos which triggered the hack using an undisclosed zero day vulnerability in WhatsApp.

However, after escalating things with the United Nations Human Rights Office of the High Commission, it is identified the hack was executed using a mobile hacking tool called Pegasus, developed by Israeli vendor NSO Group. 

Pegasus and its misuse

According to reports from the Amnesty International, Pegasus is misused by Saudi government to spy on Saudi dissidents. It is also reported that Pegasus was used to target human rights activists and journalists and attempted to install spyware on their smartphones. Also, two former employees of Twitter were charged for spying on the number of Twitter users on behalf of the Saudi government.

Moreover, it is also possible that the Prince’s phone could have been already hacked to execute the MP4 file hack on Bezos phone.

What was revealed post hack?

Massive amount of data egress had occurred, starting from 29,156 percent to 106,032,045 percent, i.e 126 MB to 4.6 Gb of data had been found extracted, however the details of data remains unknown. But on the other note Bezos affair disclosure could have been possible through this hack, as the hack did occur prior to it. 

However, the Saudi government had dismissed the Guardian reports to be ‘absurd’ and have requested for further investigations. It is also to be noted that Bezos is also the founder of Washington post.

Timeline of the events related to Bezos iPhone hack

There was no information available regarding the leak of any official Amazon data from the hack of Bezos phone when this article was written. It is believed that after further forensic analysis, more information on the hack could be discovered. 

Share the article with your friends


Amazon founder phone hackBezos iPhone hackPegasus misuseSalman hacks Bezos phoneSaudi prince hack on Amazon founderSaudi prince hacks Bezos phone


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search