{"id":11984,"date":"2021-07-08T00:00:00","date_gmt":"2021-07-08T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/08-07-2021\/spyware-pegasus\/"},"modified":"2021-07-08T00:00:00","modified_gmt":"2021-07-08T00:00:00","slug":"spyware-pegasus","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/08-07-2021\/spyware-pegasus","title":{"rendered":"Spyware Pegasus"},"content":{"rendered":"<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Recently, an online database about the use of the spyware Pegasus was launched.<\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>About<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">It is launched by <\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Forensic Architecture, Amnesty International<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> and the <\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Citizen Lab<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> to document attacks against human rights defenders.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">It showed the connections between \u2018digital violence\u2019 of Pegasus spyware and the real-world harms lawyers, activists, and other civil society figures face.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Significance of Database<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">The online platform is one of the <\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>most comprehensive databases<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> on NSO-related activities, with information about-<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">export licenses,\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">alleged purchases,\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">digital infections, and<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">the physical targeting of activists after being targeted with spyware, including intimidation, harassment, and detention.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">The platform also sheds light on the complex corporate structure of NSO Group, based on new research by Amnesty International and partners.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Spyware Pegasus<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Pegasus<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> is spyware that can be installed on devices running some versions of iOS, Apple&#8217;s mobile operating system, as well on devices running on Android.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">It was developed by the <\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Israeli cyberarms firm NSO Group<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Functioning:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It mainly uses Exploit Links for its working. Clicking on such links automatically installs Pegasus on the user&#8217;s phone. The method of Social Engineering is used.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Challenges with Pegasus<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Unlimited access to target&#8217;s mobile devices:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It collects information remotely and covertly about target&#8217;s relationships, location, phone calls, plans, and activities whenever and wherever they are. It tracks targets and gets accurate positioning information using GPS.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Intelligence gaps:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Collects unique and new types of information (e.g., contacts, files, environmental wiretap, passwords, etc.) to deliver the most accurate and complete intelligence.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Intercepting calls:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It transparently monitors voice and VoIP calls in real-time.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Decoding encrypted content:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It overcomes encryption, SSL, proprietary protocols and any hurdle introduced by the complex communications world.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Application monitoring:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Monitors a multitude of applications including Skype, WhatsApp, Viber, Facebook and Blackberry Messenger (BBM).<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Bypassing Service provider:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> No cooperation with local Mobile Network Operators (MNO) is needed to attack. It constantly monitors the device without worrying about frequent switching of virtual identities and replacement of SIM cards<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Avoids unnecessary risks:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> The spyware eliminates the need for physical proximity to the target or device at any phase.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Terrorist activities: <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Terrorists and other anti-social elements have started using more cyberspace which provides them with more getaways.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Digital Attacks:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Pegasus had been used in some of the \u201cmost insidious digital attacks\u201d on human rights activists in the world.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Ways to Secure Devices from Pegasus<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Regular Updates:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Always update the operating system to the latest version. Apple and Google regularly release updates which include security patches for vulnerabilities and malware. Both Apple and Google have released fixes for Pegasus.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Remain Careful &#038; Vigilant:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Pegasus spyware (as well as all sorts of other malware) infiltrates phones by way of the phone user clicking a link in a text message, email, Twitter post, or any other means. When receiving any message with a link, make sure one is familiar with the person sending the link and actually verify that the message along with the link is coming from the authorized person.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Secure Communications:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It is critical to maintain secure communications including calls and messages that are not vulnerable to Pegasus and other malware. Secure calls and messages will ensure secure communication even when spyware infiltrates phones and one is \u201cunder mobile surveillance.\u201d<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align:justify\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Source<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">: <\/span><\/span><\/span><a href=\"https:\/\/www.thehindu.com\/news\/national\/new-online-platform-maps-pegasus-spread\/article35185350.ece\" style=\"text-decoration:none\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#1155cc\"><u>TH<\/u><\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News Recently, an online database about the use of the spyware Pegasus was launched. About It is launched by Forensic Architecture, Amnesty International and the Citizen Lab to document attacks against human rights defenders. It showed the connections between \u2018digital violence\u2019 of Pegasus spyware and the real-world harms lawyers, activists, and other civil society [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11985,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[75,122,26,123],"class_list":["post-11984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-challenges-to-internal-security","tag-communication-networks","tag-gs-3","tag-media-social-networking-sites"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/3701693current-affairs.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/11984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=11984"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/11984\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/11985"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=11984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=11984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=11984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}