×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules Donate
23

Pegasus Spyware. What to do?

submitted by TheBasedProthean to whatever 3.8 yearsJul 24, 2021 12:09:45 ago (+23/-0)     (whatever)*

With spyware exploiting active zero-click attacks, it seems sophisticated spying tools such as Pegasus used by nafarious and untrustworthy country of Israel is are one step ahead of Google, Apple, Microsoft and others even though they control these companies. Apart from Pegasus, there are other potent spyware like Hornbill and Sunbird which you need to be careful about. So, what can you do when you get to know that your phone has been tracked? It’s highly recommended to not use the same phone when a Pegasus spyware has already been detected on it. This is because these spywares are programmed to stay hooked to your device no matter what remedy you apply. Doing the following won’t help you protect your phone from Pegasus.

Can antivirus solution protect you against Pegasus-like spyware?

No. Anti-virus apps are highly effective to protect your device from adware, malware, etc. But when it comes to Pegasus-like spyware,using an antivirus on an already infected smartphone is of little help because most antivirus and antivirus solutions available for common users are unable to identify Pegasus. While you may feel safe after using an antivirus solution, threats like Pegasus can still be functioning in your phone without your knowledge.

​Will factory resetting your smartphone help you get rid of Pegasus from your phone?

No. If you decide to hit the ‘Factory Reset’ button to get rid of a spyware like Pegasus then note that it would be no use. Reports highlight that Pegasus has the ability to carry out chip-level attacks making it stay in the phone even after the factory resetting it.

Will keeping your phone switch off help avoid Pegasus tracking you?

No, not really. Pegasus has the ability to record audio and use the camera even when the device is switched off as long as it can draw power from the battery. However, it may not be able to relay the data to Mossad when the device is switched off. So, switching off your phone will not help you much as the moment you turn it on, the spyware will send the recorded data to its handlers.

Will using VPN on your smartphone help you protect against Pegasus?

No. VPN or a virtual private network cannot help your phone from a Pegasus attack. This is because there are multiple delivery modes and you can get the spyware on your phone by simply being in close proximity with a malicious Bluetooth source. Pegasus can be installed even if the victim’s phone number is not known. In case the attacker doesn’t have the victims’ phone number or email ID, the Pegasus agent can be silently injected once the number is acquired using a tactical network element such as Base Transceiver Station (BTS).

​Will changing getting a new SIM card in the same phone protect against Pegasus?

No. As long as the device is infected by Pegasus, using a new SIM card on the same device will be of no help as the spyware will start extracting data from it as well.

​Will turning off mobile data, Wi-Fi help?

No. The speed of transmission of data by Pegasus from your phone may get slow, but it will not stop Pegasus as it has the ability to connect to tactical networking devices at a nearby listening post.

​Will changing passwords of iCloud account help?

No. Changing passwords while using the same accounts on the infected phone will simply help Mossad get your new password details since Google and Apple are controlled by them and relay that info anyway. TL;DR: You're Fucked.

​Will changing passcode or lock of your phone?

No. Pegasus faces no interference from the passcode, face unlock, pattern or other kind of phone locking features. You may change passcodes as much you like, but Pegasus will continue doing its job.

​Will encrypting your phone help protect your phone from Pegasus?

Not really. Encryption helps when your phone has been taken away from your possession and a third-party is trying to get your data. But in case of Pegasus, it stays in your phone. As the data is already decrypted when you're using the phone, what you can see on your screen, Pegasus can see it as well and then pass it to its operators by taking screenshots secretly. The only way to get rid of Pegasus from your phone is by destroying the phone, memory card and the SIM card completely. Get a new phone and a new SIM card with a different phone number and change passwords of your accounts.

How do i know if my phone is infected? Using this tool, you can check if you have been spied by Mossad.

The tool, which can be found on GitHub, contains several commands and a series of steps to follow in order to find out if Pegasus has targeted your phone, be it iOS or Android. In this link you can find and download the mobile phone verification toolkit. It is necessary to know the underlying code to run the tests; However, MVT provides options for both operating systems and what it does is run a vulnerability check on your device which will produce indicators to see if you have any indication that the device has been hacked by Pegasus.

What to do if your mobile phone is infected with Pegasus?

All users are the target of Pegasus. In this case, the best thing that you can do is to not update the phone iOS or Android system. Given that it's the jews behind the creation of this malware and the B&J Ice cream article is fluff to distract the public from this and as a way to find a way to implement stealth backdoors into your phone without your knowledge all under place on the contract you signed.

Mobile Verification Toolkit: https://github.com/mvt-project/mvt


15 comments block


[ - ] mikenigger 0 points 3.8 yearsJul 25, 2021 03:09:31 ago (+0/-0)

mvt is a good example why open source sucks ass, it tells you the amount of links it extracted but no way to list them, "specify a STIX2 file" to find the bad ones they said.. they link to a page of the specification, no stupid STIX2 files in sight.

after installing adb, abe, java and that piece of shit i got nowhere, thanks stallman.

[ - ] AloisH 1 point 3.8 yearsJul 25, 2021 01:30:16 ago (+1/-0)

[ - ] observation1 0 points 3.8 yearsJul 26, 2021 01:11:56 ago (+0/-0)

Suspect

[ - ] account deleted by user 2 points 3.8 yearsJul 24, 2021 20:46:21 ago (+2/-0)*

account deleted by user

[ - ] try 1 point 3.8 yearsJul 24, 2021 18:57:02 ago (+1/-0)*

*BULLSHIT!!*
========

The tool, which can be found on GitHub, contains several commands and a series of steps to follow in order to find out if Pegasus has targeted your phone, be it iOS or Android

I do not even have to go to that link of yours to know its not true for iOS. A rooted phone, by the right people, cannot allow regular apps and even regular signed drivers from revealing itself.

There are about 8 good books on just the single topic of 'ROOT KITS' to illustrate my statement.

If NEVER connected to internet for weeks, an update from Apple delivered over USB cable might be able to neutralize a known root kit.

Also.... WHY IS THIS SHIT in the news now? WhatsApp has been rooted every 4 months, non-stop since 2018. Even crashing phones to force completion of a multi-component install: https://www.exploit-db.com/download/45579

many Whatsapp exploits to target dormant, though installed , WhatsApp :

https://www.cvedetails.com/product/54433/Whatsapp-Whatsapp.html?vendor_id=19851

ALso, trivial to prove, that list of 6 REMOTE CODE INSERTION exploits into WhatsApp, omits ANY 2021 revelations. No 2021 revelations in the link of 'all published zer0 days and exploits'

Comically, they got rooted using the "wakeup" JSON blobs all iOS and Android phones can subscribe too. Therefore Apple and Google are complicit in retardation too by not enforcing better rules for JSON opaque payloads lacking a crypto signature of origin.

[ - ] observation1 2 points 3.8 yearsJul 24, 2021 14:55:58 ago (+2/-0)

What magic does it take to download github files? There is never a clickable tar or zip or anything. Always just literature and listing of files.

[ - ] Monica 2 points 3.8 yearsJul 24, 2021 20:16:18 ago (+2/-0)

Under Installation on the github site you will see:

"MVT can be installed from sources or conveniently using:

pip3 install mvt."

That's it. You need linux and open a command prompt and type

pip3 install mvt

Or you download the source files and compile it yourself. People do this to make sure the downloads are safe from viruses and malware.

[ - ] NigsGonnaNog 1 point 3.8 yearsJul 24, 2021 19:03:53 ago (+1/-0)

I always assumed I was retarded for never figuring out how downloading files from github worked. Now I know we're either both retarded, or github is just needlessly convoluted.

[ - ] observation1 1 point 3.8 yearsJul 26, 2021 01:03:05 ago (+1/-0)

Ha. Even the replies from people trying to explain it are beyond me.

1) if I had Linux I wouldn't need instructions.

2) the Readme files are not downloadable

3) if I need a compiler how do I get the compiler

[ - ] qwop 0 points 3.8 yearsJul 24, 2021 18:28:28 ago (+0/-0)

You usually look for installation instructions in the README and/or click on "Releases" in the sidebar to the right and see what's offered there.

In this case, as far as I could tell, this mvt tool is not for the faint of heart. There is no user clickable tool, but requires technical knowledge. The tool is to be used from Linux with USB debugging for Android, and for iOS seems to require a disk image dump for analysis.

[ - ] observation1 0 points 3.8 yearsJul 26, 2021 01:07:35 ago (+0/-0)

Does every github program require Linux?

[ - ] JudyStroyer 0 points 3.8 yearsJul 24, 2021 13:46:06 ago (+0/-0)

Interesting info. I thought they (phones) were being shipped from the factory with this shit, but it is something they can attach later?

[ - ] account deleted by user 1 point 3.8 yearsJul 24, 2021 14:40:23 ago (+1/-0)

account deleted by user

[ - ] TheBasedProthean [op] 0 points 3.8 yearsJul 26, 2021 14:55:29 ago (+0/-0)

The new iOS 14.6 update weakens your phone security that Pegasus is able to infect your phone undetected.