Pegasus spyware target expands beyond activists and journalists, found on everyday users' devices

Shawn Knight

Posts: 15,519   +194
Staff member
The big picture: Pegasus spyware developed by Israeli cyber-intelligence firm NSO Group has been infecting Android and iOS devices for more than a decade. The sophisticated spy software is difficult to detect, often requiring specialized forensic skills that were not cheap to obtain. As a result, a narrative developed that Pegasus was a rare threat and really only something that high-profile targets like journalists and political activists had to be concerned about. A recent investigation from iVerify, however, suggests this assumption might not be entirely accurate.

The mobile threat hunting company rolled out a new feature back in May 2024 that allows customers to conduct a professional-grade security scan of their mobile device without having to consult a forensics expert. Of the 2,500 self-initiated scans, Pegasus was discovered on seven devices.

Sure, seven installations out of 2,500 isn't overwhelming (it is fewer than 0.28 percent of all scans). What's more, the sample size is relatively small and is a bit skewed because it involves targeted users that already have an interest in device security. Still, it is noteworthy.

iVerify COO Rocky Cole told Wired that the people targeted are not just high profile journalists or activists, but also business leaders, people running commercial enterprises, and government leaders.

"It looks a lot more like the targeting profile of your average piece of malware or your average APT group than it does the narrative that's been out there that mercenary spyware is being abused to target activists," Cole said. "It is doing that, absolutely, but this cross section of society was surprising to find."

The infections spanned a range of operating system versions and installation timelines as well. One instance was installed in late 2023 on iOS 16.6 while another originated in November 2022 on iOS 15. The five others dated back to 2021 across iOS 14 and iOS 15. In all cases, Pegasus was undetected by traditional security measures.

iVerify co-founder Matthias Frielingsdorf will be presenting the firm's full findings at the Objective by the Sea security conference later this week.

Those interested in scanning their device can do so by downloading the iVerify Basic app. It sells for $0.99 and includes the option to conduct a one-time threat hunt in about five minutes. iVerify also offers EDR and Elite-level subscriptions for corporate, government, and other high-value targets.

Image credit: Point Normal

Permalink to story:

 
It's not surprising. The Israeli government has spent enormous amounts of money and resources on covert ways to control society. Israeli espionage permeates modern society. Look at the recent Israeli military tactic of exploding pagers and cellphones. And their assassination operations. Also check out Kosher food labels. Almost everything you buy in a supermarket has a Kosher label. Meaning it is overseen by an obscure religious group.

 
Bitdefender, Kaspersky, and other internet security apps can detect Pegasus. Obviously they're paid applications too, but if you already have their software installed you can check for yourself without spending the extra buck.
Amnesty International has an application called MVT for scanning also, but it's not really meant for end-users.
 
I’m tempted to pay the $1.

Damn my curiosity!

To be fair, I am skeptic. No app through the app store can have root access to any iphone.

I've tried to look up reviews, but I cant find none other then "Our product is better then that product" type of stuff.

This seems like a paid posting to me.

 
Why should companies that develop this aids bare no responsibility?
Imagine how many people it affects, and will affect even more.
There has to be some responsibility
 
It's not surprising. The Israeli government has spent enormous amounts of money and resources on covert ways to control society. Israeli espionage permeates modern society. Look at the recent Israeli military tactic of exploding pagers and cellphones. And their assassination operations. Also check out Kosher food labels. Almost everything you buy in a supermarket has a Kosher label. Meaning it is overseen by an obscure religious group.
You forgot to mention Stuxnet from 2007.
 
To be fair, I am skeptic. No app through the app store can have root access to any iphone.

I've tried to look up reviews, but I cant find none other then "Our product is better then that product" type of stuff.

This seems like a paid posting to me.
Well, the scanning app wouldn't need root access if there was a non-root fingerprint of Pegasus that it could look for.

Still, your caution is wise. Especially, since it shouldn't find anything 99% of the time. So if it doesn't find anything is that the reality or just a fake app playing the odds?
 
Well, the scanning app wouldn't need root access if there was a non-root fingerprint of Pegasus that it could look for.

Still, your caution is wise. Especially, since it shouldn't find anything 99% of the time. So if it doesn't find anything is that the reality or just a fake app playing the odds?

For only 99 dollar cents... What can be the catch right?

I've went through security and privacy settings myself; I've activated isolation mode as well.

But you can't ignore your phone simply being tracked to the point of where ever your phone is located to and which pole. That data is stored for at least 6 months and profiled through your IMEI, which is a unique number.

Followed with that, even whatsapp does have backdoors for authorities to realtime monitor anything going on in there. And on top of that, if you use your icloud backup service, even Apple has to co-operate in order to provide the given details.

Best security, privacy, is to even avoid having a mobile phone in the first place.
 
It's not surprising. The Israeli government has spent enormous amounts of money and resources on covert ways to control society. Israeli espionage permeates modern society. Look at the recent Israeli military tactic of exploding pagers and cellphones. And their assassination operations. Also check out Kosher food labels. Almost everything you buy in a supermarket has a Kosher label. Meaning it is overseen by an obscure religious group.

Like it or not, it is genius to what happened to those pagers.

Israel have one of the brightest, most clever people on this planet. Their tech and skills are beyond to what other countries can do.
 
For only 99 dollar cents... What can be the catch right?

I've went through security and privacy settings myself; I've activated isolation mode as well.

But you can't ignore your phone simply being tracked to the point of where ever your phone is located to and which pole. That data is stored for at least 6 months and profiled through your IMEI, which is a unique number.

Followed with that, even whatsapp does have backdoors for authorities to realtime monitor anything going on in there. And on top of that, if you use your icloud backup service, even Apple has to co-operate in order to provide the given details.

Best security, privacy, is to even avoid having a mobile phone in the first place.
Not having a mobile phone and not using the internet if you really want to be safe.

Good encryption and security practices at least limit the number of bad actors and three letter agencies (but I repeat myself) that can track you, and the extent to which they can track you.

But unplugging is the only way to limit them to things like the surveillance cameras that are springing up in most cities.
 
Not having a mobile phone and not using the internet if you really want to be safe.

Good encryption and security practices at least limit the number of bad actors and three letter agencies (but I repeat myself) that can track you, and the extent to which they can track you.

But unplugging is the only way to limit them to things like the surveillance cameras that are springing up in most cities.
Yes and my city in Texas revealed it had a central camera data center and was able to link door bell cameras to it and was asking the public to volunteer connecting their doorbell cameras to it! What could go wrong?? 😱
 
Back