The most talked about Pegasus Spyware has struck one more time by leaking the phone numbers of more than 40 Indian journalists who work for various national news outlets. The phone numbers were uploaded to a leaked list.
Forensic experts have reportedly confirmed that devices used by a few journalists among the list of journalists have traces of the cyber hack. While a few devices suffered an attempt of hacking. To know whether the devices used by the other journalists can only be known by examining the mobile phones they use.
It has been widely reported that around thirteen iPhone devices and nine Android devices were reported examined for hacking, while nine Apple and one Android were found to be compromised. This shows that a major share of devices used by the journalists were subjected to attack.
As per the reports, the Journalists whose numbers were leaked have journalists working for Indian media outlets like Hindustan Times, India Today, Network18, The Hindu, Indian Express and The Wire.
The Pegasus is a powerful Spyware that can spy into the devices and read messages and track the devices. The Spyware can also target the video and smartphone of the hacked devices.
Using a Spyware to hack and track the movements of the journalists goes against the laws of the land and we have to wait and see how the union government responds to this.
The Pegasus Spyware is created by NSO Group based out of Israel. Spyware has the history of being the reason behind cyber-hack in various countries including India.
This is not the first time, Pegasus became a big concern. Back in 2019, Whatsapp announced that the Israeli company is targeting journalists, government officials and lawyers in various countries including India.
Back then, the leading social media giant even urged the Whatsapp users to be careful and watch out for suspicious messages and links.
The hackers using the Spyware tries to sneak into the devices of their target by sending messages and links. Once the person opens or clicks the message, the hacker can enter into the compromised device and can read any kind of data, be it messages, passwords and mail.