advertisement
Pegasus spyware which targeted at least 40 India journalists, has now evolved from its earlier methods of infecting phones by spear-phishing to ‘zero-click’ attacks– a sophisticated method that provides access to the target smartphone in real time.
A report by The Wire, on Sunday, 19 July, late evening indicated that the numbers of top journalists from well-known media organisations like the Hindustan Times, India Today, Network18, The Hindu and The Indian Express, were hacked by the Israeli spyware.
A zero-click attack is a remote cyber attack which does not require any interaction from the target to compromise it.
Sourajeet Majumder, a cyber security expert, told The Quint that Pegasus spyware eliminates the need for human errors to compromise a device and instead relies on software or hardware flaws to gain complete access to a device.
Typically, cyber attacks infect a target’s mobile device through some form of social engineering trick ie sending a malicious link to the target, which when clicked can make the mobile device vulnerable.
But such attempts can raise the victim’s suspicions and potentially provide a way to identify the perpetrator.
Therefore, Pegasus spyware has been specially designed to bypass the need of any social engineering tactics. These attacks gives threat actors the ability to take over a smartphone in real time without any interaction with the target.
Step-by-Step Methods Used by Attackers:
Threat actors look out for any vulnerability that can be exploited in application available on the target's phone
The attacker then crafts a special data, such as a hidden text message or image file, to inject code in the target's device to compromises the device
Upon successfully compromising the target's device, the message used to exploit the device is now self-destructed so that there is no trace of the spyware
It is important to note that there is a huge difference between the working of zero-click attacks and spear phishing attacks .
Zero-click attacks occur only when an attacker is able to takeover a device remotely after successfully exploiting vulnerabilities in the software and hardware of the phone.
To make this kind of attack successful, an attacker needs to exploit flaws in a device, whereas spear phishing is a social engineering attack where a hacker sends a fraudulent message which is designed to trick a victim into revealing confidential information or to infect their device with a malicious software.
On the other hand, spear phishing attacks are very easy and are often performed but adds uncertainty in any hacking scheme.
Apple’s iOS is a closed system and it does not release its source code to app developers, which means that the owners can't modify the code on their phones themselves. This makes it difficult for hackers to find vulnerabilities on iOS-powered devices.
On the other hand, Android relies on an open-source code, meaning that the owners and manufactures of these devices can tinker with the OS which creates weakness in their devices’ security.
"Apple devices are generally considered more secure, but it should be noted that it is not impossible for cybercriminals to attack iPhones or iPads. The owners of both Android and iOS devices need to be aware of possible malware and viruses, and should be careful while clicking on any links or downloading any untrusted applications," adds Majumder.
Pegasus was first detected in 2016 and used spear phishing methods to infect a smartphone
But, after three years, in 2019, WhatsApp blamed Pegasus for infecting more than 1,400 phones through a simple WhatsApp missed call. This was done using zero-click vulnerability
Repots suggest that NSO Group is using servers managed by cloud-computing providers like Amazon Web Services to deliver Pegasus to phones
(At The Quint, we question everything. Play an active role in shaping our journalism by becoming a member today.)