In recent times when everything is digital, you have Alexa, Siri & Google to switch off and on your devices, IoT is trending, CCTV is everywhere for surveillance, even your GPS always gives your Geolocation to network service providers, and Cookies help you view whatever you search. In similar terms this technology is harmful also as if you download any corrupt software, your privacy is compromised, any virus in your phone and your data is lost, spyware or ransomware in your mobile devices and your data is leaked and someone else has control over it.
The spyware has multi-functionality that It can record and grab the screen image of whatever content is being displayed, It can enter in all the applications downloaded on your device and can read events, SMS’s, and messages of Instant Messengers. It doesn’t stop here, it can also read your mails, contact lists, dialing history, and record calls of specific contacts and get access to the same.
So Why is Pegasus taking so much getting media attention?
Pegasus is used as a monitoring tool and high-profile Government ministers, officers, human rights activists, reporters, opposition leaders, and even Heads of State are targeted. So Pegasus is designed to barge on target person device, collect all data of them, and transfer it to the source or Bad Actors via cryptographic routes. It is possible that Bad Actors are cybercriminals looking for monetary gains or a group of people backed by nation-states who are investigating loopholes and planned activities. The latter is known as Advanced Persistent Threats (APTs). APTs are storing a high level of sophistication, resources, and plans.
How does it work?
Pegasus exploits undiscovered vulnerabilities, and bugs, in devices OS, may that be Windows, Android, or iOS. This means a device could be contagious even if it has the latest security patch installed.

Prevention & Mitigation
Pegasus spyware (as well as all sorts of other malware) infiltrates phones by way of the phone user clicking a link in a text message, email, Twitter post, or any other means.
1. An older version of the spyware infected smartphones using a method called “spear-fishing”: A malicious link was passed via text messages or emails to the target. The spyware is used to get activated by clicking the link. When receiving any message with a link, make sure you are familiar with the person sending the link and actually verify that the message along with the link is coming from the person you believe has sent it.
If you need to check a link, please make sure you are using a reputed Search Engine like Google or MSN and follow the link mentioned in the search results.
Keep security settings of your browser on as sometimes even browsers can detect malicious links and alert you.
Disconnect your devices from the network, remove the sim card and switch the device off, to prevent further spread in case you identify the spyware being in your phone.
2. Always update your operating system to the latest version. Apple and Google regularly release updates which include security patches for vulnerabilities and malware.
3. In case you are in doubt of a Pegasus or any Spyware attack, Cybersecurity has introduced vulnerability management services for mobile and web apps. Visit us on cybersecuritylink.com.au/services
Comentarios