I’ll ask you one question before going into the topic.
“What do you
do if you’re phone is hacked?”
Some of us
said that you can’t say any good words! Always HACKING! Did you know how many
details are on my phone! If anything happens to it, then it makes me crazy! Stop
your nonsense!
Some of us
think that there are no details on my phone, even it is hacked the hacker will
be ashamed of himself.
Apart from
these entire things, even the nanosecond of time you feel very afraid right. But we are known that all hackers are not bad
through our previous article. Even we know all the details about feeling the fear
inside us when we hear the term. Let’s think that the percentage of this fear
is 10% but after read, these ones you fear will go beyond the universe. Because this
one makes me feel like that so the same will apply to you too. So no more
suspense let’s get started.
While we
hear the word hacking is the first thing that comes to our mind is for stealing
our personal data and misuse it. So we all have some fear over it. Did you
know how hacking is done? Some of us say it’s done by clicking the malicious
URL, some of us say it’s done while we open the spam content. This is the
basic or traditional way of hacking but here we discuss the hacking that falls
beyond our imagination. Yes, this one is beyond reality, because in day-to-day life the advancement of technology is unimaginable the same will apply for security threats also. Before going to the definition part, we must know
the name of this one, it is Pegasus.
It is not
the name of the person who invented it. Basically, it is the software or the
spyware that is developed, marketed, and licensed by the Israeli company NSO
group which is well known for its expertise in creating specialized cyber
weapons. It has the capability to infect billions of phones running either iOS
or Android OS. It is the most powerful piece of spyware ever developed because
once it has wormed its way onto the phone, without you noticing, then it turns
itself into a 24 – hours surveillance camera. It can copy the message you send
and receive, harvest your photos, and record your calls. Apart from these the
most important threat of this one is it might secretly view your day-to-day
activities through your camera or activate the microphone to record your
conversation even if it is in sleep mode. Overall, it can potentially pinpoint
where you are, what you do, and who you’ve met. I think after heard all these you
start to think you’re in the Sci-Fi movies but it is not a movie but it happens in real, it happens around us.
How do you
feel right now? Amused right!!
Now you
understand the definition alone even this make you amused then the following working
process will make you faint. I think you’re the one who faints for this. Let’s
dig it.
Basically NSO’s
attack capabilities have become more advanced. Same as that Pegasus infections
can be achieved through the so-called “zero-click” attacks, which means it does
not require any interaction from the phone’s owner in order to make it
activate. Otherwise, it can activate itself. For example, one single missed
call can install the software on the target phone which then deletes the call
log entry to ensure that the victim of the hacking remains unaware. Once it is installed, then it takes control over the target phone, starts to work
seamlessly.
OMG!!!! What
do you think about this? Now the following question arises your mind:
“If it is the bigger threat to us, then why the government can’t take any action against it?”
Basically this
one is discovered by Whatsapp, it files a case against the NSO in 2019. But they
said this one was created to surveillance the illegal activities and it is only
sold to the government, not for the individuals.
Hey if it is
in 2019, then why it is trending today?
Because In recent times some journalists make the research on it. On that
research they found the shocking things, that there are more than 50,000 of people
devices are hacked using these ones and all these people have the influence
over the society. This makes it the trending one. But these all results are
claims not verified ones. Even these claims will make very furious right, even
those celebrities have no privacy, then what about us?
I think this
is enough. Because now you can understand the concept. Hereafter you have to do
one thing about it that is what we have to do?
If we are in those situations, let me know your thought through the comments section.
Thank you
for reading!!!
If you think
the content given here is valuable, then share it with your friends and
colleagues.
At the same,
if you found any corrections, share them with me through the comments section.
Once again
thank you for reading!!!