Unprecedented Russia-Ukraine GPCyber™ Warfare Escalation | Pegasus Spyware Infiltrates UK PM Mobile & Downing Street Network – Staff Details Posted on Russian Social Media Site.

0

Pegasus spyware is suspected to have been used to infect the UK government’s 10 Downing Street network, researchers at Canadian internet security watchdog Citizen Lab have concluded.

A device connected to that network was infected using the spyware on 7 July 2020, according to a report on the research by the New Yorker.

The report added that the National Cyber Security Centre (NCSC) tested several phones at Downing Street including that of the prime minister – but was unable to locate the infected device.

It said the nature of any data taken was never determined.

John Scott-Railton, a senior researcher at the Citizen Lab, told the New Yorker: “When we found the Number 10 case, my jaw dropped.”

Ron Deibert, director of the Citizen Lab, confirmed in a statement that in 2020 and 2021 it had “observed and notified the government of the United Kingdom of multiple suspected instances of Pegasus spyware infections within official UK networks”.
Unfolding story. More updates to come
Leave A Reply

Your email address will not be published.

two + five =

What Are Geo-Poli-Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more