Your iPhones and Android Smartphones Are at Risk: Five New Pegasus Spyware Variants Discovered

Your iPhones and Android Smartphones Are at Risk: Five New Pegasus Spyware Variants Discovered

Newly Discovered Pegasus Spyware Threats Put iPhones and Android Devices at Risk

By: Javid Amin
In a groundbreaking discovery, mobile security firm iVerify has unveiled five previously undetected Pegasus spyware variants targeting both iPhones and Android devices. This revelation underscores a growing threat: spyware once reserved for high-profile individuals is now being used to infiltrate the smartphones of ordinary citizens. The findings highlight an urgent need for enhanced mobile security as Pegasus continues to evolve and evade traditional defenses.

What is Pegasus Spyware and Why Should You Care?

Developed by the NSO Group, Pegasus spyware is one of the most sophisticated and invasive surveillance tools ever created. Often referred to as a “zero-click exploit,” Pegasus can infiltrate a device without any interaction from the user. Once installed, it grants attackers complete control over the device, enabling them to access sensitive information such as:

  • Text messages and emails
  • Call logs and contacts
  • Photos and videos
  • GPS location
  • Microphone and camera (for live monitoring)

Pegasus is notorious for being used in targeted attacks against journalists, government officials, and activists. However, iVerify’s latest findings reveal that it is now a threat to everyday smartphone users, further blurring the lines of digital security and privacy.

Also Read | Own a Piece of Kashmir’s Digital Legacy: Pre-Owned Websites on Sale

The Discovery: Five New Pegasus Variants

In May 2024, iVerify introduced its Mobile Threat Hunting feature, enabling users to perform a comprehensive threat scan on their smartphones in under five minutes. During a free one-time scan offered to over 2,500 users, the company uncovered five previously unknown Pegasus variants affecting both iOS and Android devices.

Key Findings:

  • Five Unique Variants: These new malware strains displayed advanced evasion techniques, allowing them to remain undetected by traditional antivirus solutions.
  • Widespread Infections: Over 2.5 devices per 1,000 scans were found to be infected, indicating a higher prevalence than previously reported.
  • Cross-Platform Threat: Both iOS and Android devices were affected, demonstrating Pegasus’ ability to exploit vulnerabilities across ecosystems.
  • Forensic Evidence: The spyware left behind forensic artifacts, including shutdown logs, diagnostic data, and crash logs, which helped researchers trace its activity.

This discovery challenges the assumption that Pegasus primarily targets high-profile individuals, revealing a broader scope of surveillance aimed at regular users.

How Pegasus Works: The Anatomy of an Infiltration

Pegasus spyware operates with surgical precision, employing advanced techniques to infiltrate devices and remain undetected. Here’s how it works:

  1. Zero-Click Exploits: Unlike traditional malware, Pegasus doesn’t require the user to click a malicious link or download a suspicious file. It can penetrate devices through vulnerabilities in apps, operating systems, or even messaging platforms like WhatsApp and iMessage.
  2. Stealth Installation: Once inside, Pegasus installs itself without leaving a visible trace. It operates in the background, making it nearly impossible for users to detect.
  3. Data Extraction: The spyware collects a wealth of data, including messages, emails, photos, call logs, and location information. It can also activate the device’s microphone and camera to monitor conversations and surroundings.
  4. Self-Destruction: To evade detection, Pegasus can delete itself, leaving minimal forensic evidence of its presence.

The Human Impact of Pegasus Spyware

The implications of Pegasus spyware extend beyond technical vulnerabilities to fundamental issues of privacy, freedom, and security.

  • For Individuals: The spyware’s ability to access private data and monitor communications poses a severe threat to personal privacy. Victims may experience anxiety, stress, and a loss of trust in digital technologies.
  • For Society: When used against journalists, activists, and political opponents, Pegasus undermines freedom of speech and democratic principles.
  • For Businesses: Corporate executives and employees are also at risk, as Pegasus can steal sensitive business information, leading to financial and reputational damage.

Also Read | Lessons from a Rs 1.7 Crore Mistake: Protect Yourself from Cyber Scams

The Evolution of Pegasus: A Timeline

Pegasus has a long and infamous history of adapting to new security measures:

  • 2016: First discovered by researchers who found it targeting a human rights activist.
  • 2019: WhatsApp revealed a vulnerability exploited by Pegasus to target over 1,400 users.
  • 2021: The Pegasus Project exposed its use in spying on journalists, activists, and world leaders.
  • 2024: iVerify’s discovery of five new variants highlights its continued evolution and persistence.

Protecting Your Device: Practical Steps

While Pegasus is one of the most advanced spyware tools, there are measures you can take to enhance your mobile security:

1. Regular Updates

Keep your device’s operating system and apps updated. Developers frequently release patches to fix vulnerabilities that spyware exploits.

2. Use a Reliable Security App

Install a trusted mobile security app like iVerify to scan for threats and monitor unusual activity on your device.

3. Avoid Suspicious Links

Be cautious about clicking on links or downloading files from unknown sources, even if they appear legitimate.

4. Limit Permissions

Review app permissions and disable access to sensitive features like your microphone, camera, and location whenever possible.

5. Enable Two-Factor Authentication (2FA)

Protect your accounts with 2FA to add an extra layer of security against unauthorized access.

6. Consider Device Encryption

Encrypt your device to protect your data in case it falls into the wrong hands.

Also Read | Worried About Your Online Presence? Here’s How We Make You Stand Out

iVerify: Leading the Charge in Mobile Security

iVerify’s Mobile Threat Hunting feature is a game-changer in the fight against spyware. Here’s what sets it apart:

  • Comprehensive Scanning: Detects both known and unknown threats, including forensic artifacts left by spyware.
  • User-Friendly Interface: Allows anyone to perform a detailed scan in under five minutes.
  • Regular Updates: Continuously evolves to address emerging threats and vulnerabilities.

Explore iVerify’s services and mobile security solutions at iVerify.com.

The Broader Implications of Spyware Proliferation

The discovery of new Pegasus variants raises critical questions about the future of cybersecurity:

  • Legal and Ethical Concerns: Should governments and private entities be allowed to use such invasive tools?
  • Global Collaboration: International cooperation is essential to regulate spyware use and protect citizens worldwide.
  • The Role of Tech Companies: Device manufacturers and software developers must prioritize security and transparency.

Also Read | New Scam Alert: Beware of Fraudulent Calls Claiming to Be from FedEx

Bottom-Line: Staying Vigilant in a Connected World

The emergence of five new Pegasus spyware variants is a stark reminder that no device is immune to cyber threats. As technology continues to advance, so do the tactics of cybercriminals and surveillance tools. By staying informed, adopting robust security practices, and leveraging tools like iVerify, individuals and organizations can safeguard their digital lives.

To learn more about protecting your devices, visit iVerify.com and take the first step toward enhanced mobile security. Don’t wait until it’s too late—stay proactive, stay secure.

Related posts