Detection tool for Pegasus and other spyware

Kaspersky_news

Share post

Kaspersky's Global Research and Analysis Team (GReAT) has developed a new detection method for Pegasus and similarly sophisticated iOS spyware. The cybersecurity provider is providing a publicly available infection check tool on Github.

The spyware Pegasus was recently used in Germany. To make it easier to identify spyware infections, Kaspersky experts have developed a self-check tool for users. In addition to Pegasus, the iOS spyware Reign and Predator are also detected.

Kaspersky experts were able to develop the new detection method because they realized that Pegasus infections leave traces in the system log “Shutdown.log”, which is contained in the diagnostic archive of every mobile iOS device. The archive contains information about each reboot process, so Pegasus malware anomalies become visible in the log as soon as an infected user reboots their device. These include, among other things, particularly with the Pegasus spyware, “sticky” processes that prevent reboots and traces of infection discovered by the cybersecurity community.

Pegasus leaves traces of infection

When analyzing the Shutdown.log of Pegasus infections, Kaspersky experts found the infection path “/private/var/db/”, which corresponded to the paths of other iOS malware such as Reign and Predator. Kaspersky experts believe that this log file has the potential to identify infections related to these malware families.

Based on these findings, a self-check tool for users was developed. With the help of The-Python3 script, the Shutdown.log can be more easily extracted, analyzed and parsed. The tool is freely available on Github for macOS, Windows and Linux.

“Sysdiag dump analysis is a minimally invasive and resource-efficient method that relies on system-based artifacts to identify potential iPhone infections,” explains Maher Yamout, Lead Security Researcher at Kaspersky’s GReAT. “By using the infection indicator from this log and confirming the infection using MVT (Mobile Verification Toolkit) processing of other iOS artifacts, the log now becomes part of a holistic approach to investigating iOS malware infections. We have verified behavioral consistency with other Pegasus infections analyzed, so we expect it will serve as a reliable forensic artifact to support infection analysis.”

Recommendations for protecting against advanced iOS spyware

  • Restart devices daily. According to research by Amnesty International and Citizen Lab, Pegasus is often based on non-persistent zero-click zero-day exploits. Restarting regularly can help clean up the device; Attackers would then have to reinfect it again and again.
  • Use lockdown mode because public reports attest to its success in blocking iOS malware infections.
    Disable iMessage and Facetime, which are among the most exploited services by hackers, so disabling them reduces the risk of being infected by zero-click chains.
  • Update mobile devices regularly. The latest iOS patches should be installed immediately as many iOS exploit kits target previously patched vulnerabilities.
  • Do not open links in messages as Pegasus can be distributed via 1-click exploits via SMS, email or messenger.
  • Regularly create backups and perform system diagnostics; Kaspersky tools can help detect iOS malware.
More at GitHub.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more