How to block the Pegasus Spyware
The Pegasus Spyware has been targeted against journalists, officials, and human rights activists.
At least 37 smartphones from journalists, officials, and human rights activists have been hacked by the software.
The SecPoint Protector can block the traffic and hosts from the Pegasus Spyware.
Further more it is recommended to wipe your phone by experts to confirm no traces are left.
Or to obtain a brand new phone example a de google secure privacy focused phone.
Takes over a smartphone with a clickless exploit
It can be as easy as sending text message to the target to infect them without user interaction.
The Pegasus Spyware software originates from "NSO Group".
Two of the affected journalists are from Washington Post.
Once a smartphone was infected no matter if iPhone (Even a patched uptodate iPhone 12 with iOS 14.6 is vulnerable) or Android it allowed the attackers to access:
Third party apps.
And activate the microphone in the smartphone recording anything in the room.
Multiple countries targeted
More than 50 Countries have been subject to attack includes
and many more.
SecPoint Protector Blocks Pegasus Spyware
The SecPoint Protector UTM Firewall can via the SecPoint RBL List block the hosts and traffic related to the Spyware to prevent data leak.
Vulnerable applications exploited to deliver Pegasus
Some of the vulnerable applications includes
2019 Apple Photos exploit
2019 iMessage Zero Day 0day
2020 Apple Music Zero Day 0day
2021 New iMessage Zero Day
SecPoint Penetrator Detects Traces of Pegasus
Scan your IPs with the SecPoint Penetrator to find Traces of Pegasus infection.
Leaked list of 50,000 phone numbers potential infected
A list of 50,000 phone numbers infected with Pegasus leaked to be obtained by Forbidden Stories and Amnesty International.
The list was shared with the Washington Post and The Guardian.
Amnesty International Researchers
Experts from Amnesty International confirm it has been active since 2014 up to July 2021
Amnesty International researchers did extensive forensic of the spyware click here to see more.