SlideShare a Scribd company logo
1 of 9
Pegasus
ি ক
?
Pegasus
Software - Spyware
Pegasus is a spyware developed by the
Israeli cyberarms firm NSO Group that
can be covertly installed on mobile
phones running most versions of iOS and
Android.
Spyware
Spyware is software with
malicious behavior that aims
to gather information about a
person or organization and
send it to another entity in a
way that harms the user.
Adware
System monitor
Web tracking
Trojans
1
3
2
4
Target Devices
It can be covertly installed
on mobile phones running
most versions of iOS and
Android.
Time: 5 minutes
Investigation
Pegasus is ostensibly marketed for
surveillance of "serious crimes and
terrorism". In 2020, a target list of
50,000 phone numbers leaked to
Forbidden Stories, and an analysis
revealed the list contained the numbers
of leading opposition politicians, human
rights activists, journalists, lawyers and
other political dissidents
Project Pegesus
The Pegasus Project is an international investigative journalism initiative that revealed governments' espionage on journalists, opposition
politicians, activists, business people and others using the private NSO Group's Pegasus spyware.
1
2
3
Vulnerabilities CVE-2016-4655: Information leak in
kernel
CVE-2016-4656: Kernel memory
corruption leads to jailbreak
CVE-2016-4657: Memory corruption in
the webkit
NSO Group develops best-in-class technology to
help government agencies detect and prevent
terrorism and crime.
NSO GROUP
NSO products are used exclusively by government intelligence and law enforcement
agencies to fight crime and terror.
Prevent terrorism, including gun violence, car bombs, and suicide
bombers at transportation hubs, public parks, markets, concert venues,
sports arenas, and other public areas
Break up pedophilia, sex- and drug-trafficking rings, and money-
laundering operations
Find and rescue kidnapped children
Assist emergency search and rescue (SAR) teams in locating survivors
trapped under collapsed buildings in the wake of natural disasters or
construction failures
Use Case
Thank you

More Related Content

Similar to Pegasus Spyware Presentation.pptx

The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docx
mattjtoni51554
 

Similar to Pegasus Spyware Presentation.pptx (20)

Spyware
SpywareSpyware
Spyware
 
Distinct Targeting
Distinct TargetingDistinct Targeting
Distinct Targeting
 
Pegasus scandal
Pegasus scandal Pegasus scandal
Pegasus scandal
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Suspected ‘black hole’ hacker arrested
Suspected ‘black hole’ hacker arrestedSuspected ‘black hole’ hacker arrested
Suspected ‘black hole’ hacker arrested
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
File000145
File000145File000145
File000145
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docx
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Current Affairs.pptx
Current Affairs.pptxCurrent Affairs.pptx
Current Affairs.pptx
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Pegasus Spyware Presentation.pptx

  • 2. Pegasus Software - Spyware Pegasus is a spyware developed by the Israeli cyberarms firm NSO Group that can be covertly installed on mobile phones running most versions of iOS and Android.
  • 3. Spyware Spyware is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user. Adware System monitor Web tracking Trojans 1 3 2 4
  • 4. Target Devices It can be covertly installed on mobile phones running most versions of iOS and Android. Time: 5 minutes
  • 5. Investigation Pegasus is ostensibly marketed for surveillance of "serious crimes and terrorism". In 2020, a target list of 50,000 phone numbers leaked to Forbidden Stories, and an analysis revealed the list contained the numbers of leading opposition politicians, human rights activists, journalists, lawyers and other political dissidents Project Pegesus The Pegasus Project is an international investigative journalism initiative that revealed governments' espionage on journalists, opposition politicians, activists, business people and others using the private NSO Group's Pegasus spyware.
  • 6. 1 2 3 Vulnerabilities CVE-2016-4655: Information leak in kernel CVE-2016-4656: Kernel memory corruption leads to jailbreak CVE-2016-4657: Memory corruption in the webkit
  • 7. NSO Group develops best-in-class technology to help government agencies detect and prevent terrorism and crime. NSO GROUP
  • 8. NSO products are used exclusively by government intelligence and law enforcement agencies to fight crime and terror. Prevent terrorism, including gun violence, car bombs, and suicide bombers at transportation hubs, public parks, markets, concert venues, sports arenas, and other public areas Break up pedophilia, sex- and drug-trafficking rings, and money- laundering operations Find and rescue kidnapped children Assist emergency search and rescue (SAR) teams in locating survivors trapped under collapsed buildings in the wake of natural disasters or construction failures Use Case