{"id":32047,"date":"2021-07-23T07:44:41","date_gmt":"2021-07-23T03:44:41","guid":{"rendered":"http:\/\/www.mauritiustimes.com\/mt\/?p=32047"},"modified":"2021-07-23T07:44:41","modified_gmt":"2021-07-23T03:44:41","slug":"how-does-the-pegasus-spyware-work-and-is-my-phone-at-risk","status":"publish","type":"post","link":"https:\/\/www.mauritiustimes.com\/mt\/how-does-the-pegasus-spyware-work-and-is-my-phone-at-risk\/","title":{"rendered":"How does the Pegasus spyware work, and is my phone at risk?"},"content":{"rendered":"<h4 style=\"text-align: center;\"><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"11847\" data-permalink=\"https:\/\/www.mauritiustimes.com\/mt\/what-happens-to-your-facebook-account-and-your-email-messages-when-you-die\/the-conversation\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?fit=400%2C41&amp;ssl=1\" data-orig-size=\"400,41\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"The Conversation\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?fit=640%2C65&amp;ssl=1\" class=\" wp-image-11847 alignleft\" src=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2018\/02\/The-Conversation-e1535448713758.jpg?resize=137%2C14&#038;ssl=1\" alt=\"\" width=\"137\" height=\"14\" \/><\/em><\/h4>\n<h4><\/h4>\n<h4 style=\"text-align: center;\"><span style=\"color: #800000;\"><em>It&#8217;s reported the Pegasus spyware can capture a user&#8217;s keystrokes, intercept communications, track their device and tap into their camera and microphone<\/em><\/span><!--more--><\/h4>\n<p><span style=\"color: #000000;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"32048\" data-permalink=\"https:\/\/www.mauritiustimes.com\/mt\/how-does-the-pegasus-spyware-work-and-is-my-phone-at-risk\/pegasus\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?fit=1200%2C586&amp;ssl=1\" data-orig-size=\"1200,586\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Pegasus\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?fit=640%2C313&amp;ssl=1\" class=\"aligncenter size-full wp-image-32048\" src=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?resize=640%2C313&#038;ssl=1\" alt=\"\" width=\"640\" height=\"313\" srcset=\"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?resize=300%2C147&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?resize=1024%2C500&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?resize=768%2C375&amp;ssl=1 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/span><span style=\"color: #ff6600;\"><span class=\"caption\">Journalists working for Al Jazeera were reportedly among those targeted by NSO\u2019s government clients.<\/span>\u00a0<span class=\"attribution\"><span class=\"source\">Al Jazeera<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">A major journalistic investigation has found evidence of malicious software being used by governments around the world, including allegations of spying on prominent individuals.<\/span><\/p>\n<p><span style=\"color: #000000;\">From a list of more 50,000 phone numbers, journalists identified more than 1,000 people in 50 countries reportedly under surveillance using the Pegasus spyware. The software was developed by the Israeli company NSO Group and sold to government clients.<\/span><\/p>\n<p><span style=\"color: #000000;\">Among the reported targets of the spyware are journalists, politicians, government officials, chief executives and human rights activists.<\/span><\/p>\n<p><span style=\"color: #000000;\">Reports thus far allude to a surveillance effort reminiscent of an Orwellian nightmare, in which the spyware can capture keystrokes, intercept communications, track the device and use the camera and microphone to spy on the user.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>How did they do it?<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">There\u2019s nothing particularly complicated about how the Pegasus spyware infects the phones of victims. The initial hack can involve a crafted SMS or iMessage that provides a link to a website. If clicked, this link delivers malicious software that compromises the device.<\/span><\/p>\n<p><span style=\"color: #000000;\">The aim is to seize full control of the mobile device\u2019s operating system, either by rooting (on Android devices) or jailbreaking (on Apple iOS devices).<\/span><\/p>\n<p><span style=\"color: #000000;\">Usually, rooting on an Android device is done by the user to install applications and games from non-supported app stores, or re-enable a functionality that was disabled by the manufacturer.<\/span><\/p>\n<p><span style=\"color: #000000;\">Similarly, a jailbreak can be deployed on Apple devices to allow the installation of apps not available on the Apple App Store, or to unlock the phone for use on alternative cellular networks. Many jailbreak approaches require the phone to be connected to a computer each time it\u2019s turned on (referred to as a \u201ctethered jailbreak\u201d).<\/span><\/p>\n<p><span style=\"color: #000000;\">Rooting and jailbreaking both remove the security controls embedded in Android or iOS operating systems. They are typically a combination of configuration changes and a \u201chack\u201d of core elements of the operating system to run modified code.<\/span><\/p>\n<p><span style=\"color: #000000;\">In the case of spyware, once a device is unlocked, the perpetrator can deploy further software to secure remote access to the device\u2019s data and functions. This user is likely to remain completely unaware.<\/span><\/p>\n<p><span style=\"color: #000000;\">Most media reports on Pegasus relate to the compromise of Apple devices. The spyware infects Android devices too, but isn\u2019t as effective as it relies on a rooting technique that isn\u2019t 100% reliable. When the initial infection attempt fails, the spyware supposedly prompts the user to grant relevant permissions so it can be deployed effectively.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>But aren\u2019t Apple devices more secure?<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Apple devices are generally considered more secure than their Android equivalents, but neither type of device is 100% secure.<\/span><\/p>\n<p><span style=\"color: #000000;\">Apple applies a high level of control to the code of its operating system, as well as apps offered through its app store. This creates a closed-system often referred to as \u201csecurity by obscurity\u201d. Apple also exercises complete control over when updates are rolled out, which are then quickly adopted by users.<\/span><\/p>\n<p><span style=\"color: #000000;\">Apple devices are frequently updated to the latest iOS version via automatic patch installation. This helps improve security and also increases the value of finding a workable compromise to the latest iOS version, as the new one will be used on a large proportion of devices globally.<\/span><\/p>\n<p><span style=\"color: #000000;\">On the other hand, Android devices are based on open-source concepts, so hardware manufacturers can adapt the operating system to add additional features or optimise performance. We typically see a large number of Android devices running a variety of versions \u2014 inevitably resulting in some unpatched and insecure devices (which is advantageous for cybercriminals).<\/span><\/p>\n<p><span style=\"color: #000000;\">Ultimately, both platforms are vulnerable to compromise. The key factors are convenience and motivation. While developing an iOS malware tool requires greater investment in time, effort and money, having many devices running an identical environment means there is a greater chance of success at a significant scale.<\/span><\/p>\n<p><span style=\"color: #000000;\">While many Android devices will likely be vulnerable to compromise, the diversity of hardware and software makes it more difficult to deploy a single malicious tool to a wide user base.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>How can I tell if I\u2019m being monitored?<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">While the leak of more than 50,000 allegedly monitored phone numbers seems like a lot, it\u2019s unlikely the Pegasus spyware has been used to monitor anyone who isn\u2019t publicly prominent or politically active.<\/span><\/p>\n<p><span style=\"color: #000000;\">It is in the very nature of spyware to remain covert and undetected on a device. That said, there are mechanisms in place to show whether your device has been compromised.<\/span><\/p>\n<p><span style=\"color: #000000;\">The (relatively) easy way to determine this is to use the Amnesty International Mobile Verification Toolkit (MVT). This tool can run under either Linux or MacOS and can examine the files and configuration of your mobile device by analysing a backup taken from the phone.<\/span><\/p>\n<p><span style=\"color: #000000;\">While the analysis won\u2019t confirm or disprove whether a device is compromised, it detects \u201cindicators of compromise\u201d which can provide evidence of infection.<\/span><\/p>\n<p><span style=\"color: #000000;\">In particular, the tool can detect the presence of specific software (processes) running on the device, as well as a range of domains used as part of the global infrastructure supporting a spyware network.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>What can I do to be better protected?<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Although most people are unlikely to be targeted by this type of attack, there are still simple steps you can take to minimise your potential exposure \u2014 not only to Pegasus but to other malicious attacks too.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">1) Only open links from known and trusted contacts and sources when using your device. Pegasus is deployed to Apple devices through an iMessage link. And this is is the same technique used by many cybercriminals for both malware distribution and less technical scams. The same advice applies to links sent via email or other messaging applications.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">2) Make sure your device is updated with any relevant patches and upgrades. While having a standardised version of an operating system creates a stable base for attackers to target, it\u2019s still your best defence.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">If you use Android, don\u2019t rely on notifications for new versions of the operating system. Check for the latest version yourself, as your device\u2019s manufacturer may not be providing updates.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">3) Although it may sound obvious, you should limit physical access to your phone. Do this by enabling pin, finger or face-locking on the device. The eSafety Commissioner\u2019s website has a range of videos explaining how to configure your device securely.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">4) Avoid public and free WiFi services (including hotels), especially when accessing sensitive information. The use of a VPN is a good solution when you need to use such networks.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">5) Encrypt your device data and enable remote-wipe features where available. If your device is lost or stolen, you will have some reassurance your data can remain safe.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>Paul Haskell-Dowland<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Associate Dean (Computing and Security), <\/span><br \/>\n<span style=\"color: #000000;\">Edith Cowan University<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>Roberto Musotto<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Research fellow, <\/span><br \/>\n<span style=\"color: #000000;\">Edith Cowan University<\/span><\/p>\n<hr \/>\n<p><span style=\"color: #008080;\">* Published in print edition on 23 July 2021<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s reported the Pegasus spyware can capture a user&#8217;s keystrokes, intercept communications, track their device and tap into their camera and microphone<\/p>\n","protected":false},"author":139,"featured_media":32048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[8348],"tags":[2801,29279,29281,16293,29278,29280,17485,17521],"class_list":["post-32047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-conversation","tag-cybersecurity","tag-cyberwar","tag-digital-surveillance","tag-hacking","tag-phone-hacking","tag-spyware","tag-surveillance","tag-the-conversation"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.mauritiustimes.com\/mt\/wp-content\/uploads\/2021\/07\/Pegasus.jpg?fit=1200%2C586&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8QzSF-8kT","_links":{"self":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts\/32047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/comments?post=32047"}],"version-history":[{"count":0,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/posts\/32047\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/media\/32048"}],"wp:attachment":[{"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/media?parent=32047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/categories?post=32047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mauritiustimes.com\/mt\/wp-json\/wp\/v2\/tags?post=32047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}