24.01.2022 Law in media
How to Detect Pegasus on Your Phone and Protect Against Spying
RINF
The nature of spyware is to remain as hidden as possible, making it difficult to detect on a device. However, some mechanisms can help verify if a smartphone has been compromised.
Special services using Pegasus can infect phones through various mechanisms. Sometimes, SMS or iMessage messages contain a link to a website, which, when clicked, installs the malicious software on the device. Others use a "zero-click" attack, exploiting iMessage vulnerabilities in iPhones that allow infection simply by receiving a message without user interaction.
How to Check if Your Phone Has Pegasus Spyware?
- The easiest solution is to use Amnesty International’s mobile verification toolkit. This tool works on Linux or MacOS and can analyze files and configurations on a mobile device by examining a backup downloaded from the phone. However, the analysis cannot confirm if the smartphone has been hacked but only detects indicators of compromise that may indicate an infection, explains Mariusz Politowicz from Marken, a distributor of Bitdefender in Poland.
Amnesty International’s tool can detect the presence of specific software on the device and a range of domains used in the global infrastructure supporting spyware networks.
Protection Against Spyware
Unfortunately, there is currently no solution to protect against zero-click attacks, but there are relatively simple steps to minimize the risk of infection from Pegasus and other malware. The most important is to open links only from known and trusted sources.
- Pegasus is deployed on Apple devices through iMessage links. This is the same technique used by many cybercriminals for malware distribution and simpler scams. The same advice applies to links sent via email or other messaging apps - explains Mariusz Politowicz.
Devices should also be kept up to date with appropriate patches and updates. Android users should not rely on notifications about new operating system versions and should manually download the latest version, as device manufacturers may not provide updates.
Though it may seem obvious, physical access to the phone should be limited. This can be done by enabling PIN unlocking, fingerprint, or face recognition on the device. Avoid public and free Wi-Fi services (including hotels), especially when accessing sensitive information. While using such networks, the best solution is to use a VPN. Encrypting data and enabling remote wiping is also good practice. If the device is lost or stolen, data remains safe.
What is Pegasus?
Pegasus, developed by Israel’s NSO Group, is software used to spy on smartphone users. Once installed, it extracts contacts, photos, messages, allows phone call interception, captures keystrokes, and enables camera access.
In an investigative report by The Washington Post, 1,000 people in 50 countries were identified among 50,000 analyzed phone numbers as targets of Pegasus spyware. Those monitored included journalists, politicians, government officials, executives of large corporations, and human rights activists.
Why Do We Still Click on Suspicious Links?
Up to 76% of respondents who value cybersecurity could not recognize phishing attempts, according to a study by Tessian. This type of cyberattack—encouraging users to click a malicious link—remains effective. Why, despite increased public awareness about security, do people continue to click on suspicious links?
One reason is the emotional response triggered by the message (via SMS, email, or even an incoming call). Criminals craft messages to evoke fear or uncertainty in the recipient.
advertisement
Another reason is our trust in familiar entities. Banks, streaming platforms, postal operators, or energy companies create a sense of security. We trust that the technology infrastructure in large companies is properly secured and that messages from such companies are reliable.
How to Defend Against Phishing?
Remember a few basic rules:
- Before downloading an attachment, read the message carefully. Fake messages often contain spelling and punctuation errors,
- verify the sender`s details. The email addresses used by scammers may differ from authentic ones by easy-to-miss details, like a typo in the domain name,
- use antivirus software. Anti-phishing filters increase the chances of detecting a threat—whether a fake or suspicious website,
- verify the domain before using its services. If you find yourself on a website (especially for a bank or a site offering payments), check if the SSL certificate truly belongs to it by clicking the padlock symbol in the address bar and verifying the certificate owner`s name.
It’s worth remembering that, just as on the road, in the digital world we should apply the principle of limited trust. Habitual link-clicking is a very risky behavior.
COMMERCIAL BREAK
See articles on a similar topic:
Local Media in Poland - Freedom of Speech
Bartłomiej Dwornik
Abuse of freedom of speech is as common as imposing muzzles on journalists. Although the Press Law and the Constitution guarantee this fundamental freedom to everyone.
Harassment of Female Journalists in Poland. Zamenhof Institute Report
RINF
Over half of female journalists have experienced harassment. The report and a dedicated website for the project, offtherecord.zamenhof.pl, present real, anonymous stories of harassed female journalists, along with numerical data documenting the scale of the issue.
Local Media in Poland - Announcements
Bartłomiej Dwornik
Research by ComPress Agency, conducted among journalists in 2001, indicates that only 7 percent of them believe that PR specialists and press spokespeople understand journalists' needs well.
Local Media in Poland - Workshop and Ethics
Bartłomiej Dwornik
Every day, journalists face the dilemma of whether to report on something or to omit it. Where does information end, and where does violation of privacy begin?
Cyber Threats 2023: Phishing Dominates, AI Targeted
Krzysztof Fiedorek
The CERT Orange Polska 2023 report reveals a rapidly evolving cyber threat landscape. Phishing has taken a decisive lead, accounting for over 44% of reported incidents. Advanced social engineering techniques, deepfakes, and a surge in malicious ads lure users with promises of quick profits or easy opportunities.
How #MeToo Changed Journalism. Report by Reporters Without Borders
Krzysztof Fiedorek
The #MeToo movement has turned the media world upside down, creating new spaces to fight for women’s rights and confronting journalists with challenges they hadn’t previously faced. From new editorial roles to increasing cyberbullying threats, journalism is undergoing a revolution, and feminist media is gaining strength to openly address violence and discrimination.
Local Media in Poland - Court Cases
Bartłomiej Dwornik
Investigative journalists in local newsrooms often remain in the shadow of their colleagues from national outlets, despite frequently being the first to uncover a scandal.