What is pegasus

Table of Contents

What is behind the name Pegasus?

Pegasus is a spyware for spying on mobile devices that was developed by the NSO Group.

NSO Group is an Israeli technology company that primarily develops software and surveillance technologies. The focus of the attacks so far has been primarily on journalists, human rights activists, business people and politicians.

NSO Group claims Pegasus would only be used to investigate terrorism and crime and would leave no trace. However, the fact is that widespread, ongoing unlawful surveillance and human rights violations are taking place through Pegasus. For this purpose, the human rights organization Amnesty International forensically analyzed numerous mobile devices belonging to human rights defenders and journalists around the world.

What is the problem and what does Pegasus do?

The spyware is able to take over the camera and microphone of a mobile device and thus record conversations. Pegasus is also able to access content such as passwords saved in the browser history, location, documents and photos. Pegasus doesn't stop at the numerous messenger services either and reads all the messages. The entire address book is also copied.
Pegasus on a mobile device

How does Pegasus get to a mobile device?

Pegasus currently reaches end devices via various methods Zero-day vulnerabilities in iMessage, for example.

Apple has now reacted and provided the recently released iOS 14.8, macOS 11.6 and watchOS 7.6.2 with a security patch that prevents Pegasus from infecting the device via iMessage.

In order to check whether your device is infected with Pegasus, you will find instructions below to scan your device.

How well is your IT system protected?
Have your IT checked now by a professional vulnerability analysis!
For weak point analysis

Pegasus Detection on IOS

iOS Encrypted Backup

  1. Connect iPhone to Macbook via USB cable.
  2. Select the iPhone in the Finder sidebar.
  3. Click on “General” in the Finder window
  4. Tick ​​“Encrypt local backup” to encrypt the backup data and protect it with a password.
  5. Tick ​​the option “Create a backup of all your iPhone’s data on this Mac”.
  6. Click on “Create backup now”.
  7. If necessary, enter passcode on iPhone.
pegasus IOS Encrypted Backup

For more help, see “Backing up your iPhone using your Mac”

https://support.apple.com/de-de/guide/iphone/iph3ecf67d29/ios

Pegasus MVT Scan on IOS – Step by Step Guide

Grant terminal access:

Before a scan of any kind can be started, a terminal of your choice requires full access. You can grant this to your preferred terminal in the data protection & security settings.

Python must be installed, but it is preinstalled by default on today's computers. Some parts of the scan may require root permissions. To get this, enter “sudo -s” in the terminal and then enter your password.

Now follows a series of terminal commands to prepare the scan:

				
					cd /Users/%username%/Library/Application Support/MobileSync/Backup
				
			

Navigates to the backup folder
(Replaced %username% with your username)

				
					pip3 install mvt
				
			

Installs the MVT scanner

				
					wget https://raw.githubusercontent.com/AmnestyTech/investigations/master/2021-07-18_nso/ -O pegasus.stix2
				
			

Download the Amnesty IOCs

				
					mkdir results
				
			

Creates a folder for scan results

				
					mvt-ios decrypt-backup -p '<passwort>' -d '<ordner>' '<backup_ordner_name>'
				
			

You can then run the scan with the following command:

				
					mvt-ios check-backup --iocs '<pegasus_test.stix2 pfad>' --output 
'<results order pfad>' '<unverschlüsseltes backup pfad>'  
				
			

Scan the given backup via MVT & IOCs

Result of the scan

If everything went successfully, there should be a number of json files in the results folder. Any filename ending in _detected.json indicates that a trace of Pegasus was found in your backup.

We would be happy to advise you on other IT security topics!
Contact us now! By phone or via our contact form.
Contact us now
Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!