PEGASUS Spyware: Detecting and Protecting Your Smartphone From
PEGASUS Spyware: Detecting and Protecting Your Smartphone From
protecting your
smartphone from
PEGASUS Spyware
What is Pegasus?
The spyware Pegasus has been attributed to the NSO Group, an Israeli
company. As per recent reports this spyware has been used to facilitate
human rights violations worldwide on a massive scale. It is a program that
allows the attacker to access the infected smartphone’s microphone and
camera. One can even gain access to messages, emails and collect location
data, giving near-complete access to one's smartphone.
The spyware has also gained some new abilities. Researchers found that a
phone can be infected with Pegasus just by calling via WhatsApp. The user
doesn’t even have to pick up the call, and the device will still get infected;
making it zero-click spyware needing no input from a victim.
Moreover, once it has access to the device, it can delete any call logs making
it impossible for the victim to know that their phone was a target of the
spyware.
Pegasus for Android does not rely on zero-day vulnerabilities. Instead, it uses
a well-known rooting method called Framaroot, which is undetected to the
victim. For iOS, it relied on three zero-day vulnerabilities that allowed it to
jailbreak the device and install surveillance software silently.
After scanning the target's device, it installs the necessary modules to read
the user's messages and mail, listen to calls, capture screenshots, log
keystrokes, access browser history and contacts. Hence, it can spy on every
aspect of the target's life.
If the spyware fails to jailbreak the iOS device, the whole attack fails. Still, on
Android, even if the malware fails to obtain the necessary root access to
install surveillance software, it will try by directly asking the user for the
permissions it needs to exfiltrate at least some data.
Your phone will not show any lags or visible signs when it is infected by
Pegasus.
One way to find out if you are infected with Pegasus is through WhatsApp.
The app sends critical alert messages to the list of affected users, asking
them to update to the application’s latest version.
Till now, the message from WhatsApp and Citizen Lab is the only visible
indicator that tells you whether your phone has been affected.
Another method to discover if you have been infected by the spyware on
Android mobiles is to check if your device has been rooted without your
knowledge using any root reviewing application.
Several cybersecurity analysts and experts have found that the only way to
get completely rid of Pegasus is to discard the phone that has been affected.
According to Citizen Lab, even factory resetting your smartphone will not be
helpful as it cannot eliminate the spyware. The attackers can continue to
access your online accounts even after your device is no longer infected.
To ensure your online accounts are safe, change the passwords of all the
applications and services you use on the infected device.
1. Monitor the change in the daily data usage (The data usage is higher
background.
7. WhatsApp alerts are important; WhatsApp will send regular alerts for
updates.
8. Check whether the phone has been rooted (or jailbroken, in case of
iPhones).
1. Users can deploy the Mobile Verification Toolkit (MVT) to detect the
presence of Pegasus spyware. This tool works on both Android and iOS
devices.
on a Mac or PC.
4. After the data backup and encryption, if you’re using a Mac to run the
downloaded from the App Store) and Python3 before you can install
and run MVT. The easiest way to obtain Python3 is using a program
called Homebrew, which can be installed and run from the Terminal.
instructions.
~/Desktop/bkp/orig
~/Downloads/pegasus.stix2 ~/Desktop/bkp/decrypt
6. The indicator of the compromised files are called out while running the
pegasus.stix2.
7. After running the MVT, it will list the suspicious files, but it may not
confirm yet whether you have been infected by the spyware or not.
1. Don’t open any suspicious or malicious files and links; only open the
2. Avoid using public and free WiFi Services; even if you are accessing
4. Always make sure that all the applications and phone operating
1. https://www.theverge.com/2021/7/21/22587234/amnesty-international-nso
-pegasus-spyware-detection-tool-ios-android-guide-windows-mac
2. https://tech.firstlook.media/how-to-defend-against-pegasus-nso-group-s
-sophisticated-spyware
3. https://github.com/mvt-project/mvt
4. https://blog.lookout.com/protect-against-pegasus-spyware