Understanding Pegasus, The Virus That Transforms A Phone Into A Spy

Decoding the software being used to monitor 1,400 people

offline
Decoding the software being used to monitor 1,400 people

On 29 October 2019, Facebook filed a lawsuit against the makers of Pegasus, the much-talked-about spyware that was allegedly used to hack the smartphones of around 1,400 individuals worldwide through WhatsApp, the messaging service owned by Facebook. 

The creator of the spyware, which is supposed to be licensed only to governments, is the Israeli firm NSO Group. With more than 1.5 billion users of WhatsApp globally, the prospect of being spied upon has sent shockwaves around the world.

In its complaint filed in a California court, Facebook has alleged that between April 2019 and May 2019, NSO Group Technologies used WhatsApp servers, located in the United States and elsewhere, to send malware to "approximately 1,400 mobile phones and devices (‘target devices’).” It goes on to allege that the virus was designed to infect the ‘Target Devices’ for "conducting surveillance" on specific WhatsApp users. 

Facebook goes on to state that this was in violation of “WhatsApp’s Terms of Service.” 

How does Pegasus work?

According to Greek mythology, Pegasus was a winged horse. But the software named after it likes to work in the shadows of a phone gliding effortlessly through it without the owner’s knowledge.

Experts say that the virus is so powerful that it installs itself on a phone without the 'targeted device' holder even having the slightest inkling about it. An innocuous text message with a web-link that you may open to read or a WhatsApp call that you may or may not answer is enough for the program to infect your device. The virus, then, like in a sci-fi movie, can take control of the phone and snoop in on all mail, audio, video and text exchanges conducted on it. It can even record offline conversations between conversing people in the vicinity of the phone and take pictures with the phone’s camera. All of this is controlled re...

Read more!