How to block the Pegasus Spyware

The Pegasus Spyware has been targeted against journalists, officials, and human rights activists.

At least 37 smartphones from journalists, officials, and human rights activists have been hacked by the software.

The SecPoint Protector can block the traffic and hosts from the Pegasus Spyware.

Further more it is recommended to wipe your phone by experts to confirm no traces are left.

Or to obtain a brand new phone example a de google secure privacy focused phone.

Pegasus Spyware

Pegasus Spyware

Takes over a smartphone with a clickless exploit

It can be as easy as sending text message to the target to infect them without user interaction.

The Pegasus Spyware software originates from "NSO Group".

Two of the affected journalists are from Washington Post.

Once a smartphone was infected no matter if iPhone (Even a patched uptodate iPhone 12 with iOS 14.6 is vulnerable) or Android it allowed the attackers to access:





Voice Calls

Third party apps.

And activate the microphone in the smartphone recording anything in the room.

Multiple countries targeted

More than 50 Countries have been subject to attack includes 

  • Mexico
  • Azerbaijan
  • Kazakhstan
  • Hungary
  • India
  • United Arab Emirates
  • Saudi Arabia
  • Bahrain
  • Morocco
  • Rwanda
  • Togo

and many more.

SecPoint Protector Blocks Pegasus Spyware

The SecPoint Protector UTM Firewall can via the SecPoint RBL List block the hosts and traffic related to the Spyware to prevent data leak. 

Vulnerable applications exploited to deliver Pegasus

Some of the vulnerable applications includes

2019 Apple Photos exploit

2019 iMessage Zero Day 0day

2020 Apple Music Zero Day 0day

2021 New iMessage Zero Day

SecPoint Penetrator Detects Traces of Pegasus

Scan your IPs with the SecPoint Penetrator to find Traces of Pegasus infection. 

Leaked list of 50,000 phone numbers potential infected

A list of 50,000 phone numbers infected with Pegasus leaked to be obtained by Forbidden Stories and Amnesty International.

The list was shared with the Washington Post and The Guardian.

Amnesty International Researchers

Experts from Amnesty International confirm it has been active since 2014 up to July 2021

Amnesty International researchers did extensive forensic of the spyware to see more.