Your data. Your choice.

If you select «Essential cookies only», we’ll use cookies and similar technologies to collect information about your device and how you use our website. We need this information to allow you to log in securely and use basic functions such as the shopping cart.

By accepting all cookies, you’re allowing us to use this data to show you personalised offers, improve our website, and display targeted adverts on our website and on other websites or apps. Some data may also be shared with third parties and advertising partners as part of this process.

Background information

Pegasus: you can run but you can’t hide

Dominik Bärlocher
20-7-2021
Translation: Veronica Bielawski
Pictures: Thomas Kunz

An Israeli company is selling spyware to governments. Governments are using it against innocent individuals, journalists and other «problematic» actors. Can you fully protect yourself from this software that even manages to hack iPhones? No chance. But you can play it safe.

Regardless, it’s a good idea to protect yourself against such attacks – the technology Pegasus uses can be weaponised by hackers or states for other attacks. So, there’s no guarantee that you’ll never be attacked or spied on with the same technology that’s being used by NSO Group and its clients. While it isn’t open source, the technology exists. And this alone makes it a risk.

So, here are preventive measures to guard against this previsouly unseen form of attack.

Pegasus: analysis of a hack

What is known is roughly how Pegasus works. This is enough to develop initial defence strategies. But it can also inspire attackers to exploit the same attack method – a so-called attack vector.

How Pegasus works (an overview)

For a successful attack, the hacker needs your phone number and an active Internet connection. In addition, the target device must be infected with the Pegasus client.

The phone number is entered into a command and control server (CnC), which connects the smartphone to Pegasus.

The CnC server is under the hackers’ control. In the case of Pegasus, these hackers are the «selected government partners» who purchased Pegasus from NSO Group. NSO Group claims not to be involved in direct monitoring – it only sells the software. It further claims to have no insight into what it’s customers then do with it.

A target’s smartphone can become infected in several ways:

iMessage: the problem child

There’s a reason why the media is so focused on Apple: the iMessage app plays a key role in the infection of iPhones. Apple’s ecosystem is closed, meaning it can’t be viewed from the outside. This creates a platform that trusts other devices in the ecosystem. And this means the principle «trust, but verify» sometimes goes under.

But despite its «self-assured hubris» Apple isn’t sitting idly by and does keep working on security developments behind closed doors. The corporation recently introduced a system called BlastDoor, which is supposed to increase the integrity of iMessages.

But it appears Apple is too late. «It’s pretty clear that NSO can beat BlastDoor,» Bill Marczak of Citzen Lab tells the Guardian.

He explains that Pegasus infections have been detected up to and including iOS version 14.6, which is, as of 20 July 2021, the current version of Apple’s operating system. It’s likely that other hackers already are or will be taking advantage of this attack vector.

In a statement to the Washington Post, Apple appears confident in its victory: «Attacks like the ones described . . . often have a short shelf life,» says Ivan Krstić, Head of Apple Security Engineering and Architecture. He adds that Apple is constantly fighting such machinations with new developments.

What happens once you’re infected with Pegasus?

So, Pegasus tricks the internal security measures of the smartphone’s system. By feigning a chain of trust, the download is trusted and the malicious code executed. And just like that, Pegasus arrives in the safe environment of your smartphone. Any and all shields against the outside are irrelevant, as they’ve been bypassed.

Exactly how Pegasus gets into your iPhone or Android device will likely remain unknown until either a CnC server can be replicated via reverse engineering or a real CnC server is either sold or hacked.

How to protect yourself

Again, you’re unlikely to be in acute danger of a Pegasus infection. It’s doubtful that your evil ex will be able to contact NSO Group and gain access to Pegasus just like that. And even if a business relationship were established, Pegasus isn’t cheap. The prices are unknown, but all reports point to several thousands of francs per person bugged. This also makes it unlikely that the Visp regional police will use Pegasus to arrest Raron’s local weed dealer.

Still: this type of attack is out there, and it can install any software it pleases without requiring any input from you.

So here are a few safety tips:

Keep in mind that this isn’t absolute protection, especially not against something as powerful as Pegasus. But if you stick to this approach, you should be pretty well off.

Let’s focus on Apple, since it’s often mentioned as the gateway and has the biggest piece of the smartphone-market pie. It’s recommended that you as a user don’t trust iMessage and FaceTime. In a bout of helpfulness, Apple has published a guide for the iPhone.

  1. Go to Settings.
  2. Go to Messages.
  3. Turn off iMessage.
  4. Go back to Settings.
  5. Go to FaceTime.
  6. Deactivate FaceTime.

72 people like this article


User Avatar
User Avatar

Journalist. Author. Hacker. A storyteller searching for boundaries, secrets and taboos – putting the world to paper. Not because I can but because I can’t not.


Background information

Interesting facts about products, behind-the-scenes looks at manufacturers and deep-dives on interesting people.

Show all

These articles might also interest you

  • Background information

    NeuralHash update: of attempts at explaining, hackers and the backdoor that supposedly isn’t

    by Dominik Bärlocher

  • Background information

    NeuralHash: Apple responds to questions about privacy

    by Dominik Bärlocher

  • Background information

    Apple NeuralHash vs. privacy – Pandora’s box is opened

    by Dominik Bärlocher