The Tool That Spies on Social Media Accounts and Calls: The deeper dive

Imagine every call you make, every message you send, and every photo you share on WhatsApp, Facebook, or Telegram silently intercepted. For thousands across the globe, this isn’t paranoia—it’s the reality of Pegasus, a powerful spyware tool capable of turning any smartphone into a 24/7 surveillance device. Developed by the Israeli company NSO Group, Pegasus has become one of the most feared digital weapons of the 21st century, secretly infiltrating the phones of journalists, activists, politicians, and even world leaders.

What began as a government-sanctioned tool to fight terrorism and organized crime has spiraled into a scandal-ridden saga of repression, lawsuits, and global outrage. From leaked databases to courtroom battles, Pegasus has left behind a trail of silenced voices, shattered privacy, and urgent questions about who truly controls our digital lives.

The Birth of a Digital Phantom

NSO Group was founded in 2010 by Shalev Hulio and Omri Lavie, both veterans of Israel’s elite Unit 8200 intelligence corps. The company positioned itself as a provider of “lawful interception” software for governments, with exports licensed by Israel’s Ministry of Defense. Pegasus, their flagship product, lived up to its mythological namesake: a winged horse capable of soaring undetected into the lives of its targets.

By 2011, Pegasus was operational and sold to countries battling organized crime and terrorism. Mexico was an early buyer, reportedly spending over $60 million by 2023 to deploy the tool against drug cartels. But almost immediately, reports of misuse emerged. In 2016, researchers at Citizen Lab and Lookout Security caught Pegasus attempting to hack the phone of Emirati human rights activist Ahmed Mansoor. The attack revealed three previously unknown iOS vulnerabilities, forcing Apple into an emergency patch.

Despite such exposures, NSO operated in secrecy. A 2024 “Transparency and Responsibility Report” claimed to align its practices with UN human rights guidelines, but critics dismissed it as cosmetic, pointing to mounting evidence of abuse.

The Invisible Intrusion

Pegasus is designed for stealth. It can penetrate smartphones—iOS and Android alike—without leaving obvious traces. Early versions required victims to click malicious links, but by 2020 it had evolved into “zero-click” exploits. These required no interaction at all: a simple missed call, an iMessage, or even network-level vulnerabilities were enough.

Once inside, the spyware offers god-like control—reading messages, tracking locations, harvesting passwords, eavesdropping on calls, and even remotely activating cameras and microphones. Forensic reports like Citizen Lab’s 2023 BLASTPASS analysis showed how Pegasus exploited iOS 16.6 to compromise the phones of civil society workers in Washington, D.C.

To avoid exposure, Pegasus can self-destruct: if it loses contact with its command server for 60 days, it erases itself. Detection is notoriously difficult, with only a handful of forensic tools—like Amnesty’s Mobile Verification Toolkit—capable of confirming infections.

The Breaking Point

The true scale of Pegasus’s reach became clear in July 2021 with the Pegasus Project, a global investigation by Amnesty International, Forbidden Stories, and 17 media outlets. A leaked database of 50,000 phone numbers—linked to NSO clients—showed targets ranging from journalists and activists to prime ministers and presidents.

Forensic checks confirmed Pegasus infections on dozens of devices. Saudi Arabia and the UAE reportedly used it against dissidents, including associates of murdered journalist Jamal Khashoggi. In India, opposition leaders and reporters were targeted, sparking political uproar. Morocco allegedly spied on French President Emmanuel Macron, while Hungary’s Viktor Orbán monitored critics.

The fallout was seismic. The U.S. blacklisted NSO in 2021, Apple sued the company, and whistleblowers accused it of putting profit before ethics.

Human Cost Across Borders

Behind every infection is a story of silenced voices. In Mexico, Pegasus was used against journalists investigating corruption. In El Salvador, reporters at El Faro endured relentless surveillance. Bahrain and Rwanda turned it on dissidents, while European leaders—including Spain’s Prime Minister Pedro Sánchez—found their devices compromised.

By 2025, Amnesty reported Pegasus infections among Serbian journalists from BIRN. Even Israeli police were accused of unauthorized deployments at home. A WhatsApp court case revealed that more than 1,000 users across 45 countries were hit.

Legal Reckonings

NSO now faces a barrage of lawsuits. In May 2025, a U.S. jury ordered it to pay heavy damages to WhatsApp, while a July ruling revived Salvadoran journalists’ claims in U.S. courts. Yet the spyware market thrives. The Atlantic Council warned in 2025 that NSO is part of a booming global industry that continues to fuel surveillance abuses.

A Lingering Threat

As of October 2025, Pegasus is still active. Citizen Lab’s September report Exposing Pegasus: How the State Spies on You warned of the chilling effect on free speech and democracy. New incidents—like the BIRN hacks earlier this year—show the abuse is far from over.

Governments continue to purchase licenses, from Djibouti to Estonia, even as global debates on regulation drag on. Critics fear the spyware could tip elections or silence entire movements.

The Unseen Horizon

Pegasus is not just code; it is a symbol of how fragile digital freedom has become. It has shaken trust in technology, enabled repression, and blurred the line between security and abuse. Until binding global norms emerge, the winged horse will keep flying silently in the shadows, leaving privacy in ruins.

6
Show Comments (0) Hide Comments (0)
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x