BAFL 52.51 Increased By ▲ 2.48 (4.96%)
BIPL 22.80 Increased By ▲ 0.39 (1.74%)
BOP 5.68 Increased By ▲ 0.26 (4.8%)
CNERGY 5.09 Increased By ▲ 0.04 (0.79%)
DFML 19.35 Increased By ▲ 0.17 (0.89%)
DGKC 80.80 Increased By ▲ 0.65 (0.81%)
FABL 33.10 Increased By ▲ 0.25 (0.76%)
FCCL 20.23 Decreased By ▼ -0.02 (-0.1%)
FFL 10.57 Increased By ▲ 0.92 (9.53%)
GGL 13.62 Increased By ▲ 0.02 (0.15%)
HBL 130.17 Increased By ▲ 8.83 (7.28%)
HUBC 122.62 Increased By ▲ 0.12 (0.1%)
HUMNL 8.05 Increased By ▲ 0.05 (0.63%)
KEL 4.45 Increased By ▲ 0.48 (12.09%)
LOTCHEM 27.92 Decreased By ▼ -0.16 (-0.57%)
MLCF 42.70 Increased By ▲ 0.50 (1.18%)
OGDC 125.61 Increased By ▲ 4.28 (3.53%)
PAEL 21.35 Increased By ▲ 1.12 (5.54%)
PIBTL 6.12 Increased By ▲ 0.32 (5.52%)
PIOC 118.00 Increased By ▲ 2.10 (1.81%)
PPL 113.85 Increased By ▲ 3.10 (2.8%)
PRL 31.80 Increased By ▲ 2.22 (7.51%)
SILK 1.10 Increased By ▲ 0.02 (1.85%)
SNGP 69.40 Increased By ▲ 0.37 (0.54%)
SSGC 13.72 Increased By ▲ 0.02 (0.15%)
TELE 9.24 Increased By ▲ 0.49 (5.6%)
TPLP 14.75 Increased By ▲ 0.08 (0.55%)
TRG 92.85 Increased By ▲ 1.55 (1.7%)
UNITY 27.50 Increased By ▲ 0.25 (0.92%)
WTL 1.66 Increased By ▲ 0.03 (1.84%)
BR100 6,815 Increased By 167.1 (2.51%)
BR30 24,245 Increased By 677 (2.87%)
KSE100 66,224 Increased By 1505.6 (2.33%)
KSE30 22,123 Increased By 529.1 (2.45%)

Governments around the world are facing bombshell allegations that they used Israeli-made malware to spy on the phones of activists, journalists, corporate executives and politicians.

But how exactly does the Pegasus spyware work? How does it get onto people's phones - and what can it do once it's there?

Researchers believe that early versions of the hacking software, first detected in 2016, used booby-trapped text messages to install itself onto the phones of targets.

The recipient would have to click on a link in the message in order for the spyware to download.

But this limited the chances of a successful installation - particularly as phone users have grown increasingly wary of clicking on suspicious links.

More recent versions of Pegasus, developed by the Israeli firm the NSO Group, have exploited weak spots in software commonly installed on mobiles.

In 2019, the messaging service WhatsApp sued NSO, saying it used one of these so-called "zero-day vulnerabilities" in its operating system to install the spyware on some 1,400 phones.

By simply calling the target through WhatsApp, Pegasus could secretly download itself onto their phone - even if they never answered the call.

More recently, Pegasus is reported to have exploited weaknesses in Apple's iMessage software.

That would potentially give it access to the one billion Apple iPhones currently in use - all without the owners needing to even click a button.

"Pegasus is probably one of the most capable remote access tools there is," said Alan Woodward, cybersecurity professor at the University of Surrey in the UK.

"Think of it as if you've put your phone in someone else's hands."

It can be used to read the target's messages and emails, look through the photos they've taken, eavesdrop on their calls, track their location and even film them through their camera.

Pegasus' developers have got "better and better at hiding" all trace of the software, making it difficult to confirm whether a particular phone has been bugged or not, Woodward said.

That is why it remains unclear how many people have had their devices tapped, although new reports by international media say more than 50,000 phone numbers had been identified as being of interest to NSO clients.

However, Amnesty International's Security Lab, one of the organisations investigating Pegasus, said it had found traces of successful attacks on Apple iPhones as recently as this month.

Multi-billion-dollar tech companies like Apple and Google invest vast amounts of cash each year in making sure they aren't vulnerable to hackers who could bring their systems crashing down.

They even offer "bug bounties" to hackers, paying handsome rewards if they warn the company about flaws in their software before they can be used to launch an attack.

Woodward said Apple, which prides itself on a reputation for security, had "made some fairly big efforts" to identify weak spots.

But "inevitably there will be one or two" flaws in such complex software.

Analysts also believe NSO, whose staff includes elite former members of the Israeli military, likely keeps a close eye on the dark web, where hackers frequently sell information about security flaws they have found.

"It's also worth saying that not everyone has an up-to-date phone with up-to-date software on it," Woodward added.-AFP

Comments

Comments are closed.

Pegasus spyware: how does it work?

Palestinian Authority working with US on postwar plan for Gaza

Inter-bank: rupee sees 9th consecutive gain against US dollar

Open market: rupee stable against US dollar

ECP issues notice to PTI regarding petitions challenging intra-party polls

OGDCL discovers hydrocarbon reserves in Sindh

Supporting agriculture sector: SBP greenglights HBL’s Zarai Services

US criticizes Israel on Gaza civilian toll as UN to hear ceasefire demand

Oil heads for 7th weekly loss with supply surplus, weak China demand

Pakistan face Abrar’s injury scare ahead of first Australia Test

Gold price per tola down Rs300 in Pakistan