The Internet is buzzing with news that Pegasus has been purchased by the Central Anti-Corruption Bureau. What is the famous Pegasus and why is everyone so afraid of it? Is the CBA actually in possession of it? Is it legitimate? We invite you to read the following article.

It’s Israeli software that was created for spying. However, it is not just any application – it is a world-class program that can really do a lot. Pegasus has the ability to read data from phones, record ongoing conversations and even peep at people through the cameras of various equipment. It can therefore be used for surveillance – and this is what people are afraid of.
As we can read in the official Pegasus manual:
“Pegasus is the world’s leading cyber intelligence solution that enables law enforcement and intelligence operations to remotely and covertly extract valuable information from virtually any mobile device. This groundbreaking solution was developed by veteran elite intelligence professionals to provide governments with a way to solve the problem of message interception in today’s highly dynamic cyber battlefield. By capturing new types of information from mobile devices, Pegasus fills a significant technology gap to provide the most accurate and complete intelligence for your operations.”
Entire manual here: https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html
The software was developed by the Israeli company NSO Group, which until some time ago hid its activities. Now, however, their work is being increasingly recognized by the governments of various countries. The company itself promotes the application as necessary and useful in the fight against terrorism and other illegal ventures, such as drug gangs, child trafficking, etc.
The sale of Pegasus outside Israel (and thus to the CBA) must be approved each time by the country’s defense ministry there. It is already known that it has been sold used several times in the Middle East, including Saudi Arabia, Morocco and the United Arab Emirates. However, it has also been noted for some time that there are traces of Pegasus use in Europe as well. Little, it is rumored that evidence of use of the system will also be found in Poland. Pegasus – CBA? Quite possibly, it is well known today that the services have various tools and technologies for surveillance.
Everyone is afraid of it, although not everyone really should be. After all, the services won’t use such a prestigious program to track innocent conversations or peep at ordinary residents of the country. In fact, those who have something to hide should tremble with fear. Criminals, thanks to Pegasus, would be exposed to the authorities at a fork in the road, which could increase the country’s security. Nevertheless, the public fears that the software will be used in an inappropriate way, that is, for surveillance of all citizens….
The news of possible surveillance by Pegasus was reported by computer scientists working in Canada, in Toronto. This is because they discovered a tool, contained in the system, that could be used for this very purpose. The frightening information spread around the world, and with it – the software’s operating instructions. It turned out that Pegasus can be installed remotely in any smartphone, and without the owner’s knowledge. What’s more, it has the ability to automatically remove itself from the phone and obliterate all traces of its existence if there is a possibility that it has been detected. Well, it has access to everything it finds on the device – emails, messages, photos, accounts kept on social media, programs, documents, etc., etc., etc. Pegasus also allows it to change settings on an “attacked” phone, bug it and even hack into the camera and peep at the smartphone’s owner.

?
Pegasus obviously requires a great deal of knowledge and experience from the person who uses it. In addition, in order to run it and install it remotely on devices, you need computers that have algorithms that can break security. But that’s still not much for such powerful software and capabilities as CBA has.

.
A few days ago, analysis and monitoring of the Internet unfortunately showed that Pegasus is also operating in our country. At least, that’s according to the same computer scientists in Canada who detected its surveillance capability. CitizenLab employees announced that the system was in the hands of one of the Polish services, as they had detected its activity in Poland (proof of this is to be found, among other things, in the fact that the software operator had a website name with the suffix “.pl”). However, it was quickly determined which service had acquired the Pegasus license, and everything points to the CBA, which used funds from a grant obtained from the Crime Victims Assistance Fund to do so. Where did this suspicion come from? Well, thanks to a NIK audit, it has come to light that it was the CBA that received as much as 25 million Polish zlotys from public funds for the acquisition of the quoted “special technology means for the detection and prevention of crime.”
It turns out that the software may be illegal when it comes to the option of surveillance of citizens. It is for this reason that the company responsible for its creation, NSO Group, was recently (in 2019) sued by human rights organizations. Their terms are clear – they want the sale of Pegasus abroad to be banned. The organizations cite multiple tracking of equipment belonging to activists and journalists. Such incidents, on the other hand, are blatant violations of basic human rights, according to them.
Do the CBA and Pegasus have anything in common? Did the CBA buy Pegasus? Are the Polish services acting in accordance with the law? No one officially admits that the Central Anti-Corruption Bureau actually purchased the system. The institution itself vehemently denies that such a situation occurred. However, there is some evidence that Pegasus is operating in Poland. At this point, the NIK and the Justice Fund authorities do not confirm information on whether the CBA bought tools, software or technology from NSO Group in 2019 09.
Online security specialists repeat to the boredom the basic rules of appropriate online behavior such as avoiding going to suspicious sites or clicking on links from unknown sources. All this is done to protect your equipment from malicious spyware. However, when using Pegasus, even this is not enough, as it can hack your phone or computer without clicking on dangerous links.
This was discovered by Moroccan journalist and human rights activist Omar Radi, who, according to a report prepared by Amnesty International, was eavesdropped on by his country’s authorities for more than a year using precisely this one of the world’s most advanced spying systems. The Moroccan in the spring of 2019 on Twitter criticized judges convicting participants in anti-government protests in the city of al-Hussein. It was then that the authorities began eavesdropping on him. They used Pegasus to do this, which redirected data traffic from his iPhone to a special server infecting it with malicious code. Radi didn’t even realize the connection was “infected,” and by doing so, the authorities gained access to all the data on his device and were able to eavesdrop on him. The IMSI Catcher, which authorities in many countries use to conduct wiretaps, was probably used for this purpose. One of the manufacturers of such devices is NSO Group, the Israeli company that created Pegasus.

.
It’s worth noting that Radi was careful about what he did on the Internet like few others. He knew he was fighting a state that was not democratic and did not protect freedom of speech, so he did not use messengers that are not encrypted and unsecured sites. And yet, the authorities managed to “hack” him. Since any security system is only as strong as its weakest link, it only took one element that didn’t work. If any of the sites visited via the journalist’s iPhone contained any content whose address did not include https, or protocol encryption, the path to eavesdropping was already open. The malicious code gave the Moroccan secret service full access to Radi’s phone, all his calls and instant messages, and everything he did from then on was used against him.
Both the head of Amnesty International ‘s security lab Claudio Guarnieri and the international Citizen Lab, which investigated the case, are convinced that the Moroccan journalist was under surveillance by the authorities. This was a new type of automated attack using specialized spyware that leaves very few traces, which distinguishes it from traditional attacks that require clicking on an infected link. – After analyzing electronic fingerprints, we were able to confirm that the infrastructure used for this attack is manufactured by NSO Group ,” commented Guarnieri on the case.
In Poland, there has been a debate for several months about whether the CBA purchased the Pegasus system and has such a powerful tool for surveillance of citizens. Theoretically, the average person should not fear the use of this particular system against him, since he is unlikely to do anything that would be of that much interest to the secret service. However, this does not change the fact that we should constantly be reminded of the basic rules, the observance of which on the Internet guarantees protection from the more mundane threats that lurk around us, such as attempts to extort money or data that can be used by someone to steal our identity. Unfortunately, however, the case of Omar Radi is a reminder that with the development of technology, even the most careful use of equipment may not be enough for us to feel truly safe.

To meet the expectations of users of computers, phones and the Internet, after the appearance of information regarding the creation of Pegasus – software for spying on citizens – software began to emerge to detect Pegasus. After all, each of us would like to know if we are being surveillance by the services.
The answer is: absolutely not! Hackers taking advantage of the situation decided to impersonate Amnesty Internetional and created a fake website faithfully reflecting the original. The fake site differs from the original only in the background color, which for the average user is impossible to notice. Users are able to download software that pretends to detect Pegasus on our devices. In fact, Anti Pegasus developers get remote access to our device and the data on it. In fact, it has not been determined how many network users have been infected, but for the moment it is not yet a massive attack.

There is no exact data on for what purpose the hackers remotely connect to Internet users’ devices, as money from ban accounts is not being stolen. Perhaps it’s to seize personal data and use it later, yet Anti Pegasus is supposed to counter such procedures itself. Remote access to the device also allows hackers to later install various software and plug-ins that infect our hardware. People who have downloaded malware are not really able to notice it on their computer. Anti Pegasus is programmed in such a way that it can bypass security.
In conclusion, Anti Pegasus software, instead of helping to detect the Pegasus spyware system on our device, can do more harm than good. It is very difficult to notice that our computer has been hacked.