Authors:
Osama Hussien, Usman Butt, Rejwan Bin Sulaiman
Addresses:
Department of Computer Science and Engineering, Northumbria University, Middlesex Street, London, United Kingdom.
Individuals, businesses, and governments all face additional difficulties because of the rise of sophisticated cyberattacks. This paper examines the targeting of journalists and activists by the Pegasus malware. To gain a deeper understanding of the tactics utilised by cybercriminals and the vulnerabilities that facilitate their scope, this research examines numerous occurrences. It identifies recurring patterns in the strategies, methods, and practices employed. In this paper, a comprehensive analysis is conducted of the far-reaching consequences of these attacks for cybersecurity policy, encompassing the pressing need for enhanced threat intelligence-sharing mechanisms, the implementation of more resilient incident response protocols, and the allocation of greater financial resources to advance cybersecurity research and development initiatives. The research also discusses how Pegasus will impact SCADA systems and critical infrastructure. It outlines some of the most crucial tactics businesses can employ to mitigate the risk of cyberattacks and protect themselves against the evolving threats of the 21st century. The extent of Pegasus spyware, which can access various data and communications on mobile devices running iOS and Android, potentially jeopardises the civil rights and privacy of journalists, activists, and political leaders worldwide. It was found to be worrying.
Keywords: Pegasus Spyware; Cyberattack Tools; Cybersecurity Policy; SCADA Systems; Critical Infrastructure; Privacy and Civil Liberties; Threat Intelligence Sharing; Incident Response Plans; Natural Language Processing.
Received on: 02/10/2024, Revised on: 17/12/2024, Accepted on: 21/01/2025, Published on: 05/06/2025
DOI: 10.69888/FTSCS.2025.000435
FMDB Transactions on Sustainable Computing Systems, 2025 Vol. 3 No. 2, Pages: 114-121