Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Security › Pegasus can target anyone, here how it changed the world

    Pegasus can target anyone, here how it changed the world

    By Ratnesh ShindeAugust 10, 2021
    Facebook Twitter Reddit LinkedIn
    Pegasus

    In the good old times, the conventional thinking was that if you didn’t want spyware or malware to infiltrate your phone or computer, you shouldn’t click on suspicious links. The common thinking is thrown out the window with the introduction of Pegasus, spyware developed by the Israeli organization NSO Group.

    With spyware like Pegasus, nearly everyone, no matter how cautious they are, has the potential to be infected with and monitored by the program.

    In fact, Israel considers it to be a cyber weapon since it is so strong and stealthy that it can infect phones using zero-click methods. The user is not even aware that they have been infected by the virus.

    Previously, the most effective method of installing spyware on someone’s phone was to trick them into clicking on a link.

    For example, the targeted person may receive a shady message or email in which they are instructed to click on a hyperlink. For example, “click on this link to see the latest stock market prices” may be written in the text.

    Alternatively, there might have been a way in which the user would be requested to download anything from an infected website, such as “install this plug-in” to see the video or read the article, etc.

    All of these techniques were based on the assumption that users would make a mistake. Or that they would be careless enough to click on a link that was provided. Even Pegasus made use of these techniques.

    In 2016, when an activist in the Middle East received a message urging him to click on a link, he instantly became suspicious of the message.

    As a result, he transmitted the communication to Citizen Lab, a Canadian research organization. It was discovered that the message did indeed originate from the Pegasus system and that it was an effort to hack into the activist’s iPhone.

    However, as soon as these techniques were brought to public attention, NSO Group altered the game. According to recent discoveries by Amnesty International, Pegasus is now capable of infecting an iPhone or an Android device using zero-click techniques.

    To put it another way, it doesn’t even require the user to do anything before Pegasus can enter a phone. It may be transmitted as easily as a missed WhatsApp call. WhatsApp fixed the bug in January of this year.

    As a result, Pegasus now communicates with humans using iMessage. Pegasus is downloaded into the user’s phone even if they do not read the email that comes in their inbox.

    The possibilities are terrifying. Now, all that is required to target someone is a phone number that works on a smartphone, which can be obtained from an agency such as NSO or its clients.

    People will find it virtually hard to avoid malware such as Pegasus if they use the zero-click method. A government agency employing the services of an organisation like Pegasus is chasing your phone and you have nothing you can do to stop them.

    The only solution is to keep changing the phone and number, over and over again, until the number gets leaked into the public domain. And it, too, is a temporary solution. Although this technique may be effective in avoiding something as powerful as a government body that utilizes NSO Group tools and infrastructure, there is no assurance that it is effective.

    It has become more difficult to distinguish between privacy and surveillance now that the stakes have been raised, and monitoring has gained the upper hand.

    This is why both Amnesty International and Edward Snowden, who has firsthand experience with Pegasus-like tools through his work with the National Security Agency in the United States, are pushing for a ban on the sale and dissemination of cyber weapons.

    Otherwise, it would be difficult to eradicate security flaws that spyware like Pegasus exploit, and given since they don’t even require any human input before they can begin eavesdropping on the phone, there would be no practical method to prevent them from doing so.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Ratnesh Shinde

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.