NSO, the Israeli technology company has been working with governments around the world by selling them robust surveillance systems. The tool, named Pegasus, unlocks the contents of a victim’s cellphone and allows hackers to view or do anything on the device. While the tool seems dangerous, the NSO says it licenses the tool exclusively to government agencies to combat terrorism and other serious crimes.
While the public generally believed NSO was harmless as they focus on ‘bad actors’, recent reports confirm that there has been a leak at NSO showing they aren’t just spying on criminals. Some publications revealed they’ve been sent the leaked data and will be publishing many of those names later this week. The list of those surveilled includes lawyers, human rights defenders, religious figures, academics, business people, diplomats, senior government officials, and heads of state.
Once the malware makes its way into your device, generally without your knowledge, it turns into a 24-hour surveillance device. This type of malware is called ‘Spyware‘. This Spyware can (on both iOS and Android) copy messages you send or receive, harvest photos, and record your calls. Pegasus can covertly record you through your camera, or activate the microphone to record your conversations. The tool can potentially even pinpoint where you are, where you’ve been, and who you’ve met.
The malware gets into your device through smishing attacks, but recent reports show their capabilities have become more advanced. Pegasus exploits can now be accomplished through ‘zero-click’ attacks, which don’t require any user input to work. These often exploit ‘zero-day’ vulnerabilities, which are bugs in an operating system that the manufacturer is unaware of and has not yet fixed.
Back in 2019, WhatsApp reported that NSO software was used to send malware to 14,000+ devices, exploiting a zero-day vulnerability. NSO was able to have the malware infect a device by simply calling a user through WhatsApp, even if the victim did not pick up. Recently, NSO began exploiting vulnerabilities in Apple’s iMessage software, giving it backdoor access to hundreds of millions of iPhones. Apple says it is continually patching its systems to prevent privacy attacks like these.
Unfortunately, there aren’t many remedies for mobile phone anti-malware protection like there exists for your Windows desktop computer. A handful of companies currently advertise Antivirus products for Android devices including Panda, McAfee, and Webroot. No such product exists for iOS (Apple) Devices yet. However, McAfee and Webroot both make a secure browser for iOS devices to try and prevent malware from infecting your iOS device via the Web. It’s unclear, but unlikely that these products would protect against the Pegasus malware sent via WhatsApp or other zero-day attacks.
Beyond installing the Anti-virus or secure browser on your Android and iOS devices respectively here are some basic tips for mobile device protection:
But there are steps you can take to ensure you’re doing everything you can to improve your security and reduce the chances of being exploited by Spyware.
Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot.
Sources:
Additional Readings:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreA newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.