cybersecurity

Toolkit to detect NSO’s Pegasus spyware released

Victor Barreiro Jr.

This is AI generated summarization, which may have errors. For context, always refer to the full article.

Toolkit to detect NSO’s Pegasus spyware released
Aside from a forensic methodology report, Amnesty International releases a Mobile Verification Toolkit for detecting Pegasus spyware on Android and iOS

Amnesty International, as part of reporting done into the NSO Group’s Pegasus spyware, released a forensic methodology report on how to determine if one is affected by Pegasus, as well as a toolkit that can help interested parties check for the existence of Pegasus on their phones.

The report, released on Sunday, July 18, explained how Amnesty found forensic traces on affected iOS and Android devices targeted by the Pegasus spyware, releasing technical notes on what they did to check for it.

Must Read

Pegasus: The new global weapon for silencing journalists

Pegasus: The new global weapon for silencing journalists

Aside from this, Amnesty also made public its Mobile Verification Toolkit (MVT) for Pegasus detection, which takes different steps to determine the presence of Pegasus on an Android or iOS device.

TechCrunch, in its report, tested the MVT for operability and noted it works on a command line rather than through a graphical user interface. As such, you’ll need some basic knowledge of terminal navigation to get started. That said, the MVT has documentation for its use, available here.

The MVT will help users take a backup of their iPhone and check it against indicators of compromise used by NSO to deliver the Pegasus spyware as a payload that might be sent through text or email.

Must Read

NSO spyware a step ahead of ‘secure’ iPhone

NSO spyware a step ahead of ‘secure’ iPhone

Encrypted iPhone backups can also take advantage of MVT, as MVT can decrypt the backup without requiring the creation of a new copy.

On Android phones, meanwhile, TechCrunch says the MVT scans your Android device backup “for text messages with links to domains known to be used by NSO. The toolkit also lets you scan for potentially malicious applications installed on your device.”

TechCrunch found one indicator of compromise in their use of the MVT, which turned out to be a false positive after checking with Amnesty researchers. A new scan with the updated indicators showed no sign of Pegasus on the tested device.

As the MVT is open-source, here’s to hoping a graphical interface for the toolkit is released in the future to make it easier for everyone to use. – Rappler.com

Add a comment

Sort by

There are no comments yet. Add your comment to start the conversation.

Summarize this article with AI

How does this make you feel?

Loading
Download the Rappler App!
Person, Human, Sleeve

author

Victor Barreiro Jr.

Victor Barreiro Jr is part of Rappler's Central Desk. An avid patron of role-playing games and science fiction and fantasy shows, he also yearns to do good in the world, and hopes his work with Rappler helps to increase the good that's out there.