Pegasus Spyware: Is Your Phone Really Safe From Hacking?
Back in 2019, Pegasus Developed by the Israeli company NSO, spyware has become a global headline as it was used by some governments to snoop on human rights activists and journalists.
Now, in summary of the same story, along with Amnesty
International and the Paris-based nonprofit Forbidden Stories, a global survey
by Clutch of 17 media organizations is for Pegasus to extract messages and
information from telephones. Journalists, politicians and activists in many
countries, including India, claimed to have been used.
In addition, Pegasus is claimed to infect Android devices
and iPhones and allow operators (in this case the government) access to
messages, photos, and emails. You can also record calls and secretly activate
the microphone.
Why are spyware like Pegasus made in the first place?
The Government of India has flatly denied allegations that
no authorized interception by government agencies has taken place. The latest
revelation politics will undoubtedly unfold in the coming weeks and even
months, as there are more installments in the promised leak.
There is no doubt that the scandal will be named Pegasus
Gate encourages you to ask the basic question again: Is your phone really safe?
In 2019, Facebook-owned WhatsApp confirmed that
approximately 1,400 users in 20 countries were targeted by Pegasus. As a
reminder, WattsApp provides end-to-end encryption. But the fact is that we are
faced with sophisticated spyware like Pegasus, and none of our personal
communications are really secure.
Therefore, they are not so secure to answer the question of
how secure our phones are. Perhaps many of you know or understand this from a
broader perspective.
But the fact that spyware like Pegaus is expensive can give
some comfort, and the Israeli company has become a “scrutinized legitimate
government agency” to fight “serious crime and terrorism.” Say to sell it. In
any case, it is not the NSO that orders monitoring.
It’s true that sophisticated software like Pegasus is really
needed to take on the frustrations of terrorists and underworld operators. The
government and its detectives need technology to intercept messages for
legitimate law and order.
However, the safety and sensitivity of all weapons depends
on who handles them. And unfortunately, some people who have access to such
tech snooping tools may use them for self-service purposes.
How is Pegasus “infecting” the phone?Missed call may be
enough
Spyware is essentially software that secretly monitors and
collects information about online activity, data on your device, and various
personal information.
The worrying news is that spyware installed on the phone can
troll calls, text and other data. It can activate the phone’s camera and
microphone and perform all other malicious activities.
Now, the bigger concern is that it doesn’t take long to
“infect” a phone with spyware like Pegasus. For example, you need a WhatsApp
call. And for everything you care about, you didn’t even have to answer it.
Technically, a voice call sent to the target / victim
modifies the data packet. This overflows the WhatsApp application’s internal
buffer, overwriting some of its memory and bypassing the security of the
application. Since then, it’s easy to get control of the phone and its data.
Investigators claim that the “authoritarian government” is
known to create fake Whatsapp accounts to make video calls to targets. The
hacker sent malicious code and automatically installed spyware on the phone
even if the target did not answer the phone.
According to experts, the only way to completely free your
phone from spyware like Pegasus is to dispose of it. Even a “factory reset” may
not be enough to protect your phone.
In this case, the benefit of salvation is that Pegasus was
not used to target the general public. Obviously, only journalists, human
rights activists, and so-called government dissident groups have been
sacrificed.
But as the general public, you can’t afford to be
complacent. You should always be vigilant and adhere to secure technical
protocols (keep all apps up to date, keep away from suspicious sites and links,
and avoid answering calls from unknown numbers).
Comments
Post a Comment