26.08.2016 Views

Technical Analysis of Pegasus Spyware

eWE8mND

eWE8mND

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

One other unique property <strong>of</strong> this attack is that standard jailbreak detections fail to report that the device has been exploited.<br />

The attack and installation <strong>of</strong> the spying s<strong>of</strong>tware is designed to be as silent as possible to the target.<br />

Pr<strong>of</strong>essional Grade Development<br />

<strong>Pegasus</strong> is well designed in terms <strong>of</strong> its modularity and efficiency. For example, the kernel exploits call upon magic tables<br />

for each <strong>of</strong> the platforms that map out kernel memory for each version and phone model. The mapping for iOS 9.2.1 on<br />

the iPhone 6 is shown here:<br />

TECHNICAL ANALYSIS OF PEGASUS SPYWARE | 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!