You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Conclusion<br />
We rely on mobile devices to both store our digital assets and give us access to them. Our phones are always with us<br />
and have become a main form <strong>of</strong> voice, video- and messaging-based communication. This makes our mobile devices<br />
highly valuable targets for motivated attackers.<br />
NSO Group reportedly has hundreds <strong>of</strong> employees and makes millions <strong>of</strong> dollars in annual revenue, effectively as<br />
a cyber arms dealer, from the sale <strong>of</strong> its sophisticated mobile attack s<strong>of</strong>tware. NSO is only one example <strong>of</strong> this type<br />
<strong>of</strong> cyber mercenary: we know that it is not the only one, as we’ve seen with the Hacking Team, Finfisher, and other<br />
organizations that compete in this space.<br />
While this report is focused on the iOS version <strong>of</strong> the s<strong>of</strong>tware, Lookout and Citizen Lab are aware that NSO Group<br />
advertises Android and Blackberry versions and are investigating those as well.<br />
This report shows the importance <strong>of</strong> keeping our devices up to date with the latest patches and exercising vigilance<br />
with the security <strong>of</strong> our mobile devices.<br />
TECHNICAL ANALYSIS OF PEGASUS SPYWARE | 31