{"id":10702,"date":"2022-09-22T11:58:55","date_gmt":"2022-09-22T11:58:55","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=10702"},"modified":"2024-05-31T01:05:24","modified_gmt":"2024-05-31T01:05:24","slug":"pegasus-spyware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/pegasus-spyware\/","title":{"rendered":"Pegasus Spyware \u2014 The Most Dangerous Malware"},"content":{"rendered":"<p style=\"text-align: justify\">Pegasus Spyware is a malicious program that is covered with multiple layers of secrets, rumours and false claims. That military-grade malware is something like a legend, that sometimes makes people think it is rather mythical than real. Still, the real Pegasus appears from time to time, just to notify everyone that <strong>it is still the best spying software through all that has ever existed<\/strong>.<\/p>\n<h2>What is Pegasus Spyware?<\/h2>\n<p style=\"text-align: justify\">Pegasus <a href=\"https:\/\/gridinsoft.com\/blogs\/signs-of-spyware-attack\/\">is a spying software<\/a>, developed by NSO Group around 2011. There are no precise terms available, and the community can only estimate its release date by its first appearance. It likely saw its first application in 2012, when it was supplied to the Panama government. Such a mystery is explained pretty simply &#8211; <strong>NSO is a subordinate company of the Israeli government<\/strong>. The primary purpose of this software was to spy upon anti-Israelian activists, war criminals, and persons suspected of spying for other countries. One may say, it is an example of a cyberweapon \u2013 the most modern and pretty effective one.<\/p>\n<figure id=\"attachment_10711\" aria-describedby=\"caption-attachment-10711\" style=\"width: 1312px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-control-panel.jpg\" alt=\"Pegasus control panel\" width=\"1312\" height=\"869\" class=\"size-full wp-image-10711\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-control-panel.jpg 1312w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-control-panel-300x199.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-control-panel-1024x678.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-control-panel-768x509.jpg 768w\" sizes=\"auto, (max-width: 1312px) 100vw, 1312px\" \/><figcaption id=\"caption-attachment-10711\" class=\"wp-caption-text\">Pegasus spyware control panel<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Its functionality is pretty wide since by design it should be able to provide all possible information about the victim to the person who controls it. Originally, it was oriented on iOS devices, and only several Android attack cases were spotted. There is another malware developed by NSO Group &#8211; <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/apk.chrysaor\" rel=\"noopener noreferref nofollow\" target=\"_blank\">Chrysaor spyware<\/a> &#8211; that is apparently <strong>the Pegasus version which has some adjustments for more efficient attacks on Android devices<\/strong>.<\/p>\n<h2>How is Pegasus Spyware Spread?<\/h2>\n<p style=\"text-align: justify\">As Pegasus is a very precise tool that is sold for a pretty big price, there is no massiveness in its spreading &#8211; only point strikes that aim at designated persons. Most Google queries like \u201cpegasus spyware download\u201d will lead you to sites that offer a counterfeit for a large sum, or just spyware that will infect your device. <strong>NSO Group usually signs a contract with its counterparty<\/strong> (the govt of another country) where the key points about the program usage are stated. In particular, the developers leave the right to decide which amount of functions will be available to a certain country. There is also a contract clause that the government must use the Pegasus <a href=\"https:\/\/economictimes.indiatimes.com\/news\/international\/world-news\/pegasus-spyware-maker-nso-has-22-contracts-in-eu-report\/articleshow\/93484820.cms?from=mdr\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">only for counter-terroristic actions<\/a> and for national security needs.<\/p>\n<p style=\"text-align: justify\">On the devices of users who somehow managed to become a threat to national security, the Pegasus arrives generally through social engineering. Still, the approaches used still differ from <a href=\"https:\/\/gridinsoft.com\/blogs\/top-facebook-scams\/\">classic Facebook spam<\/a> or something like that. As those persons usually suspect that someone can try to attack them in that way, they will not recklessly click whatever they see. A pretty useful habit for everyone, but not everyone risks getting the Pegasus or spyware, comparable by the level of danger. <\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-spyware-scheme.png\" alt=\"How does Pegasus work?\" width=\"1000\" height=\"501\" class=\"aligncenter size-full wp-image-10710\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-spyware-scheme.png 1000w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-spyware-scheme-300x150.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-spyware-scheme-768x385.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h3>The typical ways of this spyware injection are the following:<\/h3>\n<p style=\"text-align: justify\">Phishing links are sent via popular messenger or to the email. Usually, those are <strong>WhatsApp, iMessage or Facebook<\/strong> &#8211; these places are pretty popular among other cybercriminals as well. But this time, the message receives <a href=\"https:\/\/gridinsoft.com\/blogs\/phishing\/\">a way more serious disguise<\/a> &#8211; thanks to the \u201cextended\u201d abilities of governmental companies. The latter can easily uncover when the subject of surveillance awaits the delivery, or an invoice from an insurance company.<\/p>\n<p style=\"text-align: justify\"><strong>Zero-click vulnerability exploitation<\/strong>. This rare type of exploit is even harder to imagine in iOS, which stands out with its security features. However, this breach in iMessage is actual for all versions up to 14.7 &#8211; then Apple claimed it fixed the breach. To be trapped, it was not required even to open the app or read the message &#8211; once received, it already was able to install the Pegasus. As researchers say, this bug could be present <strong>in the operating system since iOS 7<\/strong> &#8211; which was released in 2013.<\/p>\n<figure id=\"attachment_10713\" aria-describedby=\"caption-attachment-10713\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/imessage-sms-breach.jpg\" alt=\"iMessage zero-click vulnerability SMS\" width=\"750\" height=\"345\" class=\"size-full wp-image-10713\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/imessage-sms-breach.jpg 750w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/imessage-sms-breach-300x138.jpg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-10713\" class=\"wp-caption-text\">These SMS were used to deliver Pegasus<\/figcaption><\/figure>\n<p style=\"text-align: justify\"><strong>Photos app exploitation<\/strong>. Apple implemented its unique way for iPhones, iPads, Macs and the rest of their product lineup to process the images. However, as it was uncovered, this method made it possible to exploit the Tagged Image File Format (TIFF) files for remote code execution. The breach received the index of <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-4631\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2016-4631<\/a>. Crooks were sending the photo to a victim, and once they tried to open it &#8211; the code was executed and the Pegasus was delivered.<\/p>\n<p style=\"text-align: justify\"><strong>Apple Music MitM attacks<\/strong>. Apple Music application \u2013 a cross-platform mobile music library that is present on both iOS and Android, had a security flaw in its version for iOS 11. It lacked the diligent checkup of certain SSL certificates from the server. This cert serves for making sure that the server the app has connected to is genuine, and that no one can eavesdrop on the traffic. However, the uncovered flaw made it possible to spoof the certificate and connect the device to a hacker\u2019s server, giving them the ability to interact with the system without any restrictions and security alarms. That flaw got the index of <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-2387\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2017-2387<\/a>.<\/p>\n<h2>Pegasus Spyware technical details<\/h2>\n<p style=\"text-align: justify\">The sophisticated delivery ways I have mentioned above already made this malware quite unique. But the things under its hood are even more amazing &#8211;  <strong>that\u2019s the real representation of how well the malware may be made<\/strong>. Contrary to most of the malware you can see for sale <a href=\"https:\/\/gridinsoft.com\/darknet\">in the Darknet<\/a>, it is made for being way more autonomous &#8211; so even the target who expects the spying will likely miss its presence. It also tries to usethe deep integration to the attacked system by getting information directly from the hardware. That helps the Pegasus to circumvent the OS restrictions or spoofing techniques.<\/p>\n<figure id=\"attachment_10716\" aria-describedby=\"caption-attachment-10716\" style=\"width: 1269px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-indicators.png\" alt=\"Pegasus Spyware IoC\" width=\"1269\" height=\"744\" class=\"size-full wp-image-10716\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-indicators.png 1269w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-indicators-300x176.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-indicators-1024x600.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/pegasus-indicators-768x450.png 768w\" sizes=\"auto, (max-width: 1269px) 100vw, 1269px\" \/><figcaption id=\"caption-attachment-10716\" class=\"wp-caption-text\">Indicators of Compromise for Pegasus Spyware<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Pegasus is <strong>capable of reading SMS, emails, recording cellular and VoIP calls<\/strong>, and enabling the mic and camera to record the environment around the phone. It also has full access to the device memory: this malware can harvest photos and videos present on the device, as well as a calendar and contact book. Thus, it is theoretically capable of deleting certain data from the phone &#8211; but it goes against stealthiness. This malware can also grab the information about the current phone location &#8211; regardless if there are any software location spoofers present, it will get the info directly from the GPS chip.<\/p>\n<p style=\"text-align: justify\">Aside from the \u201cdeep\u201d data, Pegasus is also able to dig into the programs to get the information. Popular apps like WhatsApp, Viber and Facebook Messenger can easily be accessed, resulting in stolen conversations, and even more contacts leaked. Researchers say <a href=\"https:\/\/www.france24.com\/en\/live-news\/20210718-50-000-phone-numbers-worldwide-on-list-linked-to-israeli-spyware-reports\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">about over 50,000 contacts<\/a> that Pegasus have successfully stolen from the attacked devices. As this spyware always runs with root privileges, it can even recover the data that was deleted some time ago &#8211; of course, if it is possible for the storage device technology.<\/p>\n<p style=\"text-align: justify\">The infamous spyware can also perform self-destruction under different circumstances. If it cannot connect to the command server for more than 2 months (60 days), <strong>it automatically destructs itself, together with the packages of gathered data<\/strong>. Alternatively, it may be self-destructed from the device after the corresponding command from the server. It also provides some alternative ways of installation \u2013 even with physical access to the device.<\/p>\n<h2>Pegasus and the international community<\/h2>\n<p style=\"text-align: justify\">According to the reports from different sources, there are thousands of people from all over the world who were attacked with Pegasus Spyware. Some of them were breached through WhatsApp, some got a malicious iMessage SMS. The only thing that unites them, aside from the payload, is the fact that they had no way to prevent that. Most of the injection cases were done through zero-day vulnerabilities that were uncovered later by the developers. This thing, considering that spying is not a very moralistic act, creates a lot of awkward questions.<\/p>\n<p style=\"text-align: justify\">First of all, <strong>do the governments have a right to spy on the person they want to?<\/strong> When buying the Pegasus, govts promise they will use the tool only against the persons who pose a threat to national security. However, this category\u2019s borders are blurred. Some Muslim countries have proven that by spying on human rights activists, in particular &#8211; women who promoted women\u2019s rights in Middle East countries.<\/p>\n<p style=\"text-align: justify\">Second &#8211; <strong>is there a way to prevent that?<\/strong> Obviously, this question appeared almost immediately after the Pegasus identification. An infamous Anti-Pegasus tool, <a href=\"https:\/\/gridinsoft.com\/spyware-remover\">anti-spyware software<\/a> that is designed only to detect and wipe out the Pegasus, became not just an item of constant speculations, but also the disguise for the other malware. Still, it does not provide you <a href=\"https:\/\/github.com\/AmnestyTech\/investigations\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">with a guarantee<\/a> that malware will be deleted, since this spyware is extremely secretive.<\/p>\n<p style=\"text-align: justify\">On the other hand, installing the last security updates and using the most modern smartphones will likely not help at all. Hackers who deploy malware use the most unexpected ways, which are not countered by software patches or other stuff. To be honest, there is no way to prevent zero-day exploitation on mobile phones &#8211; just because there are no solutions capable of doing that without dealing serious harm to the phone&#8217;s performance. Apple implemented a Lockdown mode in iOS 16, which supposes a harsh restriction on the device\u2019s functionality for maximum security. Will this trade-off be effective? Only time will tell us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pegasus Spyware is a malicious program that is covered with multiple layers of secrets, rumours and false claims. That military-grade malware is something like a legend, that sometimes makes people think it is rather mythical than real. Still, the real Pegasus appears from time to time, just to notify everyone that it is still the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":11035,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4],"tags":[257,834,48,374],"class_list":{"0":"post-10702","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"tag-0-day","9":"tag-pegasus-spyware","10":"tag-spyware","11":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/GS_Blog_banner_Pegasus-Spyware-\u2014-The-Most-Dangerous-Malware_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=10702"}],"version-history":[{"count":9,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10702\/revisions"}],"predecessor-version":[{"id":12377,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10702\/revisions\/12377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/11035"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=10702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=10702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=10702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}