{"id":40205,"date":"2021-08-14T18:21:00","date_gmt":"2021-08-14T12:51:00","guid":{"rendered":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/"},"modified":"2024-09-03T17:14:48","modified_gmt":"2024-09-03T11:44:48","slug":"pegasus-spyware-everything-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/","title":{"rendered":"Pegasus Spyware: Everything You Need to Know"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"#Introduction\">Introduction<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"#Pegasus Spyware\">The Origins of Pegasus Spyware<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"#What Information Pegasus Can Access\">What Information Pegasus Can Access<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"#How to Protect Your Device\">How to Protect Your Device<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"#Conclusion\">Conclusion<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-pegasus-spyware\"><strong>Introduction to Pegasus Spyware<\/strong><\/h2>\n\n\n\n<p>With unprecedented reliance on the internet and our gadgets to get business-related, financial, and personal tasks done, there is more information that is constantly available online for hackers to access.&nbsp;<\/p>\n\n\n\n<p>Many of us are aware that cyberattacks have increased exponentially over the past couple of years. Individuals and businesses alike have had critical information and conversations compromised due to hackers relentlessly infecting their devices.&nbsp;<\/p>\n\n\n\n<p>And currently, what is creating waves is the global collaborative investigation into the <strong>Pegasus Spyware<\/strong>. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever. Some have even called it the \u201cultimate spyware.\u201d&nbsp;<\/p>\n\n\n\n<p>Are you wondering how this <em>spyware<\/em> is a matter of concern for countries such as the US, UK, France, and Germany, among many others? Keep reading, and we will tell you exactly why!&nbsp;<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-origins-of-pegasus-spyware\"><strong>The Origins of Pegasus Spyware&nbsp;<\/strong><\/h2>\n\n\n\n<p>The Pegasus Spyware, a malicious software (aka malware), is created by an Israeli cyber arms firm called the NSO Group to combat terrorism and crime globally.&nbsp;<\/p>\n\n\n\n<p>The name \u2018Pegasus\u2019 for this spyware was inspired by the Trojan horse. The name suggests that it can be sent \u2018flying\u2019 through the air into various phones.&nbsp;<\/p>\n\n\n\n<p>Although it has only recently been discovered, the initial usage of the Pegasus Spyware can be traced back to UAE in 2013.&nbsp;<\/p>\n\n\n\n<p>Since then, it has reportedly affected countries such as Israel, the USA, Mexico, and India, among numerous others. It has affected a total of over 45 countries in the world.&nbsp;<\/p>\n\n\n\n<p>In the case of India, it was suspected by Facebook as early as 2019 that Pegasus was intercepting some WhatsApp communications.&nbsp;<\/p>\n\n\n\n<p>In July 2021, the Pegasus Spyware suddenly gained widespread publicity due to an Amnesty International investigative report stating that it is being misused to access peoples\u2019 personal information without consent.<\/p>\n\n\n\n<p>Essentially, it is as if someone is quietly listening to all your conversations and has been for years. The worst part is that you may never even find out that your phone has been infected by the Pegasus Spyware unless your device is scanned at a digital security lab!&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"the-most-sophisticated-smartphone-attack\"><strong>\u201cThe Most Sophisticated Smartphone Attack\u201d<\/strong><\/h4>\n\n\n\n<p>So what makes the Pegasus Spyware so infectious, that it has not only affected numerous citizens within one country but has done so in <em>multiple<\/em> countries so effortlessly?&nbsp;<\/p>\n\n\n\n<p>Typically, malware infects a device when the user clicks on a link or opens an email with the malware embedded in it. In order words, there has to be some interaction between the user and the malicious software for the device to get affected.&nbsp;<\/p>\n\n\n\n<p>However, that is not the case with Pegasus Spyware.&nbsp;<\/p>\n\n\n\n<p>The Pegasus Spyware uses a series of \u2018network injections,\u2019 enabling the attackers to install the spyware without requiring any interaction with the target. It can achieve such zero-click infections in other ways too.&nbsp;<\/p>\n\n\n\n<p>One such over-the-air (OTA) option is to send a \u2018push message\u2019 (i.e., messages from an already-installed app on the phone) so that the target device loads the spyware covertly, without the user ever getting to know that their device has been affected.&nbsp;<\/p>\n\n\n\n<p>Additionally, it has also been observed to use a zero-click iMessage exploit to target iPhones.&nbsp;<\/p>\n\n\n\n<p>NSO acknowledges that the zero-interaction infection ability of the Pegasus Spyware is what makes it so unique.&nbsp;<\/p>\n\n\n\n<p>Usually, the Pegasus Spyware only needs the phone number of the target for a network injection, and the rest is done automatically by its system.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-information-pegasus-can-access\"><strong>What Information Pegasus Can Access<\/strong><\/h2>\n\n\n\n<p>Once infected with Pegasus Spyware, a device is under the complete control of the attacker. It acts as a listening and tracking device for the user.&nbsp;<\/p>\n\n\n\n<p>Not only does the Pegasus Spyware give the attacker access to a user\u2019s texts, phone conversations, contacts, and emails, but it also can use the GPS function to track their location.&nbsp;<\/p>\n\n\n\n<p>Pegasus can also send the attacker the user\u2019s private data such as passwords, calendar events, and even end-to-end encrypted messages (in messaging apps such as WhatsApp). The attacker can use the camera and microphone of the device as well.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>To avoid detection by antivirus software, the Pegasus Spyware sends only scheduled updates to a command and control (C&amp;C) server, i.e., to the attacker.&nbsp;<\/p>\n\n\n\n<p>This way, it is also able to strategically avoid any detection by antivirus software as well as forensic analysis. The spyware can also be removed or deactivated by the attacker if deemed necessary.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-protect-your-device\"><strong>How to Protect Your Device&nbsp;<\/strong><\/h2>\n\n\n\n<p>Now that we have established that this isn\u2019t just some run-of-the-mill malware that we are dealing with, we need to be mindful of using specific strategies to secure our devices. Despite how undefeatable the Pegasus Spyware may seem, one must take measures to avoid infection.&nbsp;<\/p>\n\n\n\n<p>For the Pegasus Spyware to work, the device it is targeting has to be compatible with its technology. This translates to compatibility with NSO groups\u2019 technology system, which is the foundation for Pegasus.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Amnesty\u2019s report finds that in the case of iPhones, systems between iOS 7 and iOS 14.6 are particularly vulnerable due to their compatibility with the NSO group\u2019s technology system. However, if a gadget is not compatible with the NSO system, Pegasus will not be able to affect it.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Another way is to change your default phone browser. Installations from a browser other than the phone\u2019s default browser are not supported by the system. Additionally, Google Chrome installed on an Android phone, in particular, is not supported either.&nbsp;<\/p>\n\n\n\n<p>Along with their report, Amnesty International also provides a toolkit for users to install that alerts them of the presence of Pegasus Spyware.&nbsp;<\/p>\n\n\n\n<p>Known as the Mobile Verification Tool or the MVT, the toolkit scans the backup file of your device for any evidence of compromise. Although it works on both iPhones and Android phones, it is more likely to be accurate for iPhones.&nbsp;<\/p>\n\n\n\n<p>Amnesty states that this is because more iPhones have been affected by Pegasus anyway, which is why the accuracy of MVT is also higher for iPhones. Regardless, MVT will alert you of any spyware on your device, and the encrypted files can then be removed.&nbsp;<\/p>\n\n\n\n<p>Do keep in mind that the Pegasus Spyware infects the hardware of a phone. So if you change your device, the spyware will not automatically transfect to the new device.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>Conclusion&nbsp;<\/strong><\/h2>\n\n\n\n<p>Despite these loopholes in the Pegasus Spyware, it can still be injected into any device physically. If an attacker has physical access to a user\u2019s device, it can be infected with Pegasus in less than five minutes. All without your knowledge.&nbsp;<\/p>\n\n\n\n<p>And as screen time continues to increase, people are at a higher risk than ever before of more such spyware that is quiet, efficient, and all the more dangerous because of these reasons.&nbsp;<\/p>\n\n\n\n<p>As working professionals in this digital economy, we need to equip ourselves with skills to keep information systems safe but also to become more employable. If the prospect of protecting systems inspires you, take a look at <strong><a href=\"https:\/\/www.mygreatlearning.com\/online-cyber-security-course\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security Program<\/a><\/strong> delivered and supported by Great Learning.&nbsp;<\/p>\n\n\n\n<p>This step to upskilling with cybersecurity could transform your career as more and more businesses look for cybersecurity experts in the face of increasing threats to information security!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Pegasus Spyware With unprecedented reliance on the internet and our gadgets to get business-related, financial, and personal tasks done, there is more information that is constantly available online for hackers to access.&nbsp; Many of us are aware that cyberattacks have increased exponentially over the past couple of years. Individuals and businesses alike have [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":40211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[],"content_type":[],"class_list":["post-40205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pegasus Spyware - Everything You Need to Know - Great Learning<\/title>\n<meta name=\"description\" content=\"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pegasus Spyware: Everything You Need to Know\" \/>\n<meta property=\"og:description\" content=\"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Great Learning Blog: Free Resources what Matters to shape your Career!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreatLearningOfficial\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-14T12:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-03T11:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1452\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Great Learning Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/Great_Learning\" \/>\n<meta name=\"twitter:site\" content=\"@Great_Learning\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Great Learning Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/\"},\"author\":{\"name\":\"Great Learning Editorial Team\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\"},\"headline\":\"Pegasus Spyware: Everything You Need to Know\",\"datePublished\":\"2021-08-14T12:51:00+00:00\",\"dateModified\":\"2024-09-03T11:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/\"},\"wordCount\":1249,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/photo-1560854350-13c0b47a3180.jpeg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/\",\"name\":\"Pegasus Spyware - Everything You Need to Know - Great Learning\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/photo-1560854350-13c0b47a3180.jpeg\",\"datePublished\":\"2021-08-14T12:51:00+00:00\",\"dateModified\":\"2024-09-03T11:44:48+00:00\",\"description\":\"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/photo-1560854350-13c0b47a3180.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/photo-1560854350-13c0b47a3180.jpeg\",\"width\":1452,\"height\":1001,\"caption\":\"Pegasus spyware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/pegasus-spyware-everything-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pegasus Spyware: Everything You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"name\":\"Great Learning Blog\",\"description\":\"Learn, Upskill &amp; Career Development Guide and Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"alternateName\":\"Great Learning\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\",\"name\":\"Great Learning\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"width\":900,\"height\":900,\"caption\":\"Great Learning\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreatLearningOfficial\\\/\",\"https:\\\/\\\/x.com\\\/Great_Learning\",\"https:\\\/\\\/www.instagram.com\\\/greatlearningofficial\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/in.pinterest.com\\\/greatlearning12\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/beaconelearning\\\/\"],\"description\":\"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.\",\"email\":\"info@mygreatlearning.com\",\"legalName\":\"Great Learning Education Services Pvt. Ltd\",\"foundingDate\":\"2013-11-29\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\",\"name\":\"Great Learning Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"caption\":\"Great Learning Editorial Team\"},\"description\":\"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.\",\"sameAs\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/Great_Learning\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCObs0kLIrDjX2LLSybqNaEA\"],\"award\":[\"Best EdTech Company of the Year 2024\",\"Education Economictimes Outstanding Education\\\/Edtech Solution Provider of the Year 2024\",\"Leading E-learning Platform 2024\"],\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/author\\\/greatlearning\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pegasus Spyware - Everything You Need to Know - Great Learning","description":"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Pegasus Spyware: Everything You Need to Know","og_description":"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.","og_url":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/","og_site_name":"Great Learning Blog: Free Resources what Matters to shape your Career!","article_publisher":"https:\/\/www.facebook.com\/GreatLearningOfficial\/","article_published_time":"2021-08-14T12:51:00+00:00","article_modified_time":"2024-09-03T11:44:48+00:00","og_image":[{"width":1452,"height":1001,"url":"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg","type":"image\/jpeg"}],"author":"Great Learning Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/Great_Learning","twitter_site":"@Great_Learning","twitter_misc":{"Written by":"Great Learning Editorial Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/"},"author":{"name":"Great Learning Editorial Team","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad"},"headline":"Pegasus Spyware: Everything You Need to Know","datePublished":"2021-08-14T12:51:00+00:00","dateModified":"2024-09-03T11:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/"},"wordCount":1249,"commentCount":0,"publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/","url":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/","name":"Pegasus Spyware - Everything You Need to Know - Great Learning","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg","datePublished":"2021-08-14T12:51:00+00:00","dateModified":"2024-09-03T11:44:48+00:00","description":"Pegasus Spyware: The global collaborative investigation into the Pegasus Spyware is creating waves. It has been termed \u201cthe most sophisticated\u201d smartphone attack ever.","breadcrumb":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#primaryimage","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg","width":1452,"height":1001,"caption":"Pegasus spyware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mygreatlearning.com\/blog\/pegasus-spyware-everything-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mygreatlearning.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.mygreatlearning.com\/blog\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Pegasus Spyware: Everything You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.mygreatlearning.com\/blog\/#website","url":"https:\/\/www.mygreatlearning.com\/blog\/","name":"Great Learning Blog","description":"Learn, Upskill &amp; Career Development Guide and Resources","publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"alternateName":"Great Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mygreatlearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization","name":"Great Learning","url":"https:\/\/www.mygreatlearning.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","width":900,"height":900,"caption":"Great Learning"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreatLearningOfficial\/","https:\/\/x.com\/Great_Learning","https:\/\/www.instagram.com\/greatlearningofficial\/","https:\/\/www.linkedin.com\/school\/great-learning\/","https:\/\/in.pinterest.com\/greatlearning12\/","https:\/\/www.youtube.com\/user\/beaconelearning\/"],"description":"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.","email":"info@mygreatlearning.com","legalName":"Great Learning Education Services Pvt. Ltd","foundingDate":"2013-11-29","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad","name":"Great Learning Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","caption":"Great Learning Editorial Team"},"description":"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.","sameAs":["https:\/\/www.mygreatlearning.com\/","https:\/\/in.linkedin.com\/school\/great-learning\/","https:\/\/x.com\/https:\/\/twitter.com\/Great_Learning","https:\/\/www.youtube.com\/channel\/UCObs0kLIrDjX2LLSybqNaEA"],"award":["Best EdTech Company of the Year 2024","Education Economictimes Outstanding Education\/Edtech Solution Provider of the Year 2024","Leading E-learning Platform 2024"],"url":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg",1452,1001,false],"thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-150x150.jpeg",150,150,true],"medium":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-300x207.jpeg",300,207,true],"medium_large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-768x529.jpeg",768,529,true],"large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-1024x706.jpeg",1024,706,true],"1536x1536":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg",1452,1001,false],"2048x2048":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180.jpeg",1452,1001,false],"web-stories-poster-portrait":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-640x853.jpeg",640,853,true],"web-stories-publisher-logo":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-96x96.jpeg",96,96,true],"web-stories-thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/07\/photo-1560854350-13c0b47a3180-150x103.jpeg",150,103,true]},"uagb_author_info":{"display_name":"Great Learning Editorial Team","author_link":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"},"uagb_comment_info":1,"uagb_excerpt":"Introduction to Pegasus Spyware With unprecedented reliance on the internet and our gadgets to get business-related, financial, and personal tasks done, there is more information that is constantly available online for hackers to access.&nbsp; Many of us are aware that cyberattacks have increased exponentially over the past couple of years. Individuals and businesses alike have&hellip;","_links":{"self":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/40205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/comments?post=40205"}],"version-history":[{"count":16,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/40205\/revisions"}],"predecessor-version":[{"id":99631,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/40205\/revisions\/99631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media\/40211"}],"wp:attachment":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media?parent=40205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/categories?post=40205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/tags?post=40205"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/content_type?post=40205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}