Pegasus Spyware | How Pegasus hacks your phone? | Israel NSO

Abhinav Jain
8 min readJan 3, 2022
Pegasus Spyware

A committee set up by the Supreme Court to look into allegations of human misconduct using the Pegasus spy invited all residents who suspected that their cellphones were targeted to contact several members on January 7.

“The committee is appealing to any Indian citizen who has reasonable grounds to suspect that his or her cell phone is in danger due to a particular use of NSO Group Israel’s Pegasus software to contact a technical committee appointed by the Indian Supreme Court for reasons.

The committee said that if it decided that the motive for the suspect’s involvement was that it would require further investigation, it would ask that person to provide his or her own machine for testing. The work of the committee is supervised by a retired Supreme Court judge, Justice R V Raveendran.

Panel policies:

The court asked the committee to, among other things, determine whether Pegasus was being used on phones or other civilian objects to access database, listen to interviews, and capture information.

After a global media investigation revealed that Pegasus may have been used to identify journalists, activists, officials, and even union ministers, some activists and journalists have moved to the Supreme Court to form a committee to look into the matter.

On October 27, the three-judge bench of India Chief Justice N V Ramana and Judges Surya Kant and Hima Kohli formed a three-member technical committee, chaired by Justice Raveendran.

The court asked the committee to, among other things, determine whether Pegasus was being used on phones or other civilian objects to access database, listen to interviews, and capture information.

It also asked the committee to determine whether the software was acquired by the state or central government, and if the state, institution, or any of its agencies used the software, what rules and procedures were followed.

Encryption is a technology that moves messages to your phone and removes them from recipient phones only, meaning that anyone holding messages in the middle cannot read them. Dropbox, Facebook, Google, Microsoft, Twitter and Yahoo are among the companies apps and services that use encryption.

This type of encryption is good for protecting your privacy, but governments do not like it because it makes it harder for them to trap people, or to track down criminals and terrorists or, as some governments are known, to trap their opponents, protesters and journalists. Enter the Israeli technology company, NSO Group. The company claims to be selling Pegasus to governments only and for the purpose of pursuing criminals and terrorists.

How does this work:

An earlier version of Pegasus was installed on smartphones with high-risk software or criminal identity theft, which involves tricking the target user into clicking on a link or opening a document that encrypts software secretly. It can also be mounted on a wireless transceiver located near the target, or in person if the agent is able to steal the target person’s phone.

Lock icon on smartphone screen:

Pegasus can access a smartphone with the most widely used WhatsApp messaging app without the user’s knowledge. Another way is to send a message to the phone of a user who does not generate a notification.

This means that the latest version of this spyware does not require the smartphone user to do anything. Required for a successful spyware attack and installation to install a specific malicious application or operating system installed on the device. This is known as zero-click exploitation.

It can steal photos and videos, recordings, location records, contacts, web searches, passwords, call logs and social media posts. It also has the ability to turn on cameras and microphones for real-time monitoring without the user’s permission or information.

Who used Pegasus and why:

The NSO Group claims to have created Pegasus only for governments to use in the fight against terrorism and law enforcement. The first reported case of Pegasus was used by the Mexican government in 2011 to track down a notorious drug dealer Joaquín “El Chapo” Guzmán. The tool was also allegedly used to track down people close to the Saudi journalist who was killed by Jamal Khashoggi.

It is not yet clear who or what types of people are being targeted and why. However, many recent reports about Pegasus centers surround a list of 50,000 phone numbers. The list is included in the NSO Group, but the origin of the list is unclear. A statement from Amnesty International in Israel stated that the list included telephone numbers marked as “interesting” for various NSO clients, although it was not known if any of the corresponding calls were actually tracked.

The findings include people who appear to be crossing the NSO Group’s borders to investigate criminal and terrorist acts. These include politicians, civil servants, journalists, human rights activists, business leaders, and members of the Arab royal family.

Other ways your phone can be tracked:

Pegasus is amazing for its cunning and its ability to completely control someone’s call, but it is not the only way people can be processed through their phones. Some of the ways in which phones can help monitor and compromise privacy include location tracking, listening, malware and data collection on sensors.

An electronic device with handles on both sides of the front panel containing buttons and lights as well as a clear picture of the stingray.

Law enforcement agencies use mobile site templates such as StingRay to capture calls from phones near the device. The U.S. Patent and Trademark Office by AP

Governments and telecommunications companies can track the location of a telephone by tracking cellular signals from cell tower transceivers and cell transceiver simulations such as the StingRay device. Wi-Fi and Bluetooth signals can be used to track phones. In some cases, applications and web browsers may determine the location of the phone.

Listening to the media is more difficult to achieve than tracking, but it can happen in cases where encryption is weak or lacking. Some types of malware can compromise your privacy and access your data.

The National Security Agency has sought agreements with technology companies where companies will give the organization exclusive access to their products through backdoors, and reportedly build their own departments. Companies say the backdoors defeat the purpose of the final encryption.

The good news is that, depending on who you are, you probably will not be directed by the government that holds the Pegasus.

Pegasus Project

What exactly is Pegasus?

Developed by Israeli company NSO Group, Pegasus can allow spies access to the infected hard drive and view photos, videos, emails and texts, even in applications that offer encrypted communication, such as Signal.

The software may allow spies to record conversations on or near the phone, using their own cameras and tracking the whereabouts of their users.

No information on the infected device is safe. Pegasus can access files. SMS conversations and encrypted messaging service, address books, call history, calendars, emails and Internet browsing history.

How does it get into the phone?

Previous versions of the software have used cybercrime to infiltrate and hide deep in the system to bypass security utilities. But since then it has been very efficient, and can infect the device even with no clicks — the so-called “zero-click” ability.

When the phone of unsuspecting users rings, a malicious code is sent that installs spyware on the phone. Software is installed or the call is not answered.

The NSO has apparently begun to exploit the risks in Apple’s iMessage software again, putting millions of iPhones at risk of theft.

According to researchers, the attack has been carried out as recently as this month. Once Pegasus is installed on the phone, it is able to retrieve administrative rights from the device, allowing it to do even more things than the device owner.

Security researchers speculate that the newer version of the Pegasus will take up almost all of the device’s temporary memory, rather than its hard drive. Therefore, when the phone is turned off, all the software traces disappear.

How was the spyware found?

The NSO has been under scrutiny since 2016, when the company’s software was allegedly used against a United Arab Emirates rights activist and a Mexican journalist.

Since then, The New York Times reported that the software was used against journalists, rights activists, and policy makers in Mexico and Saudi Arabia.

New reports on Sunday suggest that the company’s software is now being used by more people in more countries than ever before.

Among other things, Pegasus appears to have been used to try to rob at least 37 smartphones of journalists from countries including Azerbaijan, France, Hungary, India and Morocco. Separately, a person familiar with NSO contracts said the NSO plans were sold to the governments of Azerbaijan, Bahrain, India, Mexico, Morocco, Saudi Arabia and the UAE.

The journalists’ union, led by Paris-based not-for-profit Forbidden Stories, has linked the NSO to a leaked list of more than 50,000 mobile phone numbers from more than 50 countries that it says are seen as the company’s proposed surveillance targets.

Some Facts Related To This Topic:

1)Pegasus spyware, developed by Israeli cyber arms company NSO Group, can be encrypted on mobile devices running multiple versions of iOS and Android.

2. In 2019 WhatsApp revealed that the NSO team is sending malware (Pegasus) to over 1,400 phones (Android) by simply placing a WhatsApp call on a targeted device.

3. Cruel Pegasus code can be inserted into the phone, even if the target has not answered the call. The NSO has recently begun to exploit the risks in Apple’s iMessage software.

4. If the iPhone is in danger, it is designed to allow the attacker to gain so-called root rights, or administrative rights, on the device, says Guarnieri (using Amnesty International’s Berlin-based Security Lab) Pegasus can do so. more than the phone owner can do.

5. Once installed on the phone, Pegasus can harvest more or less any information or extract any file. SMS messages, address books, call history, calendars, emails and online browsing history can all be extracted.

6.Security analysts suspect that the latest versions of Pegasus reside only on the phone’s temporary memory, instead of its hard drive, which means that once the phone is enabled, almost every piece of software disappears.

7. All you need to do to save yourself from this spyware is to update your phone’s OS and update your whatsapp and other things.

Stay Safe

--

--