Unprecedented Russia-Ukraine GPCyber™ Warfare Escalation | Pegasus Spyware Infiltrates UK PM Mobile & Downing Street Network – Staff Details Posted on Russian Social Media Site.

Pegasus spyware is suspected to have been used to infect the UK government’s 10 Downing Street network, researchers at Canadian internet security watchdog Citizen Lab have concluded.

A device connected to that network was infected using the spyware on 7 July 2020, according to a report on the research by the New Yorker.

The report added that the National Cyber Security Centre (NCSC) tested several phones at Downing Street including that of the prime minister – but was unable to locate the infected device.

It said the nature of any data taken was never determined.

John Scott-Railton, a senior researcher at the Citizen Lab, told the New Yorker: “When we found the Number 10 case, my jaw dropped.”

Ron Deibert, director of the Citizen Lab, confirmed in a statement that in 2020 and 2021 it had “observed and notified the government of the United Kingdom of multiple suspected instances of Pegasus spyware infections within official UK networks”.
Unfolding story. More updates to come


What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?
MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ in 2012. Geo-Poli-Cyber™ hacks are political, ideological, extremist, and ‘religious’ motivated attacks. They are the hacks that cyber security, resiliency and continuity strategies and solutions continue to fail to defend governments and organizations routinely. Key are the destruction/devastation motivated new breed of Geo-Poli-Cyber hackers and lone wolfs who are often directed or backed by not only enemies but presumed allies.
2021 (C) All rights reserved. MLi Group