Logo-ExpSystem-long-white 1 (1)
.
.
united-states 1-noborder
EN
Ellipse 55-noborder

In Thailand, we must now admit that "Pegasus" (Pegasus) spyware in the form of Trojans is being talked about the most. But some people may be familiar with the name after hearing it, but not sure how dangerous it is. Want to study various details for good protection from causing problems to yourself Therefore, we have gathered useful information to give you an in-depth look and don't hesitate to follow along.

What is spyware? What formats are there to be known?

In case anyone has not heard of spyware before, I would like to take you to understand it briefly. "Spyware" is a part that is separated from a computer virus. Its purpose is to steal the personal information of the victim and pass it on to malicious spyware users. Spyware is currently divided into 4 groups:

  • Cookies The best spyware that is currently classified as friendly. Because we have to press accept when accessing the website. with the work being enforced to a clear purpose Must notify the user every time.
  • monitoring systems or surveillance systems It is a spyware that hides in computer equipment such as mouse and keyboard silently, but carefully monitors every aspect of operation. which will capture the way to see how various devices work, click into which format and then sends information to bad people who have installed this system on our devices.
  • Advertising hardware or software Another spyware that cannot be overlooked. because from the past until now, it is still found It is a behavior that often triggers ads to the browser. causing a huge nuisance.
  • Remote Access Trojans or Trojans are self-infecting behavior, once installed, the hacker takes control of the device immediately. which may be stationary and just send information Or control every operation of all devices until we can no longer use it.

All 4 forms of spyware are considered scary because it would not be good if someone was constantly monitoring them. Still, if looking for the worst group, it's inevitable that the Trojan group. Because spyware like ""Pegasus"" is considered a form of Trojan that many people are attacked more widely.

What is the origin of spyware "Pegasus"?

“Pegasus” originated from an Israeli cybersecurity company. It was found that it was developed for serious use in 2011 and was supported by the government at that time as well. Its purpose is to help with cyber warfare. It is a good state security. And also collect information on human rights cyber systems as well.

It was actually implemented in August 2016 by Arab human rights defender Ahmed Mansoor. specified through the attack message as ""secret"" and when pressed, it is equivalent to installing Pegasus spyware on the machine as well

This spyware was identified as a trojan by the University of Toronto's Citizen Lab. and found that there is a code on the link to send information to the user At that time, I identified the IOS system of Ahmed Mansoor's iPhone, including the Wi-Fi password that Ahmed Mansoor used to access all of them.

How the "Pegasus" spyware works can't be overlooked.

From what I have studied above, it may be possible to understand the basics of spyware ""Pegasus"" quite well, which has a way of working that is easy to understand.

  • There is a tempting message to click on the link sent. to penetrate the system of the desired target
    After the target has pressed in The system will immediately penetrate the system that the target is using at that moment.
  • Working like a Trojan, it penetrates various systems and sends the obtained information to the operator who has embedded the "Pegasus" spyware.
  • can turn on the microphone The target's camera can be turned on at any time without the target being aware. And it is saved on the machine before sending to the bad actor connected to the network. which normal users will not be able to find the embedded files by normal means
    So far,

there are 34 countries that have come out to say that they have been attacked by ""Pegasus"" spyware. One of which is our own country. Most of the hits will be a group of journalists. or anti-political human rights activist, etc.

So how can we prevent spyware "Pegasus"?

Most of the time, ""Pegasus"" spyware usage targets countries whose targets are related to security. Individuals will not be easily attacked by this spyware, but if actually attacked by this bad guy. There will be keywords such as zero-day attacks or exploits through vulnerabilities. This most often occurs with the application itself.

Therefore, the best way to be wary of this spyware is to keep your applications and operating system updated regularly. Do not click on links sent from unknown people. or strange numbers, both from normal messages or messages from any application In addition, two-factor authentication is enabled. It's interesting because it can help us be safer.

As for anyone who is very worried about the spyware ""Pegasus"" installed on our devices or not? At present, there is a device to help verify that Amnesty International is released by working, it will check the file information on all our devices. Although it is still quite difficult to use, but believes that there will be further development of the system Which, however, is certainly better than being unknowingly leaking information easily."

TH
Contact

What we know about "Pegasus" spyware right now

Pegasus

In Thailand, we must now admit that "Pegasus" (Pegasus) spyware in the form of Trojans is being talked about the most. But some people may be familiar with the name after hearing it, but not sure how dangerous it is. Want to study various details for good protection from causing problems to yourself Therefore, we have gathered useful information to give you an in-depth look and don't hesitate to follow along.

What is spyware? What formats are there to be known?

In case anyone has not heard of spyware before, I would like to take you to understand it briefly. "Spyware" is a part that is separated from a computer virus. Its purpose is to steal the personal information of the victim and pass it on to malicious spyware users. Spyware is currently divided into 4 groups:

  • Cookies The best spyware that is currently classified as friendly. Because we have to press accept when accessing the website. with the work being enforced to a clear purpose Must notify the user every time.
  • monitoring systems or surveillance systems It is a spyware that hides in computer equipment such as mouse and keyboard silently, but carefully monitors every aspect of operation. which will capture the way to see how various devices work, click into which format and then sends information to bad people who have installed this system on our devices.
  • Advertising hardware or software Another spyware that cannot be overlooked. because from the past until now, it is still found It is a behavior that often triggers ads to the browser. causing a huge nuisance.
  • Remote Access Trojans or Trojans are self-infecting behavior, once installed, the hacker takes control of the device immediately. which may be stationary and just send information Or control every operation of all devices until we can no longer use it.

All 4 forms of spyware are considered scary because it would not be good if someone was constantly monitoring them. Still, if looking for the worst group, it's inevitable that the Trojan group. Because spyware like ""Pegasus"" is considered a form of Trojan that many people are attacked more widely.

What is the origin of spyware "Pegasus"?

“Pegasus” originated from an Israeli cybersecurity company. It was found that it was developed for serious use in 2011 and was supported by the government at that time as well. Its purpose is to help with cyber warfare. It is a good state security. And also collect information on human rights cyber systems as well.

It was actually implemented in August 2016 by Arab human rights defender Ahmed Mansoor. specified through the attack message as ""secret"" and when pressed, it is equivalent to installing Pegasus spyware on the machine as well

This spyware was identified as a trojan by the University of Toronto's Citizen Lab. and found that there is a code on the link to send information to the user At that time, I identified the IOS system of Ahmed Mansoor's iPhone, including the Wi-Fi password that Ahmed Mansoor used to access all of them.

How the "Pegasus" spyware works can't be overlooked.

From what I have studied above, it may be possible to understand the basics of spyware ""Pegasus"" quite well, which has a way of working that is easy to understand.

  • There is a tempting message to click on the link sent. to penetrate the system of the desired target
    After the target has pressed in The system will immediately penetrate the system that the target is using at that moment.
  • Working like a Trojan, it penetrates various systems and sends the obtained information to the operator who has embedded the "Pegasus" spyware.
  • can turn on the microphone The target's camera can be turned on at any time without the target being aware. And it is saved on the machine before sending to the bad actor connected to the network. which normal users will not be able to find the embedded files by normal means
    So far,

there are 34 countries that have come out to say that they have been attacked by ""Pegasus"" spyware. One of which is our own country. Most of the hits will be a group of journalists. or anti-political human rights activist, etc.

So how can we prevent spyware "Pegasus"?

Most of the time, ""Pegasus"" spyware usage targets countries whose targets are related to security. Individuals will not be easily attacked by this spyware, but if actually attacked by this bad guy. There will be keywords such as zero-day attacks or exploits through vulnerabilities. This most often occurs with the application itself.

Therefore, the best way to be wary of this spyware is to keep your applications and operating system updated regularly. Do not click on links sent from unknown people. or strange numbers, both from normal messages or messages from any application In addition, two-factor authentication is enabled. It's interesting because it can help us be safer.

As for anyone who is very worried about the spyware ""Pegasus"" installed on our devices or not? At present, there is a device to help verify that Amnesty International is released by working, it will check the file information on all our devices. Although it is still quite difficult to use, but believes that there will be further development of the system Which, however, is certainly better than being unknowingly leaking information easily."

Vector-36-02-28-11-65
Ellipse-93-1-28-11-65
Logo-ExpSystem-long-white 1 (1)
Expsystem Company Limited
143/666 Borommaratchachonnani Road, Arun Amarin, Bangkok Noi Bangkok 10700
Tel: 02-101-2878
Social media
facebook-ico-2-12-65
instagram-ico-2-12-65
Line-ico-2-12-65
Pegasus