
Then there are the other aspects that make Pegasus an extremely sophisticated software.įor one, Pegasus “ self-destructs ” if it can’t communicate with the hacker’s control centre for over 60 days or if it “detects” that it has been installed on a device with the wrong SIM card since NSO made Pegasus for targeted spying on selected victims, not just anyone. The hacker can then communicate with the Pegasus spyware via the remote command centre and issue directions for what information the spyware should send back to the hacker’s server.Īccording to The Citizen Lab, in this way Pegasus can be used to gather a vast amount of victim information: “Passwords, contact lists, calendar events, text messages, and live voice calls from popular mobile messaging apps.”Īccording to this report, “Pegasus could even listen to encrypted audio streams and read encrypted messages”.
TEN TEC PEGASUS USED DOWNLOAD
In short, keep an eye out for text messages.Ī hacker would typically try to infect a victim’s device with Pegasus using a phishing link, mostly sent via a text message that looks innocent and benign.Ĭlicking on the phishing link would (without the victim’s knowledge) start the download of Pegasus on the device and set up a connection with a hacker’s command computer that could be thousands of miles away.
TEN TEC PEGASUS USED LICENSE
The report, citing sources, adds that it costs about $7-8 million per year to license Pegasus.Īlso read: How corruption cuts both ways in Russia’s surveillance state In all, according to this report, Pegasus “ can monitor up to 500 phones in a year, but can only track a maximum of 50 at one go”.
TEN TEC PEGASUS USED SOFTWARE
To make matters worse, those operating the software can even turn on a phone’s camera and microphone to capture activity in the phone’s vicinity. Pegasus, in fact, is widely sought after because it can hack into iPads and iPhones despite Apple products being touted to be among the safest and best for data privacy. Spyware such as Pegasus is designed to gain access to your device, without your knowledge, and gather personal information and relay it back to whoever it is that is using the software to spy on you.Īccording to this report, Pegasus is the “the ultimate spyware for iOS and Android”, and has been behind the “most sophisticated attack ever seen”īut then are Apple products immune to these attacks? In simple terms, no. Pegasus is a type of malicious software or malware classified as a spyware.

But what really is Pegasus? How does it operate? Who uses the software? And why has it earned the reputation of being behind the most sophisticated spyware attacks?Īlso read: Pegasus: Phones of 40 journalists from Indian Express, Hindu, HT & Wire tapped, says report
