Hacked!! Hacked!! Who Done this? How they DO this to us??????

I’ll ask you one question before going into the topic.

“What do you do if you’re phone is hacked?”

Some of us said that you can’t say any good words! Always HACKING! Did you know how many details are on my phone! If anything happens to it, then it makes me crazy! Stop your nonsense!

Some of us think that there are no details on my phone, even it is hacked the hacker will be ashamed of himself.

Apart from these entire things, even the nanosecond of time you feel very afraid right.  But we are known that all hackers are not bad through our previous article. Even we know all the details about feeling the fear inside us when we hear the term. Let’s think that the percentage of this fear is 10% but after read, these ones you fear will go beyond the universe. Because this one makes me feel like that so the same will apply to you too. So no more suspense let’s get started.

While we hear the word hacking is the first thing that comes to our mind is for stealing our personal data and misuse it. So we all have some fear over it. Did you know how hacking is done? Some of us say it’s done by clicking the malicious URL, some of us say it’s done while we open the spam content. This is the basic or traditional way of hacking but here we discuss the hacking that falls beyond our imagination. Yes, this one is beyond reality, because in day-to-day life the advancement of technology is unimaginable the same will apply for security threats also. Before going to the definition part, we must know the name of this one, it is Pegasus.

It is not the name of the person who invented it. Basically, it is the software or the spyware that is developed, marketed, and licensed by the Israeli company NSO group which is well known for its expertise in creating specialized cyber weapons. It has the capability to infect billions of phones running either iOS or Android OS. It is the most powerful piece of spyware ever developed because once it has wormed its way onto the phone, without you noticing, then it turns itself into a 24 – hours surveillance camera. It can copy the message you send and receive, harvest your photos, and record your calls. Apart from these the most important threat of this one is it might secretly view your day-to-day activities through your camera or activate the microphone to record your conversation even if it is in sleep mode. Overall, it can potentially pinpoint where you are, what you do, and who you’ve met. I think after heard all these you start to think you’re in the Sci-Fi movies but it is not a movie but it happens in real, it happens around us.

How do you feel right now? Amused right!!

Now you understand the definition alone even this make you amused then the following working process will make you faint. I think you’re the one who faints for this. Let’s dig it.

Basically NSO’s attack capabilities have become more advanced. Same as that Pegasus infections can be achieved through the so-called “zero-click” attacks, which means it does not require any interaction from the phone’s owner in order to make it activate. Otherwise, it can activate itself. For example, one single missed call can install the software on the target phone which then deletes the call log entry to ensure that the victim of the hacking remains unaware. Once it is installed, then it takes control over the target phone, starts to work seamlessly.

OMG!!!! What do you think about this? Now the following question arises your mind:

“If it is the bigger threat to us, then why the government can’t take any action against it?”

Basically this one is discovered by Whatsapp, it files a case against the NSO in 2019. But they said this one was created to surveillance the illegal activities and it is only sold to the government, not for the individuals.

Hey if it is in 2019, then why it is trending today?

Because In recent times some journalists make the research on it. On that research they found the shocking things, that there are more than 50,000 of people devices are hacked using these ones and all these people have the influence over the society. This makes it the trending one. But these all results are claims not verified ones. Even these claims will make very furious right, even those celebrities have no privacy, then what about us?

I think this is enough. Because now you can understand the concept. Hereafter you have to do one thing about it that is what we have to do?

If we are in those situations, let me know your thought through the comments section.

Thank you for reading!!!

If you think the content given here is valuable, then share it with your friends and colleagues.

At the same, if you found any corrections, share them with me through the comments section.

Once again thank you for reading!!!

Hide and Seek

Here we explore the hidden gems in the technical world.

Post a Comment

Previous Post Next Post