How to block the Pegasus SpywareThe Pegasus Spyware has been targeted against journalists, officials, and human rights activists. At least 37 smartphones from journalists, officials, and human rights activists have been hacked by the software. The SecPoint Protector can block the traffic and hosts from the Pegasus Spyware. Further more it is recommended to wipe your phone by experts to confirm no traces are left. Or to obtain a brand new phone example a de google secure privacy focused phone. Takes over a smartphone with a clickless exploitIt can be as easy as sending text message to the target to infect them without user interaction. The Pegasus Spyware software originates from "NSO Group". Two of the affected journalists are from Washington Post. Once a smartphone was infected no matter if iPhone (Even a patched uptodate iPhone 12 with iOS 14.6 is vulnerable) or Android it allowed the attackers to access: Messages Photos Movies Emails Voice Calls Third party apps. And activate the microphone in the smartphone recording anything in the room. Multiple countries targetedMore than 50 Countries have been subject to attack includes
and many more. SecPoint Protector Blocks Pegasus SpywareThe SecPoint Protector UTM Firewall can via the SecPoint RBL List block the hosts and traffic related to the Spyware to prevent data leak. Vulnerable applications exploited to deliver Pegasus Some of the vulnerable applications includes 2019 Apple Photos exploit 2019 iMessage Zero Day 0day 2020 Apple Music Zero Day 0day 2021 New iMessage Zero Day SecPoint Penetrator Detects Traces of PegasusScan your IPs with the SecPoint Penetrator to find Traces of Pegasus infection. Leaked list of 50,000 phone numbers potential infectedA list of 50,000 phone numbers infected with Pegasus leaked to be obtained by Forbidden Stories and Amnesty International. The list was shared with the Washington Post and The Guardian. Amnesty International ResearchersExperts from Amnesty International confirm it has been active since 2014 up to July 2021 Amnesty International researchers did extensive forensic of the spyware to see more.
|