The Israel-based NSO Group well known as the Surveillance company has developed the Pegasus.
The Pegasus is the most powerful spyware technology that works on the Zero-day-vulnerability concept.
The latest version of this spyware can be installed and executed just through a missed call to the target device.
The spyware tricks the vulnerability of the third-party application and takes complete control of the device.
The hacker can have full access to your device and he can do all activities like
- Reading messages
- Viewing photos
- videos Access
- Making phone calls
- Accessing call logs
- Tracking location
- Turning on Microphone
- Clicking pictures
- Screen recording
- Accessing deleted contents
What is the Pegasus project?
The Pegasus project is running since 2016 and it is controlled by NSO Group.
The project was basically launched to surveillance the Terrorist outfits, money laundering, weapon smuggling, and monitor terrorist attacks.
The NSO Group conducted the whole project successfully by using Pegasus spyware.
The Pegasus spyware is the most sophisticated and the leading product of the NSO Group.
According to NSO Group, thousands of lives were saved by using this state-of-the-art spyware technology.
This project was in news because of the misuse of this spyware by some Government entities.
After the execution of malicious codes, Pegasus has all those permissions that the third-party application is using.
The Pegasus can access your phone call details, contacts, photo gallery, call history, and call logs.
And has the capability to read your messages, chats, emails, notifications, and documents.
This spyware can track your location, turn on your phone’s microphone, and camera without you ever knowing.
It can also record your phone screen, and voice without your knowledge.
This state-of-the-art spyware technology can make a phone call, send messages, and recover deleted data from temporary memory.
This spyware can exactly clone your device and completely controls it.
The Pegasus spyware fetches data from the victim’s phone and sends it to the NSO Group’s data server.
In my personal opinion I think that this program is a very impressive work of craftsmenship.