Journalism of Courage
Advertisement
Premium

Explained: Pegasus is a spy that won’t wait; will die before being exposed

The NSO Group categorises the snooping into three levels: initial data extraction, passive monitoring, and active collection.

Pegasus monitors and retrieves new data real-time — or periodically if configured to do so — from an infected device. (Illustration: Suvajit Dey)

Zero-click installation that requires no action by the target is not the only ability that makes Pegasus the super spyware it is. What also makes it unique is the capability of “active collection”, which gives attackers the power to “control the information” they want to collect from the targeted device.

This set of features, says a marketing pitch of the Israeli company NSO Group that developed Pegasus, are called “active as they carry their collection upon explicit request of the operator”, and “differentiates Pegasus from any other intelligence collection solution”, that is, spyware.

“Instead of just waiting for information to arrive, hoping this is the information you were looking for, the operator actively retrieves important information from the device, getting the exact information he was looking for,” the NSO pitch says.

‘Active’ data extraction

The NSO Group categorises the snooping into three levels: initial data extraction, passive monitoring, and active collection.

Unlike other spyware that provide only future monitoring of partial communications, says NSO, Pegasus allows the extraction of all existing, including historical, data on the device for “building a comprehensive and accurate intelligence picture.” The initial extraction sends SMS records, contacts, call history (log), emails, messages, and browsing history to the command and control server.

While Pegasus monitors and retrieves new data real-time — or periodically if configured to do so — from an infected device, it also makes available a whole set of active collection features that allow an attacker to take real-time actions on the target, and retrieve unique information from the device and the surrounding area in its location.

Such active extractions include:

Invisible transmission

Story continues below this ad

The transmitted data is encrypted with symmetric encryption AES 128-bit. Even while encrypting, says NSO, extra care is taken to ensure that Pegasus uses minimal data, battery, and memory to make sure that the target does not get suspicious.

This is the reason why Wi-Fi connections are preferred for transmitting the collected data. NSO says it has put “extra thought into compression methods and focusing on textual content transmission whenever possible” to minimise data footprints to only a few hundred bytes and to ensure minimal impact on the target’s cellular data plan.

Data transmission stops automatically when the battery level is low, or when the target is roaming. When transmission is not possible, Pegasus stores the collected data in a hidden and encrypted buffer which is set to reach no more than 5 per cent of the free space available on the device. Under rare circumstances when no transmission is possible through safe channels, an attacker can collect urgent data through text messages but this, warns NSO, may incur costs that appear on the target’s phone bill.

The communication between Pegasus and the central servers takes place through the Pegasus Anonymizing Transmission Network (PATN), which makes tracing back to the origin “non-feasible”. The PATN nodes, says NSO, are spread across the world, redirecting Pegasus connections through different paths prior to reaching the Pegasus servers.

Story continues below this ad

Self-destruct function

Pegasus comes complete with an efficient self-destruct mechanism. In general, says NSO, “we understand that it is more important that the source will not be exposed and the target will suspect nothing than keeping the agent alive and working.” Any risk of exposure automatically activates the self-destruct mechanism, which also comes into effect if Pegasus does not communicate with its server from an infected device for 60 days or a customised period of time.

There is a third scenario in which the self-destruct mechanism is activated. From the day it released Pegasus, the NSO Group has not allowed Pegasus to infect American phone numbers. The company does not even allow infected phones to travel to the United States. The moment a victim enters the US, Pegasus in her device goes into self-destruct mode.

Bare essentials

All that is required to run Pegasus are operator terminals (standard desktop PCs) with the following specifications:

Story continues below this ad

For system hardware:

Newsletter | Click to get the day’s best explainers in your inbox

Jay Mazoomdaar is an investigative reporter focused on offshore finance, equitable growth, natural resources management and biodiversity conservation. Over two decades, his work has been recognised by the International Press Institute, the Ramnath Goenka Foundation, the Commonwealth Press Union, the Prem Bhatia Memorial Trust, the Asian College of Journalism etc. Mazoomdaar’s major investigations include the extirpation of tigers in Sariska, global offshore probes such as Panama Papers, Robert Vadra’s land deals in Rajasthan, India’s dubious forest cover data, Vyapam deaths in Madhya Pradesh, mega projects flouting clearance conditions, Nitin Gadkari’s link to e-rickshaws, India shifting stand on ivory ban to fly in African cheetahs, the loss of indigenous cow breeds, the hydel rush in Arunachal Pradesh, land mafias inside Corbett, the JDY financial inclusion scheme, an iron ore heist in Odisha, highways expansion through the Kanha-Pench landscape etc. ... Read More

Tags:
  • Explained Sci-Tech Express Explained Pegasus project Pegasus
Edition
Install the Express App for
a better experience
Featured
Trending Topics
News
Multimedia
Follow Us
C Raja Mohan writesOn its 80th birthday, and after Trump, a question: Whose UN is it anyway?
X