{"id":7655,"date":"2022-08-29T00:00:00","date_gmt":"2022-08-29T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/29-08-2022\/pegasus-spyware\/"},"modified":"2022-08-29T00:00:00","modified_gmt":"2022-08-29T00:00:00","slug":"pegasus-spyware","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/29-08-2022\/pegasus-spyware","title":{"rendered":"Pegasus Spyware"},"content":{"rendered":"<h1><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong><u>In News\u00a0<\/u><\/strong><\/span><\/span><\/span><\/h1>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Recently, The Supreme Court-appointed technical committee\u00a0 found no conclusive evidence on use of the Pegasus spyware in phones examined by it.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong><u>Pegasus Spyware<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>What is it? <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Pegasus is the hacking software \u2013 or spyware. It has the capability to infect billions of phones running either iOS or Android operating systems.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>By whom? <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">It is developed, marketed and licensed to governments around the world by the Israeli company NSO Group.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong><u>Techniques<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">The earliest version of Pegasus discovered in 2016, infected phones through <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>spear-phishing<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> \u2013 text messages or emails that trick a target into clicking on a malicious link.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Pegasus infections can also be achieved through \u201czero-click\u201d attacks, which do not require any interaction from the phone\u2019s owner in order to succeed.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">These will often exploit \u201czero-day\u201d vulnerabilities, which are flaws in an operating system that the mobile phone\u2019s manufacturer does not yet know about and so has not been able to fix.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>How can one detect <\/strong><\/span><\/span><\/span><a href=\"https:\/\/www.nextias.com\/current-affairs\/08-07-2021\/spyware-pegasus\" style=\"text-decoration:none\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#1155cc\"><strong><u>Pegasus Spyware?<\/u><\/strong><\/span><\/span><\/span><\/a><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> Amnesty International researchers have developed a tool\u00a0 called <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Mobile Verification Toolkit <\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">(MVT) which\u00a0 is aimed to identify if the Pegasus spyware has targeted your phone.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Source:<\/span><\/span><\/span><a href=\"https:\/\/www.thehindu.com\/news\/national\/of-29-phones-examined-five-infected-with-some-malware-but-does-not-mean-it-is-pegasus-spyware-panel-report-in-supreme-court\/article65808941.ece\" style=\"text-decoration:none\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size:11pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#1155cc\"><u>TH<\/u><\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News\u00a0 Recently, The Supreme Court-appointed technical committee\u00a0 found no conclusive evidence on use of the Pegasus spyware in phones examined by it. Pegasus Spyware What is it? Pegasus is the hacking software \u2013 or spyware. It has the capability to infect billions of phones running either iOS or Android operating systems. By whom? It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7656,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[75,122,26,123],"class_list":["post-7655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-challenges-to-internal-security","tag-communication-networks","tag-gs-3","tag-media-social-networking-sites"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/5311151Screenshot_6.png","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/7655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=7655"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/7655\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/7656"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=7655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=7655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=7655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}