Peagsus Documentation
Peagsus Documentation
A
Seminar Report
On
Pegasus Spyware
SUBMITTED TO:
S. S. AGRAWAL COLLEGE OF COMMERCE
& MANAGEMENT
NAVSARI – 396445
Acknowledgement
P a g e 1 | 11
Pegasus Spyware
Before expressing a single word for the project, we take this
opportunity to thank all those who have helped us directly or
indirectly in making our project feasible and to turn it into a
successful piece of work.
P a g e 2 | 11
Pegasus Spyware
Table of content
P a g e 3 | 11
Pegasus Spyware
Introduction to Spyware
Spyware is a type of malicious software or malware that is
installed on a computing device without the end user's knowledge. It
invades the device, steals sensitive information and internet usage
data, and relays it to advertisers, data firms or external users.
P a g e 4 | 11
Pegasus Spyware
Spyware can be difficult to detect; often, the first indication a
user has that a computing device has been infected with spyware is a
noticeable reduction in processor or network connection speeds and --
in the case of mobile devices data usage and battery life. Antispyware
tools can be used to prevent or remove spyware. They can either
provide real-time protection by scanning network data and blocking
malicious data, or they can execute scans to detect and remove
spyware already on a system.
P a g e 5 | 11
Pegasus Spyware
Introduction to Pegasus
Pegasus is spyware developed by the Israeli cyber-arms
company NSO Group that can be covertly installed on mobile
phones running most versions of iOS and Android. Pegasus is able to
exploit iOS versions up to 14.6, through a zero-click exploit. As of
2022, Pegasus was capable of reading text messages, tracking
calls, collecting passwords, location tracking, accessing the target
device's microphone and camera, and harvesting information from
apps.
Discovery
Pegasus iOS exploitation was identified in August
2016. Arab human rights defender Ahmed Mansoor received a text
P a g e 7 | 11
Pegasus Spyware
message promising "secrets" about torture happening in prisons in the
United Arab Emirates by following a link. Mansoor sent the link
to Citizen Lab of the University of Toronto, which investigated, with
the collaboration of Lookout, finding that if Mansoor had followed
the link it would have jailbroken his phone and implanted the spyware
into it, in a form of social engineering.
P a g e 8 | 11
Pegasus Spyware
P a g e 9 | 11
Pegasus Spyware
P a g e 10 | 11
Pegasus Spyware
How it works?
The Pegasus spyware uses the advantages of zero-days exploits.
P a g e 11 | 11