Solar Energy News  
CYBER WARS
Pegasus spyware: how does it work?
By Katy LEE
Paris (AFP) July 19, 2021

Governments around the world are facing bombshell allegations that they used Israeli-made malware to spy on the phones of activists, journalists, corporate executives and politicians.

But how exactly does the Pegasus spyware work? How does it get onto people's phones -- and what can it do once it's there?

How does Pegasus sneak its way onto a phone?

Researchers believe that early versions of the hacking software, first detected in 2016, used booby-trapped text messages to install itself onto the phones of targets.

The recipient would have to click on a link in the message in order for the spyware to download.

But this limited the chances of a successful installation -- particularly as phone users have grown increasingly wary of clicking on suspicious links.

More recent versions of Pegasus, developed by the Israeli firm the NSO Group, have exploited weak spots in software commonly installed on mobiles.

In 2019 the messaging service WhatsApp sued NSO, saying it used one of these so-called "zero-day vulnerabilities" in its operating system to install the spyware on some 1,400 phones.

By simply calling the target through WhatsApp, Pegasus could secretly download itself onto their phone -- even if they never answered the call.

More recently, Pegasus is reported to have exploited weaknesses in Apple's iMessage software.

That would potentially give it access to the one billion Apple iPhones currently in use -- all without the owners needing to even click a button.

What does the malware do once it's installed?

"Pegasus is probably one of the most capable remote access tools there is," said Alan Woodward, cybersecurity professor at the University of Surrey in the UK.

"Think of it as if you've put your phone in someone else's hands."

It can be used to read the target's messages and emails, look through the photos they've taken, eavesdrop on their calls, track their location and even film them through their camera.

Pegasus' developers have got "better and better at hiding" all trace of the software, making it difficult to confirm whether a particular phone has been bugged or not, Woodward said.

That is why it remains unclear how many people have had their devices tapped, although new reports by international media say more than 50,000 phone numbers had been identified as being of interest to NSO clients.

However, Amnesty International's Security Lab, one of the organisations investigating Pegasus, said it had found traces of successful attacks on Apple iPhones as recently as this month.

How did NSO develop such powerful spyware?

Multi-billion-dollar tech companies like Apple and Google invest vast amounts of cash each year in making sure they aren't vulnerable to hackers who could bring their systems crashing down.

They even offer "bug bounties" to hackers, paying handsome rewards if they warn the company about flaws in their software before they can be used to launch an attack.

Woodward said Apple, which prides itself on a reputation for security, had "made some fairly big efforts" to identify weak spots.

But "inevitably there will be one or two" flaws in such complex software.

Analysts also believe NSO, whose staff includes elite former members of the Israeli military, likely keeps a close eye on the dark web, where hackers frequently sell information about security flaws they have found.

"It's also worth saying that not everyone has an up-to-date phone with up-to-date software on it," Woodward added.

"Some of the old vulnerabilities that Apple has closed down, and which Google have closed down with Android -- they can still be out there."

Is it possible to remove the spyware?

Since it's extremely difficult to know for sure if your phone is carrying the malware, it's also difficult to know definitively that it has been removed.

Woodward said Pegasus may install itself onto the phone's hardware or into its memory, depending on the version.

If it's stored in the memory, rebooting the phone could in theory wipe it off -- so he recommended that people at risk of being targeted, such as business leaders and politicians, regularly switch their devices off and on again.

"It sounds like overkill to a lot of people, but there is anti-malware software out there for mobile devices," he added.

"If you're someone at risk, you probably want to have some anti-malware software installed on your phone."


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
50,000 phone numbers worldwide on list linked to Israeli spyware
Washington (AFP) July 19, 2021
An Israeli firm accused of supplying spyware to governments has been linked to a list of tens of thousands of smartphone numbers, including those of activists, journalists, business executives and politicians around the world, according to reports. The NSO Group and its Pegasus malware - capable of switching on a phone's camera or microphone, and harvesting its data - have been in the headlines since 2016, when researchers accused it of helping spy on a dissident in the United Arab Emirates. S ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Airbus joins SAF+ Consortium to for sustainable aviation fuels

Cleaner air has boosted US corn and soybean yields

Unlocking the power of the microbiome

Switching it up to make better grass for bioenergy crops

CYBER WARS
Smart cards and robots: Saudi Arabia's 'digital hajj'

Getting dressed with help from robots

Defense Secretary Austin calls for ethical AI development

DARPA Announces Research Teams to Develop Intelligent Event-Based Imagers

CYBER WARS
Wind turbines can be clustered while avoiding turbulent wakes of their neighbors

For golden eagles, habitat loss is main threat from wind farms

Shell, France's EDF to build US offshore windfarm

Wind and the sun power Greek islands' green energy switch

CYBER WARS
Ford, Lyft to collaborate on autonomous ride-hailing venture

Self-driving car startup Aurora on road to going public

Will drivers get burned by EU ban on ICE cars?

UK publishes plans to decarbonise transport by mid-century

CYBER WARS
Tesla mints nickel deal with Aussie mining giant

Plans drafted for another UK battery gigafactory

Nissan announces UK battery gigafactory, new electric car

UK auto sector embraces electric car 'gigafactories'

CYBER WARS
Framatome achieves milestone in development of advanced fuel technology

GE Hitachi Nuclear Energy Invests in Ontario Jobs

Slovenia issues permit for second nuclear reactor

Steam Generating Team JV contracted to replace Units 3 and 4 at Bruce NPP

CYBER WARS
Powering Iraqi homes one switch at a time

Low-cost, sustainable, readily available plasma technology could replace one of the world's rarest materials

Covid recovery to drive all-time emissions high: IEA

Electricity demand growing faster than renewables: IEA

CYBER WARS
UNESCO removes DR Congo park from endangered list

NASA study finds tropical forests' ability to absorb carbon dioxide is waning

20% of intact tropical forests overlap with extractive industries

Environment watchdogs oppose lifting of DR Congo logging ban









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.