LewRockwell: Pegasus Spyware on Your Phone

The powerful Israeli military-grade spyware made international headlines on Sunday, when media investigations discovered that at least 50,000 people across over a dozen nations had their cellphones targeted in sophisticated hack attacks that stole info and turned devices into mobile bugs.
Governments, journalists, opposition politicians and rights groups worldwide are demanding formal investigations into Pegasus, the spyware product created by shadowy Israeli software company NSO Group. Sold to states to ‘fight terrorism and crime’, the software has been discovered to have been used in unscrupulous ways to target members of the press, lawmakers and others, helping to stamp out dissent or allow governments to get ahead of potentially embarrassing scandals.
How It Works
Pegasus is not your typical ‘one-click’ piece of malware which requires user interaction – usually by following on a malicious link, to get access to a device. Instead, the spyware infects phones through a so-called zero-click attack, which needs no interaction from the target whatsoever to install itself and begin harvesting data.
Once installed, the spyware, which is compatible with both Android and Apple iOS, can gain access to all manner of data on a user’s phone, from contacts and encrypted messages to call records, photos, and GPS location data. What’s more, it’s capable of turning microphones and cameras on or off remotely, thus turning the user’s device into a mobile listening or viewing device.

To conceal its presence, Pegasus minimizes bandwidth consumption to avoid draining battery and raising user suspicious. Instead, it sends regular scheduled updates to command and control servers (C2s) – the computers or domains used by whoever is doing the spying. Unfortunately, the spyware is also impervious to commercially available antivirus software.

How to Check for Pegasus?
The spyware’s inconspicuous nature, its zero-click installation, and imperviousness to antiviruses makes it virtually impossible for phone owners to detect its presence simply by observing their device.

There’s hope, however. Because the software connects to the aforementioned C2s, a search to determine whether or not a phone communicated with known Pegasus installation servers can theoretically detect if the malware is present.

Amnesty International, the London-based human rights organization that helped media blow the lid off the extent of Pegasus’ spread in this weekend’s reporting, identified compromised iPhone devices by studying the records of process executions and network usage performed the phones’ database files – datausage.sqlite and netusage.sqlite.
Amnesty’s analysis found a total of 45 suspicious process names in their analysis , with Citizen Lab, a University of Toronto-based software developer working to protect citizens against surveillance, matching 28 of these processes in their own independently conducted inquiry.
Technology giants like Apple, and app makers like Facebook’s WhatsApp haven’t simply been sitting on their hands while Pegasus runs amok on their devices and software since the spyware was first discovered in 2016, and have sought to close security breaches once they are found. This is one reason that NSO Group has worked to develop new versions of its spyware. Unfortunately, the Israeli spyware giant appears to have remained one step ahead of companies like Apple for the moment, with Citizen Lab research fellow Bill Marczak reporting Monday that the latest version of iOS, version 14.6, is still vulnerable to Pegasus’ zero-click attacks.

 
Users can independently scan their phones for signs that their device has been compromised using Amnesty’s ‘indicator of compromise’ (IoC) toolkit. The software, formally known as the ‘Mobile Verification Toolkit’ or MVT, works with both iOS and Android, and is available for download here.

In its current form, the software is not an easy-to-use experience, has no graphical user interface, and installs on phones’ command line, meaning that basic knowledge of basic coding is needed (details here). The toolkit also requires the download and installation of dependencies to operate.

Once installed, the software allows users to create a backup of their device, check backup files, including artifacts from iTunes’ proprietary backup system, if applicable, extract artifacts from filesystem dumps, and compare stored data to known indicators of compromise. The Android version of the software, which Amnesty says is less fleshed out owing to Pegasus’ greater prevalence on iOS devices, includes the ability to check for the download of non-safelisted APKs (apps), and to search for backups for text messages with links to the roughly 700 known NSO domains (Amnesty says this list will be continually updated).
TechCrunch contributor Zack Whittaker tested out the toolkit on an iPhone, and reported that it takes about 10 minutes to get it up and running, plus the time it takes to back up the phone, which is necessary to decrypt locally stored files. The scan itself takes just one-two minutes, and lists possible signs of compromise in the outputted files.
You’ve Got Pegasus – What Now?

Tech experts don’t make explicitly clear what can be done if Pegasus is found on a device. In a 2019 study, Citizen Lab found that in the case of Android devices, the malware can survive a factory reset on some phones, meaning that the only way to be sure you’re not infected is to get a new phone.

It’s not clear whether NSO Group’s software can survive a hard reset on iOS devices, with Apple tech support reluctant to even admit that its advanced “sandboxed iOS architecture” can be compromised, and recommending software updates to deal with the problem (they don’t).
Tech specialists don’t mention it, but another possible way to reduce exposure to Pegasus is to reduce one’s exposure to the digital world.

Journalists, activists, politicians and others who feel vulnerable can do so by using landlines or simple button phones with no internet capabilities for Pegasus to exploit, by engaging in face-to-face meetings instead of voice and text message conversations, using analogue or simple digital voice recorders, etc. If giving up your smartphone is not an option, there’s always the alternative of using a non-Android, non-iOS smartphone, which may be less vulnerable to the Israeli spyware by virtue of its more limited user base.

None of these techniques can guarantee that whoever may be monitoring you illegally won’t be able to do so, but it will at least require a greater effort on their part to do so.
Reprinted from Sputnik News.

Spread the love
                

Share This Story, Choose Your Platform!

About the Author: NC Scout

NC Scout is the nom de guerre of a former Infantry Scout and Sergeant in one of the Army’s best Reconnaissance Units. He has combat tours in both Iraq and Afghanistan. He teaches a series of courses focusing on small unit skills rarely if ever taught anywhere else in the prepping and survival field, including his RTO Course which focuses on small unit communications. In his free time he is an avid hunter, bushcrafter, writer, long range shooter, prepper, amateur radio operator and Libertarian activist. He can be contacted at [email protected] or via his blog at brushbeater.wordpress.com .

10 Comments

  1. Johnny Paratrooper July 26, 2021 at 11:54

    Wait till everyone figures out what Tinder, Grinder, and Bumble are doing…

    • NC Scout July 26, 2021 at 12:11

      ….or the other one.

      • Johnny Paratrooper July 26, 2021 at 12:53

        Who Telegram, Rumble, Gab, Parler, or Gettr?
        Lmao. The never ending Digital Gulag Shuffle.

        • NC Scout July 26, 2021 at 17:41

          bUt gAb Is pRO-fReE sPEEcH bEcAuSe I gEt To sAy wHuT i wAnT???

          • Johnny Paratrooper July 26, 2021 at 17:44

            The Q-Tards flocking to websites run by “Russians” on UAE server farms is… retarded…
            I honestly have a hard time believe how freaking ridiculous they are.

          • NC Scout July 26, 2021 at 17:45

            Even better is the people who have zero idea how any of this works or what its doing on the backend.
            They talk about organizing guerrilla bands on an enemy platform and they do so becasue they’ve never experienced the consequences of stupid.
            Imagine that.

  2. vyt1az July 27, 2021 at 12:08

    I ran the MVT scan and I’m extremely disappointed that I didn’t have Pegasus malware on my phone.
    I’m obviously not trying hard enough.
    For the tech savvy out there, consider helping your trusted contacts by offering to scan their phones.

  3. Hoss August 18, 2021 at 02:07

    Why are people even still using these devices? What idiocy. They still make basic cell phones. What’s the next article going to be about, how to secure your facebook page? Put the screens down you ijuts. Stop carrying live surveillance and tracking device in your pocket. I mean really, what a farce if you can’t step away from obviously compromised tech.

    • NC Scout August 18, 2021 at 08:12

      Flip phones are even easier.
      Nice try though.

Comments are closed.

GUNS N GEAR

Categories

Archives

Spread the love