despite being onespywareToday’s toughest, Pegasus spy program leaves a set of indicators that can alert victims, such as overheating or system slowdown on targeted devices.

This malicious ‘software’ linked to Israeli company NSO Groupmore current than ever because it was allegedly used to spy on Prime Minister Pedro Sánchez and pro-independence politicians.

Pegasus collects information from a device and transmits it to an external entity without the consent or knowledge of the device owner. mobile phone, computer or tablet.

This ‘spyware’ is transmitted via a text message (SMS) or a fake linkinstalls itself and removes traces after activation.

This way you can follow stealing information and accessing different user content, such as data from WhatsApp, Facebook or email services and browsers, without victims having the slightest knowledge of what is going on on their devices.

Some of the actions that have made this spyware gain worldwide notoriety include tracking the victim’s location, collection of photos and other files or control of different elements of the device.

In addition, Pegasus can detect who these people are with. send and receive messages automatically and record conversations by manipulating the infected device.

The main difference between Pegasus and other malware is that it uses some security holes. zero days, that is, those that are unknown to users or manufacturers.

In addition, Pegasus can infect users’ devices without their permission. zero clickbecause it does not require any action to install spyware.

Fortinet Spain and Portugal Director of Systems Engineering J.he Luis LagunaIn statements collected by Europa Press.

Along these lines Laguna insisted that it was necessary to go beyond behavior already defined in other ‘spyware’ and analyzing abnormal behavior It is a widely used device.

This is because although it is a ‘spyware’ hiddenWhile it’s “obviously difficult” to circumvent this malicious agent, Pegasus offers some visible signs that may cause suspected victims to suspect they’ve been hacked.

“For example, if the device suddenly starts slower than usual if it stays exceed often. If one excessive data consumption “When we’re not using it is also an indicator,” said the Fortinet administrator.

Also, the fact battery time If it’s less and less, it may be a sign that ‘malware’ is running in the background on that device because if installed it not only reduces the autonomy of the computer but also overheats.

Keys not to fall victim to Pegasus

Although Pegasus works in secret, ID It is very difficult on an infected device, there are a number of precautions that users must take into account in order not to become its victim.

As is often the case in this and the rest ‘malware‘ What is known by now, extreme precautions should be taken and double-checked each time personal and confidential information is given.

Instead of clicking on the link we received to verify that it is legitimate, it is recommended to write the address of the site in the field below. web explorer, although this means taking an additional step and not accessing this service directly.

On the other hand, Fortinet is starting to use behavior-based device protection ‘software’. Endpoint Detection and Response (EDR). This is because traditional antiviruses find the Zero Day virus more difficult to detect.

Another decisive factor for ensuring the security of the system is the installation of the latest software versions to fix security vulnerabilities. updates pre.

For example, it’s also important to check the permissions granted to apps each time they’re downloaded, as they need to be monitored if the ‘software’ requires it. microphone use when you really don’t need it.

of attackers fake the names of these networkscapture our traffic and install ‘spyware’.

People and companies

Inquiry from the media consortium Forbidden Stories and Amnesty International Last year, he stressed that the target of this spyware, which was originally created for counter-terrorism, could be around 50,000 phones.

This analysis determined that the ‘software’ has managed to penetrate the devices of journalists, activists and politicians around the world. personal information how their owners will control their actions

However, it has been proven that this ‘spyware’ can infect both public figures and any device. Business and other anonymous users.

So much so that Meta, then Facebook, denounced NSO in 2020 and accused it of infecting a network of Facebook servers in 2019. United States of America “hacking” hundreds of “smartphones” and spying on nearly 1,400 targets via WhatsApp.