{"id":4127,"date":"2019-11-01T13:07:32","date_gmt":"2019-11-01T13:07:32","guid":{"rendered":"https:\/\/www.positivenewstrends.com\/?p=4127"},"modified":"2019-11-11T13:48:58","modified_gmt":"2019-11-11T13:48:58","slug":"pegasus-a-new-threat-to-whatsapp","status":"publish","type":"post","link":"https:\/\/www.positivenewstrends.com\/tech\/pegasus-a-new-threat-to-whatsapp\/","title":{"rendered":"Pegasus – A New Threat to WhatsApp"},"content":{"rendered":"

In May 2019, a bug was discovered by WhatsApp in the app\u2019s calling feature which was utilized to inject a malicious code into user\u2019s phone. On October 29th, 2019, WhatsApp found that this bug was being utilized by an Israel based company, NSO to develop a malware named Pegasus Spyware. WhatsApp and its parent company, Facebook are at loggerheads with NSO in a U.S court.<\/p>\n

As per the sources, Pegasus Spyware was being used to spy on journalists, lawyers, scholars and activists in India<\/strong> during elections.<\/p>\n

\"Pegasus<\/p>\n

How does Pegasus Spyware work?<\/strong><\/h2>\n

The Pegasus spyware comes under a special class of buffer overflow exploit, where the source code of a designated application can be altered and manipulated by the hackers\u2019 instructions. This vulnerability allows hackers to inject spyware on to any mobile phone simply by calling the number on WhatsApp of a target\u2019s device.<\/p>\n

Cybersecurity experts state that almost all systems contain a buffer zone, where temporary memory is allocated to give swift run-time experience for a user. A specific buffer allocation is done by programmers as per requirements of the application which can be exploited by hackers. A malicious payload can be dropped within this buffer allocation, which runs in the RAM, through a video call without the user\u2019s knowledge or participation. Once the payload is successfully injected into the target device, hackers can snoop in on WhatsApp conversations<\/strong>. It can activate a microphone<\/strong>, turn on the camera<\/strong> & even manipulate WhatsApp data<\/strong> and much more.<\/p>\n

Targeted users cannot avert these attacks by themselves. The service providers are responsible for implementing additional stringent security measures in programming code to prevent these types of attacks.<\/p>\n

How to avoid being attacked by Pegasus?<\/strong><\/h2>\n

As soon as the news of Pegasus spyware got out, Apple released a security update<\/strong> (9.3.5) that took care of the vulnerabilities and Google on the other hand notified the potential spyware targets<\/strong> directly.<\/p>\n

Here are a few steps to be safe and secure with your mobile device:<\/p>\n

    \n
  1. Update your device and apps to the latest security patches.<\/li>\n
  2. It is recommended to install a good security solution which has real-time scanning capabilities to stop any malicious apps in its tracks.<\/li>\n
  3. Don\u2019t click on attractive spam emails, luring discount coupons or links. As enticing as the email or any link sounds, try to avoid it all costs to ensure a safe and reliable experience on your device.<\/li>\n<\/ol>\n