Mobile, WiFi and Landline Telecommunication in India

Kaspersky cybersecurity expert explains Pegasus, shares tips to beat such spyware
A cybersecurity expert at Kaspersky has shared tips on how spyware like Pegasus can be beaten collectively by patching zero-day vulnerabilities as soon as they are found.




Sarthak Dogra
Noida
July 20, 2021
UPDATED: July 20, 2021 14:01 IST




HIGHLIGHTS
  • Pegasus has been used to target several high profile individuals with unlawful surveillance.
  • The spyware exploits zero-day vulnerabilities in the iOS and Android.
  • A cybersecurity expert explains how we can be on top of such security lapses by proactively sharing this information with the developers.

The case of the notorious spyware Pegasus has taken the world by storm, as various reports reveal its unauthorised use compromising the basic human rights of many. With such remote surveillance possible through an infected device, the question of cybersecurity has become more persistent than ever.

A cybersecurity researcher now sheds some light on the potential harm of the spyware and how the cyberspace can be safeguarded against it. The key, it seems, is a collective sharing of knowledge of such attacks and their impacts.
Dmitry Galov, security researcher at GReAT, Kaspersky, explains the origins of the Pegasus spyware and how it should not be confused with vulnerabilities. “Pegasus is a spyware with versions for both iOS and Android devices,” he explains. Even in 2017, the perpetrator could “read the victim's SMS and emails, listen to calls, take screenshots, record keystrokes, and access contacts and browser history. And that’s not all of its functionality.”
As has been revealed in recent forensic reports of infected devices, Pegasus has been used for exactly the same sort of spying on individuals including journalists, lawyers, and human rights activists from across countries. So how does a regular smartphone user be wary of it?
To clear this, Galov explains that Pegasus is a rather complex and expensive malware. It has been specifically designed to spy on individuals of particular interest. Therefore, the average user is unlikely to be a target for it.

That being said, the complexity of the spyware makes it one of the most potent tools out there to spy on one’s smartphone. Pegasus has constantly evolved over the years to exploit several zero-day vulnerabilities in both Android and iOS. Moreover, it attempts to clear its own traces from an infected device, though some of it are still visible under a forensic investigation.

Galov says that both the spyware and zero-day vulnerabilities can be sold and bought by various groups on the darknet. The price of vulnerabilities can reach $2.5 million - this is how much was offered in 2019 for the full chain of vulnerabilities in Android. Interestingly, that year, for the first time, an Android vulnerability turned out to be more expensive than an iOS vulnerability.
But if these vulnerabilities can be accessed by practically anyone on the dark corners of the internet, how do regular smartphone users stay protected?
The only sure shot way is to remove the vulnerability as and when it is spotted in any service. For this, the developers of a software or a service need to be on top of the situation at all times. They will need data from the users and such targeted attacks to rectify the security loopholes. The best way for this, as per Galov, is for the general users to provide as much information on these cases as possible, to related software and security vendors.

Kaspersky cybersecurity expert explains Pegasus, shares tips to beat such spyware
 
Pegasus spyware leak shows Apple needs to ramp up iPhone security big time
Even Apple has been left red-faced with the latest Pegasus spyware leak which shows that the Cupertino-based tech giant needs to ramp up its security.




Manas Tiwari
New Delhi
July 20, 2021
UPDATED: July 20, 2021 14:23 IST

iPhone 12


Even the latest iPhone 12 models have been attacked.

HIGHLIGHTS
  • Thousands of iPhones have been attacked by spyware.
  • Pegasus leak exposes Apple iPhones as well.
  • Pressure on Apple to take additional security measures.

Apple for long has taken a lot of pride in the secure experience it offers to the users. It consistently takes digs at Android, talks about the privacy at length during its keynotes and has introduced few features that offended the other Big Tech. But, even Apple has been left red-faced with the latest Pegasus spyware leak which shows that the Cupertino-based tech giant needs to ramp up its security. The spyware was used to target journalists and human rights activists from different countries of the world, including India.

Evidence of Pegasus infections or attempts at infections was found in 37 out of the total 67 smartphones that were assessed by the Amnesty International's Security Lab. Out of these, 34 were iPhones and 23 of them showed signs of a successful Pegasus infection, while the rest (11) showed signs of attempted infection.
In contrast, only three of the 15 Android smartphones showed evidence of a hacking attempt. But there two points to note here before you think that Android phones are safer than the iPhone. One, Amnesty's investigators clarified that it found Pegasus evidence more on the iPhone Android's logs are not comprehensive enough to store the information needed for conclusive results. And two, people have expectations of higher security standards than the iPhone.

Apple in the recent years has highlighted again and again that the iPhone is more secure phone compared to Android, and Pegasus or no Pegasus as a general statement it remains accurate. But it is also true that Pegasus story shows the iPhone is not as secure, or rather unhackable, as Apple suggests. This reflects in the statement put out by Amnesty.
"Apple prides itself on its security and privacy features, but NSO Group has ripped these apart. Our forensic analysis has uncovered irrefutable evidence that through iMessage zero-click attacks, NSO's spyware has successfully infected iPhone 11 and iPhone 12 models. Thousands of iPhones have potentially been compromised," Deputy Director of Amnesty Tech Danna Ingleton said in a blog post.
The incident is more worrisome because even the latest iPhone 12 models running the newest version of Apple's operating system were compromised. That's generally the best and the last layer of security a smartphone manufacturer can offer.

In a statement to India Today Tech, Ivan Krstic, head of Apple Security Engineering and Architecture, said: "Apple unequivocally condemns cyberattacks against journalists, human rights activists, and others seeking to make the world a better place. For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market. Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data."

What all can Pegasus access?
While there is a lot of information around who all must have been affected and how, no examination has been able to reveal the data that was collected. The possibilities are endless, though. We know that Pegasus can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories.
It is also capable of activating the cameras or microphones to capture fresh images and recordings. It has capability of listening to voice mails, collect location logs to figure out where a user has been, and all of this can actually happen without a person touching their phone or clicking on a mysterious link.

How was iPhone security breached?
The investigation reveals that the iPhones were hacked using Pegasus zero-click attacks. It mentions that thousands of iPhones are on the list of attacked devices but cannot confirm the number of phones that were eventually infected.
As the name suggests, 'zero-click' attacks do not require any action from the phone's user which adds more potential to an already powerful malware. These attacks target software which receives data even before it can determine whether what is coming in is trustworthy or not.
A similar vulnerability was highlighted by Google Project Zero security researcher Ian Beer in November 2019 who revealed that attackers can take complete control of an iPhone in radio proximity without any user interaction. Apple had fixed the issue with a software update but had admitted that it was powerful enough to corrupt the devices.
Since these zero-click attacks do not require any activity from users, it becomes very difficult to avoid them. You may be aware of phishing attacks, following the best internet practices but can still be targeted with this spyware.

What can Apple do from here now?
The best solution for any spyware attack is to ensure that your smartphone is running on the latest software update. That's why Apple and others keeping rolling out regular security updates. In this case though, even the latest iPhone models have been hacked which builds further pressure on Apple to change its otherwise strict policies and work with other tech companies.
Apple has been criticised for doing a poor job with collaborations and being secretive about its software updates. The incident should concern Apple as a lot of users switch to iPhones for security reasons believing that their activities will not be tracked from there on. The multiple vulnerabilities exposed in the recent times challenge its status as the superior operating system.
Apple holds several bounty programmes to find vulnerability in its software but, the efforts may not be enough given the rise in malicious activities with the increasing penetration of internet in human life.
Apple, though, is highlighting that it is focussing on privacy and security in its products eagerly and earnestly.
The company says that the security team has grown significantly, with growth of about 4x in the last 5 years and that it continues to work with independent security researchers even if it has not made it a focus to broadcast much of that collaboration. As an example, Apple points out to its bug bounty programme which, it claims, offers some of the highest payouts in the industry and has grown total payments over 4x a year since we announced it’s expansion in 2019, with millions of dollars in bounty awards already paid out this year.


Pegasus spyware leak shows Apple needs to ramp up iPhone security big time
 
Telegram security flaws found in non-encrypted cloud chats, now fixed says company

Researchers found vulnerabilities in Telegram that could be used to manipulate bots on the app. They also found code in the Android, iOS, and desktop versions of Telegram, which could allow attackers to extract plaintext or readable form from encrypted messages.

India Today Tech New Delhi
July 19, 2021
UPDATED: July 19, 2021 12:58 IST



(Picture: Reuters)

HIGHLIGHTS
  • A group of researchers found security flaws in Telegram.
  • The researchers noted that even though Telegram offers end-to-end encryption (E2EE) through a feature called “secret chats”, the cloud chats are not encrypted by default.
  • Telegram has released a blog noting that the latest versions of the apps contain changes that no longer threaten a user’s chats.

Agroup of researchers at the Royal Holloway, University of London recently found security flaws in the Telegram messenger app. The researchers found vulnerabilities in Telegram that could be used to manipulate bots on the app. They also found code in the Android, iOS, and desktop versions of Telegram, which could allow attackers to extract plaintext or readable form from encrypted messages.The researchers noted that even though Telegram offers end-to-end encryption (E2EE) through a feature called secret chats, the cloud chats are not encrypted by default.

The researchers in their paper have also noted that the vulnerabilities spotted gave an adversary the chance to reorder messages saying that it can allow the hackers to manipulate Telegram bots. The messaging app uses cloud chats to control several automated bots. Telegram’s cloud chat has a vulnerability that allows “enemy on the network” to “sort” messages. For example, if a user sends the message “I say yes”, “all pizzas”, “I say no to all crimes”, “all crimes”, the attacker is me. You can sort them by saying “yes” to crimes and “no” to all pizzas.

They however said that they did not know of any examples of this vulnerability being exploited, but said they could use it to manipulate Telegram bots. Cloud chat on the platform is also used to control some automated bots, and such sorting allows an attacker to manipulate the behavior of these bots. The report states that such an attack would need to be carried out by a significant adversary, such as attackers backed by a nation-state.

Telegram has released a blog noting that the latest versions of the apps contain changes that no longer threaten a user’s chats. “The latest versions of official Telegram apps already contain the changes that make the four observations made by the researchers no longer relevant. Overall, none of the changes were critical, as no ways of deciphering or tampering with messages were discovered,” the company stated in the blog post.

The apps which have end-to-end encryption turned on by default, for example, WhatsApp and Signal, protect the contents of a chat from any third party seeing them. Other than the sender and the receiver, not even the message company is able to see those chats. However, apps like Telegram, Facebook Messenger and Instagram require users to enable secret chats separately to keep their chats encrypted. The IT rules published earlier this year give law enforcement agencies the power to demand that platforms trace the 'first originator' of any message. The new rules may require the messaging platform to break the encryption, thus putting the privacy of a user in question.

Telegram security flaws found in non-encrypted cloud chats, now fixed says company
 
Pegasus: the spyware technology that threatens democracy
245,986 views
Jul 19, 2021


6.6K
327


The Guardian


1.7M subscribers

Pegasus spyware is capable of bypassing your phone's security and gaining complete access to your device - including emails, messages, GPS location, photos, video, and your phone's microphone. A Guardian investigation can now reveal widespread abuse of the Pegasus technology by government clients around the world who purchased the spyware from its Israeli manufacturer — the NSO Group. People who were selected as possible targets include journalists, lawyers and human rights defenders.
 
Edward Snowden on spyware: 'This is an industry that should not exist'
160,048 views
Jul 19, 2021


5.2K
144


The Guardian


1.7M subscribers

The NSA whistleblower Edward Snowden reacts to the Pegasus project disclosures about widespread abuse of NSO Group's spyware by governments around the world
 
What is Pegasus, and How Does it Spy on You?
25,734 views
Jul 20, 2021


2.7K
33


Gary Explains

228K subscribers

The Guardian newspaper has highlighted the perils of government sanctioned cyber-surveillance, following its exposé of Pegasus, a sophisticated piece of malware that is being used by authoritarian regimes to target activists, politicians, and journalists. So, what is Pegasus? How does it work? Can you protect yourself? Let's find out.
 
How Does Pegasus Enter Your Phone? | FYI
68,973 views
Jul 19, 2021


2.1K
68


NDTV


10.5M subscribers

Pegasus, considered the most sophisticated among all such products available in the market, can infiltrate iOS, Apple's mobile phone operating system, and Android devices. But how does Pegasus enter your phone, FYI decodes.
 
How Israel Rules The World Of Cyber Security | VICE on HBO
5,062,385 views
Mar 14, 2018


62K
5.8K


VICE News


6.68M subscribers

U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels to Tel Aviv to find out how Israel is on its way to becoming the world's top cyber superpower.
 
Invisible surveillance: How spyware is secretly hacking smartphones
555,651 views
Jul 18, 2021


7K
663


Washington Post


1.75M subscribers

An investigation by a consortium of media organizations has found that military-grade spyware licensed by an Israeli firm has been used to hack smartphones belonging to journalists and others. Read more: https://wapo.st/3kN343N.
 
Top