26.08.2016 Views

Technical Analysis of Pegasus Spyware

eWE8mND

eWE8mND

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conclusion<br />

We rely on mobile devices to both store our digital assets and give us access to them. Our phones are always with us<br />

and have become a main form <strong>of</strong> voice, video- and messaging-based communication. This makes our mobile devices<br />

highly valuable targets for motivated attackers.<br />

NSO Group reportedly has hundreds <strong>of</strong> employees and makes millions <strong>of</strong> dollars in annual revenue, effectively as<br />

a cyber arms dealer, from the sale <strong>of</strong> its sophisticated mobile attack s<strong>of</strong>tware. NSO is only one example <strong>of</strong> this type<br />

<strong>of</strong> cyber mercenary: we know that it is not the only one, as we’ve seen with the Hacking Team, Finfisher, and other<br />

organizations that compete in this space.<br />

While this report is focused on the iOS version <strong>of</strong> the s<strong>of</strong>tware, Lookout and Citizen Lab are aware that NSO Group<br />

advertises Android and Blackberry versions and are investigating those as well.<br />

This report shows the importance <strong>of</strong> keeping our devices up to date with the latest patches and exercising vigilance<br />

with the security <strong>of</strong> our mobile devices.<br />

TECHNICAL ANALYSIS OF PEGASUS SPYWARE | 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!