- Accepting a prompt or pop-up without reading it first.
- Downloading software from an unreliable source.
- Opening email attachments from unknown senders.
- Pirating media such as movies, music, or games.
- Clicking a link to a malware-laden website.
Spyware can be incredibly dangerous if you’ve been infected. Threats can range from mild inconveniences to long-term financial damage. Among these problems, below are some of the most common:
Data Theft and Identity Fraud
First, and perhaps most importantly, spyware can steal personal information that can be used for identity theft. If malicious software has access to every piece of information on your computer, it can harvest more than enough information to imitate your identity. Information used for this purpose includes browsing history, email accounts, and saved passwords for online banking, shopping, and social networks. Also, if you've visited online banking sites, spyware can siphon your bank account information or credit card accounts and sell it to third parties — or use them directly.
Computer Damages
More commonly, you will face the damage spyware can do to your computer. Spyware can be poorly designed, leading to system-draining performance. The lack of performance optimization can take up an enormous amount of your computer's memory, processing power, and internet bandwidth. As a result, infected devices may run slowly and lag in between applications or while online. Worse cases include frequent system crashing or overheating your computer, causing permanent damage. Some spyware can even disable your internet security programs.
Disruptions to Your Browsing Experience
Spyware can also manipulate search engine results and deliver unwanted websites in your browser, which can lead to potentially harmful websites or fraudulent ones. It can also cause your home page to change and can even alter some of your computer's settings. Pop-up advertisements are an equally frustrating issue that accompanies some types of spyware. Advertisements may appear even when offline, leading to inescapable annoyances.
What does Pegasus do?
Pegasus allows the extraction of complete data- including historical.
In Simple words, initial extraction sends SMS records, contacts, call history, messages, and browsing history to the command-and-control server.
From an infected device, it also makes available a whole set of active collection features that allow an attacker to take real-time actions on the target and retrieve unique information from the device and the surrounding area in its location.
Examples of active extractions include:
- GPS-based
location tracking: If GPS is disabled by a target, Pegasus enables it for
sampling and immediately turns it off. If no GPS signal is accessible,
Cell-ID is retrieved.
- Environmental sound recording: Pegasus ascertains if the phone is in idle mode before turning on the microphone through an incoming silent call. Any action by the target that turns on the phone screen results in an immediate call hang-up and terminates the recording.
- Photo taking: Both front and rear cameras can be used after Pegasus ascertains that the phone is in idle mode. The quality of the photo can be pre-determined by an attacker to reduce data use and ensure faster transmission. NSO cautions that since the flash is never used and the phone might be in motion or in a low-lit room, photos can at times be out of focus.
- Rules and alerts: A number of conditions can be pre-set for real-time action, such as geofencing alerts (target enters or exits a defined location), meeting alerts (when two devices share the same location), connection alerts (a call or message sent or received to/from a specific number), and content alert (a specific word used in a message), etc.
Use of Pegasus
On August 23, 2020, according to intelligence obtained by the Israeli newspaper Haaretz, NSO Group sold Pegasus spyware software for hundreds of millions of US dollars to the United Arab Emirates and the other Gulf States, for surveillance of anti-regime activists, journalists, and political leaders from rival nations, with encouragement and mediation by the Israeli government.
Later, in December 2020, the Al Jazeera investigative show The Tip of the Iceberg, Spy partners, exclusively covered Pegasus and its penetration into the phones of media professionals and activists; and its use by Israel to eavesdrop on both opponents and allies.
NSO Group’s spyware has been used to facilitate human rights violations around the world on a massive scale, according to a major investigation into the leak of 50,000 phone numbers of potential surveillance targets.
These include heads of state, activists, and journalists, including Jamal Khashoggi’s family.
The Pegasus Project is a ground-breaking collaboration by more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories, a Paris-based media non-profit, with the technical support of Amnesty International, who conducted cutting-edge forensic tests on mobile phones to identify traces of the spyware.
No comments:
Post a Comment