{"id":14604,"date":"2017-04-11T09:00:40","date_gmt":"2017-04-11T13:00:40","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=14604"},"modified":"2020-04-17T19:48:14","modified_gmt":"2020-04-17T17:48:14","slug":"pegasus-spyware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/pegasus-spyware\/14604\/","title":{"rendered":"Pegasus: The ultimate spyware for iOS and Android"},"content":{"rendered":"<p>Apple iPhone and iPad users usually believe they are safe. There\u2019s no malware for iOS, they say. Apple does little to discourage the impression \u2014 the \u201cfruit company\u201d doesn\u2019t even allow antivirus solutions in its App Store, because, you know, allegedly they\u2019re not needed.<\/p>\n<p>The keyword here is <em>allegedly<\/em>. There actually is malware in the wild that targets iOS users \u2014 it\u2019s been proved a number of times, and in August 2016 researchers proved it again by <a href=\"https:\/\/blog.lookout.com\/blog\/2016\/08\/25\/trident-pegasus\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">revealing the existence of Pegasus<\/a>, spyware capable of hacking <em>any<\/em> iPad or iPhone, harvesting data about the victim, and establishing surveillance on them. That discovery made the whole cybersecurity world\u2026 uneasy.<\/p>\n<p>At our <a href=\"https:\/\/www.kaspersky.co.za\/blog\/what-is-sas\/14411\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Analyst Summit<\/a>, researchers from Lookout <a href=\"https:\/\/blog.lookout.com\/blog\/2017\/04\/03\/pegasus-android\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">revealed<\/a> that Pegasus exists not only for iOS, but for Android as well. The Android version is different in some ways from its iOS predecessor. Let\u2019s shed some light on Pegasus and explain why we use the word \u201cultimate\u201d to describe it.<\/p>\n<h2>Pegasus: The beginning<\/h2>\n<p>Pegasus was discovered thanks to <a href=\"https:\/\/en.wikipedia.org\/wiki\/UAE_Five\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ahmed Mansoor<\/a>, a UAE human rights activist, who happened to be one of its targets. It was a spear-phishing attack: He received several SMS messages that contained what he thought were malicious links, so he sent those messages to security experts from Citizen Lab, and they brought another cybersecurity firm, Lookout, to the investigation.<\/p>\n<p>Mansoor was right. If he had clicked, his iPhone would have been infected with malware \u2014 malware for iOS. For non-jailbroken iOS, to be precise. The malware was dubbed Pegasus, and Lookout researchers called it the most sophisticated attack they\u2019d ever seen on any endpoint.<\/p>\n<p>Pegasus has been attributed to the NSO Group, an Israeli company whose bread and butter is developing spyware. That means the malware is commercial \u2014 it\u2019s sold to whoever is willing to pay for it. Pegasus relied on a whopping three zero-day (previously unknown) vulnerabilities in iOS that allowed it to silently jailbreak the device and install surveillance software. Another cybersecurity firm, Zerodium, once offered $1 million for an iOS zero-day, so you can imagine that it cost quite a bit of money to create Pegasus.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">An emergency <a href=\"https:\/\/twitter.com\/hashtag\/iOS?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iOS<\/a> update patches <a href=\"https:\/\/twitter.com\/hashtag\/0day?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#0day<\/a> used by government spyware <a href=\"https:\/\/t.co\/VyDbMcHRGL\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/VyDbMcHRGL<\/a> <a href=\"https:\/\/t.co\/6U8nX0baXY\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/6U8nX0baXY<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/769149977490780160?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 26, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As for surveillance, let\u2019s be clear: We\u2019re talking <em>total<\/em> surveillance. Pegasus is modular malware. After scanning the target\u2019s device, it installs the necessary modules to read the user\u2019s messages and mail, listen to calls, capture screenshots, log pressed keys, exfiltrate browser history, contacts, and so on and so forth. Basically, it can spy on every aspect of the target\u2019s life.<\/p>\n<p>It\u2019s also noteworthy that Pegasus could even listen to encrypted audio streams and read encrypted messages \u2014 thanks to its keylogging and audio recording capabilities, it was stealing messages <em>before<\/em> they were encrypted (and, for incoming messages, <em>after<\/em> decryption).<\/p>\n<p>Another interesting fact about Pegasus is that it tries to hide itself really diligently. The malware self-destructs if it is not able to communicate with its command-and-control (C&amp;C) server for more than 60 days, or if it detects that it was installed on the wrong device with the wrong SIM card (remember, this is targeted spying; NSO\u2019s clients weren\u2019t going after random victims).<\/p>\n<h3>All the pretty horses<\/h3>\n<p>Maybe the developers of Pegasus thought that they had invested too much in this project to limit it to one platform. After the first version was discovered, it didn\u2019t take long to find the second, and at the Security Analyst Summit 2017, Lookout researchers had a talk on Pegasus for Android, also known as Chrysaor \u2014 that\u2019s what Google calls it. The Android version is very similar to its iOS sister in terms of its capabilities, but different in terms of the techniques it uses to penetrate the device.<\/p>\n<p>Pegasus for Android does not rely on zero-day vulnerabilities. Instead it uses a well-known rooting method called Framaroot. Another difference: If iOS version fails to jailbreak the device, the whole attack fails, but with the Android version, even if the malware fails to obtain the necessary root access to install surveillance software, it will still try directly asking the user for the permissions it needs to exfiltrate at least some data.<\/p>\n<p>Google <a href=\"https:\/\/security.googleblog.com\/2017\/04\/an-investigation-of-chrysaor-malware-on.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">claims<\/a> that only a few dozen Android devices have been infected, but for a targeted cyberespionage attack, that\u2019s a lot. The greatest number of Pegasus for Android installations was observed in Israel, with Georgia in second place and Mexico third. Pegasus for Android was also spotted in Turkey, Kenya, Nigeria, UAE, and other countries.<\/p>\n<h3>You are probably safe, but\u2026<\/h3>\n<p>When news of the iOS version of Pegasus got out, Apple was quick to react. The company issued an iOS security update (9.3.5) that patched all three of the aforementioned vulnerabilities.<\/p>\n<p>Google, which helped investigate the case with the Android version, took another path and notified potential Pegasus targets directly. If you\u2019ve updated your iOS gadgets to the latest software version and haven\u2019t received a warning message from Google, you are probably safe and not under surveillance by Pegasus.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<p><\/p>\n<p>However, that doesn\u2019t mean that there is no other yet-unknown spyware around both for iOS and Android. And the existence of Pegasus proved that iOS malware goes beyond badly coded adware and ransom-demanding websites, which are quite easy to block. There are some serious threats in the wild. We have three simple tips here for you to stay as safe as possible:<\/p>\n<ol>\n<li>Update your devices on time, without fail, and pay special attention to security updates.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.co.za\/mobile-security?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____f1e79fd4d11f58d1\" target=\"_blank\" rel=\"noopener\">good security solution<\/a> on each of your devices. There are none for iOS, but we hope that Pegasus will make Apple rethink its policy.<\/li>\n<li>Don\u2019t fall for phishing, even if it\u2019s targeted <a href=\"https:\/\/usa.kaspersky.com\/internet-security-center\/definitions\/spear-phishing#.WOuMffnyupo\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing<\/a> like in the case with Ahmed Mansoor. If you receive a link from an unknown source, don\u2019t click on it automatically. Think before you click \u2014 or don\u2019t click at all.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The most sophisticated attack ever seen on any endpoint, this modular spyware lurks on Android and iOS.<\/p>\n","protected":false},"author":696,"featured_media":14605,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2671,2670],"tags":[1981,105,1992,1250,1991,337,1980,1080,714],"class_list":{"0":"post-14604","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"category-threats","10":"tag-thesas2017","11":"tag-android","12":"tag-chrysaor","13":"tag-ios","14":"tag-pegasus","15":"tag-sas","16":"tag-sas-2017","17":"tag-spear-phishing","18":"tag-spyware"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pegasus-spyware\/14604\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pegasus-spyware\/11002\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pegasus-spyware\/9077\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pegasus-spyware\/10374\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pegasus-spyware\/10058\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pegasus-spyware\/14569\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pegasus-spyware\/3100\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pegasus-spyware\/14604\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pegasus-spyware\/7237\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pegasus-spyware\/6551\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pegasus-spyware\/10046\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pegasus-spyware\/15217\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pegasus-spyware\/14604\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=14604"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14604\/revisions"}],"predecessor-version":[{"id":27223,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14604\/revisions\/27223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/14605"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=14604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=14604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=14604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}