Professional Documents
Culture Documents
CIA-3
on
Infographics on Social or Ethical Issues
By
Anchal Dugar- 2127535
Under the Guidance of
Prof. Saba Fatma
MBA PROGRAMME
SCHOOL OF BUSINESS AND MANAGEMENT
CHRIST (DEEMED TO BE UNIVERSITY), BANGALORE
OCTOBER 2021
Software used for Data
Theft and Privacy
Invasion by
impacted.
trust.
scandal.
PEGASUS SPYWARE
- Software used for Data Theft and Privacy Invasion by NSO Group
INTRODUCTION
NSO Group Technologies is an Israeli technology company. It was founded in 2010 by Niv
Carmi, Omri Lavie, and Shalev Hulio. The company provides technological help to
government agencies to detect and prevent terrorism and crime. It is based in Herzliya, near Tel
Aviv, Israel.
As per their website, their products have been successfully used to:
Prevent terrorism, including gun violence, car bombs, and suicide bombers at
transportation hubs, public parks, markets, concert venues, sports arenas, and other
public areas
Break up paedophilia, sex- and drug-trafficking rings, and money-laundering
operations
Find and rescue kidnapped children
Assist emergency search and rescue (SAR) teams in locating survivors trapped under
collapsed buildings in the wake of natural disasters or construction failures
ABOUT PEGASUS SPYWARE
End-to-end encryption is a technology that ascents messages on one’s phone and unscrambles
them only on the recipients’ phones, which means anyone who intercepts the messages in
between cannot read them. A lot of software uses this technology like Facebook, WhatsApp,
Google, Twitter, etc. This technology works well for protecting our privacy. But it is does not
work well in favour of the government as it makes it difficult for them to track criminals, spy
on people.
The firm NSO Group somehow altered this. Pegasus is one of the leading products. It is defined
as malware that can infiltrate a smartphone and access all of its features, including the camera
and microphone. It was found to infiltrate iOS and android and Blackberry Operating System.
How Does it Work?
Pegasus was previously deployed on cell phones through flaws in widely used applications or
spear-phishing. It includes fooling a target user into following a link or opening a document
that covertly instals the malware.
If an agent can take the target's phone from a nearby wireless transmitter, it can also be
deployed manually. The spyware can be installed on cell phones via a missed call on
WhatsApp. They can even remove the missed call's record, making it difficult for the phone's
owner to notice anything is wrong. Another mode is to send a message to a user's phone that
does not result in a notice. All the spyware needs are a particular operating system installed on
the device and it will find the vulnerabilities and infiltrate. This kind of infiltration is called
“zero-click exploit”.
Once the spyware is installed, it can harvest any data from the device and send it back to the
hacker. It can steal phots, record videos, turn on the microphone as per its convenience and
listen the conversation, web searches, communication, passwords, call logs, etc.