Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Pegasus – All You Need to Know About this Spyware


61
411 shares, 61 points

Gradually, the world is getting more inclined towards internet technology, and gadgets are being used to perpetrate business-related, financial as well as personal tasks, making it easier for hackers to clasp desired data unknowingly. Cyber-attacks have augmented exponentially over the past few years owing to compromised privacy.

The word ‘Pegasus’ has created global headlines lately and has been threatening the lives of high-profile people since. But what exactly does Pegasus mean and what does it do?

What is Pegasus?

‘Pegasus’ is a malicious software (aka malware), devised by an Israeli technological firm – NSO Group, which was primarily built and marketed to “vetted governments” worldwide with the intention for use against criminals and terrorists. Pegasus is known to be the most powerful spyware ever developed which unlatches the route to perform various malicious activities given to its efficiency in self-destruction mechanism. Pegasus can infect devices and spy on the victim by transferring data to a master server in an unauthorized manner.

Why the name- ‘Pegasus’?

‘Pegasus’ is a famous term in Greek Mythology, referred to as a winged divine horse. The name was conjointly inspired by another potent spyware – Trojan horse. On that account, the name Pegasus was suggested, delineated by its potential to travel through the air into numerous phones.

What makes Pegasus being identified as ‘dangerous’?

Typically, a device gets attacked by a malware once the user clicks on a link or gets an email that has the malware embedded in it. However, the case is not the same for Pegasus.

Pegasus is known for its zero-click infection ability, which makes it so potent that there’s no requirement of any noticeable installations in the target device. In fact, the user might never know of its presence and nonetheless be at the brim of such a risk, labeling Pegasus to be the super spyware it is.

Another distinctive character is its capability of “active collection”, which provides attackers the facility to “control the desired information” from the targeted device. Pegasus can be installed through vulnerabilities in common apps like WhatsApp, Facebook, etc. The targeted person doesn’t even have to be compelled to attend the notification to get hacked.

The spyware resides within the volatile memory or RAM of the infected device rather than the physical storage, making it troublesome to detect.

What kind of information is accessible to Pegasus?

Once installed, the spyware gets access to a wide range of permissions, allowing it to manage the location, emails, view the call logs and contact lists, take screenshots, control GPS, lay hold of instant messages and SMS, access browser history, take control of the device’s microphone, cameras, etc.

Who are the targets?

Well, as long as you belong to the pleb-group, there is hardly any chance that you might be under Pegasus surveillance. But in case you hold a high profile and are worth being watched, then yes- you might be the one under strict observation. Considering one owns a smartphone, no man is out of the probable possibility of being stalked.

Pegasus is high maintenance software and essentially requires huge capital for the perpetrator to control it, and that clearly means no one would invest such a prodigious amount for absolutely nothing. Hence, if you are a politician, journalist, or any human activist, then you are most likely affiliated with the threat spectrum.

Also, the targeted device has to be compatible with the NSO Group’s technology system. However, if a gadget isn’t compatible with the NSO system, Pegasus won’t be able to have an effect on it.

Since when in news?

Pegasus first came to the limelight when in 2016 it was broadcasted that it had unsuccessfully strived to attack the device of a UAE human rights activist, Ahmed Mansoor. On his iPhone, he received a text message with links that would direct him to explore new secrets concerned with the persecuted prisoners in the country. Instead of following the given guidelines, Mansoor forwarded the messages to the Citizen Lab researchers, who traced the origin of the links and thereafter revealed that the link gave access to the Pegasus spyware that could exploit nearly unlimited confidential information on the device.

Later this year, a global consortium of 17 media organizations that include, The Guardian, The Washington Post, Le Monde, and The Wire reported under the name ‘The Pegasus Project’, revealed a leaked inventory of over 50,000 phone numbers in more than 45 countries that were potentially targeted for surveillance by misusing Pegasus.

Conclusion

There will be loopholes to every innovation, and solutions to these are also not difficult to find. If one remains alert and sound, every possible threat can be avoided. On that note, recently, the NSO Group has confirmed the temporary blockage of several government clients around the world from using its Pegasus spyware as the company investigates its possible misuse.

Loading


Like it? Share with your friends!

61
411 shares, 61 points
Shalini Roy