Deccan Chronicle

How does Pegasus spyware work, and is my phone at risk?

- PAUL HASKELL-DOWLAND & ROBERTO MUSOTTO MELBOURNE, JULY 21 —The Conversati­on

A major journalist­ic investigat­ion has found evidence of malicious software being used by government­s around the world. From a list of more 50,000 phone numbers, journalist­s identified more than 1,000 people in 50 countries reportedly under surveillan­ce using the Pegasus spyware. The software was developed by the Israeli company NSO Group and sold to government clients.

How did they do it?

There's nothing particular­ly complicate­d about how the Pegasus spyware infects the phones of victims. The initial hack involves a crafted SMS or iMessage that provides a link to a website. If clicked, this link delivers malicious software that compromise­s the device. The aim is to seize full control of the mobile device's operating system, either by rooting (on Android devices) or jailbreaki­ng (on Apple iOS devices).

Usually, rooting on an Android device is done by the user to install applicatio­ns and games from nonsupport­ed app stores, or reenable a functional­ity that was disabled by the manufactur­er. Similarly, a jailbreak can be deployed on Apple devices to allow the installati­on of apps not available on the Apple App Store, or to unlock the phone for use on alternativ­e cellular networks.

Many jailbreak approaches require the phone to be connected to a computer each time it's turned on (referred to as a tethered jailbreak). Rooting and jailbreaki­ng both remove the security controls embedded in Android or iOS operating systems.

Most media reports on Pegasus relate to the compromise of Apple devices. The spyware infects Android devices too, but isn't as effective as it relies on a rooting technique that isn't 100 per cent reliable.

How can I tell if I'm being monitored?

It is in the very nature of spyware to remain covert and undetected on a device. That said, there are mechanisms in place to show whether your device has been compromise­d.

The (relatively) easy way to determine this is to use the Amnesty Internatio­nal Mobile Verificati­on Toolkit (MVT). This tool can run under either Linux or MacOS and can examine the files and configurat­ion of your mobile device by analysing a backup taken from the phone.

While the analysis won't confirm or disprove if a device is compromise­d, it detects indicators of compromise which can provide evidence of infection.

What can I do to be better protected?

Although most people are unlikely to be targeted by this type of attack, there are still simple steps you can take to minimise your exposure not only to Pegasus but to other malicious attacks too.

Only open links from known and trusted contacts and sources when using your device. Pegasus is deployed to Apple devices through an iMessage link. This is the same technique used by many cybercrimi­nals for both malware distributi­on and less technical scams. The same applies to links sent via email or other messaging applicatio­ns.

Make sure your device is updated with any relevant patches and upgrades. If you use Android, don’t wait for notificati­ons for new versions of the operating system. Check for the latest version yourself, as your device manufactur­er may not be providing updates.

Limit physical access to your phone by enabling pin, finger or face-locking on the device. The eSafety Commission­er's website has a range of videos explaining how to configure your device securely.

Avoid public and free WiFi services, including hotels.

 ??  ??

Newspapers in English

Newspapers from India