{
	"id": "70358fd2-b217-46a9-9fc4-3be13719288d",
	"created_at": "2026-04-06T00:22:26.455166Z",
	"updated_at": "2026-04-10T03:21:33.156863Z",
	"deleted_at": null,
	"sha1_hash": "be1e4f5ab9c3228fb0eff3e909aa75447ba3ad8a",
	"title": "About the Pegasus Project - Forbidden Stories",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29154,
	"plain_text": "About the Pegasus Project - Forbidden Stories\r\nBy webmaster\r\nPublished: 2021-07-18 · Archived: 2026-04-02 11:14:09 UTC\r\nNSO Group asserts that the product it sells to government clients – most commonly referred to as Pegasus – is\r\nintended to “collect data from the mobile devices of specific individuals, suspected to be involved in serious crime\r\nand terror.” Pegasus has extensive capabilities: the spyware can be installed remotely on a smartphone without\r\nrequiring any action from its owner. Once installed, it allows clients to take complete control of the device,\r\nincluding accessing messages from encrypted messaging apps like WhatsApp and Signal, and turning on the\r\nmicrophone and camera.\r\nSource: https://forbiddenstories.org/about-the-pegasus-project/\r\nhttps://forbiddenstories.org/about-the-pegasus-project/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://forbiddenstories.org/about-the-pegasus-project/"
	],
	"report_names": [
		"about-the-pegasus-project"
	],
	"threat_actors": [],
	"ts_created_at": 1775434946,
	"ts_updated_at": 1775791293,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/be1e4f5ab9c3228fb0eff3e909aa75447ba3ad8a.pdf",
		"text": "https://archive.orkl.eu/be1e4f5ab9c3228fb0eff3e909aa75447ba3ad8a.txt",
		"img": "https://archive.orkl.eu/be1e4f5ab9c3228fb0eff3e909aa75447ba3ad8a.jpg"
	}
}