Will Cathcart, WhatsApp CEO put out a tweet and urged the governments to hold abusers of spyware responsible
Human rights defenders, tech companies and governments must work together to increase security and hold the abusers of spyware accountable. Microsoft was bold in their actions last week https://t.co/dbRgdfTIcAWhat makes the software worrisome is that its installation is covert and hard to trace. There are a variety of exploits that Pegasus can use to slither its way into a phone. How does Pegasus work? There are a variety of exploits that Pegasus targets to install itself onto a smartphone. The simplest way is to get the user to click on an infected link or use a voice call vulnerability in WhatsApp that allows installation simply by placing one missed call. The tool also deletes the call logs afterwards, so you have no way of knowing what happened. The more recent traces have used an exploit called zero-click. This vulnerability allows Pegasus to become operational without needing any user input. On iPhones, this was possible using a weakness in the mail app where a threat actor could send remote code with mail that consumed large amounts of memory. Apple reportedly patched this in 2020. On Android, this exploits the operating system's graphics library. A threat actor could send hundred's of multimedia messages and brute force its way into Android's memory system to run remote code. Google and Samsung both confirmed that they had patched this bug. Other exploits include Apple's Wireless Device Link, the peer-to-peer networking protocol used by iOS devices to talk to each other. Apple acknowledged that it was powerful enough to shut off and reboot systems before being patched. Despite the security updates and patches, Amnesty international confirmed that Pegasus still managed to infiltrate Android and iPhones as recently as July 2021. Once Pegasus finds its way onto a smartphone, it operates with all possible permissions. It can track your call logs, monitor your calls, access your camera to record video and use your microphone to record audio. It can read your browsing history and collect information on your app activities. It can read your inputs and, it can even use your GPS to track your current location.All of the data from the smartphone is extracted and sent to the threat actor. This process is invisible and hard to detect.— Will Cathcart (@wcathcart) July 18, 2021
The implication that government's around the world use Pegasus to spy on innocent journalists and activists is chilling. With our thoughts already soured by this revelation, we can only guess what lies behind the curtain.
Discover the latest Business News, Sensex, and Nifty updates. Obtain Personal Finance insights, tax queries, and expert opinions on Moneycontrol or download the Moneycontrol App to stay updated!
Find the best of Al News in one place, specially curated for you every weekend.
Stay on top of the latest tech trends and biggest startup news.