Self-scans reveal that Pegasus, an invasive and powerful spyware that can secretly control phones and track owners, might be more widespread than previously thought. It was discovered on the phones of everyday phone users.
From wikiHow: How to Check Your Smartphone for Pegasus Spyware
Amnesty International provides a FOSS tool to check your mobile backups for traces of the Pegasus Spyware. I’d trust that over a sketchy proprietary app. Link: https://docs.mvt.re/.
You can use pip to install the tool.
it’s call mvt
Your package manager might have it.
If you’re on a Mac just use brew to install it.
Don’t use this third party app.
There could be spyware on your phone! Install this shady app to find out if you have the spyware or not!
I wonder if the shady app in the link is the spyware. This would be a brilliant way of getting on to people’s phones.
My thoughts exactly… If there’s a FOSS tool to check, then we’d be talking.
Lol I almost linked you to your own comment
Yeah, I see what you mean and on top of that you would need to pay for it.
That’s why I added in the description a link with instructions on the free tool designed by Amnesty International’s Security Lab.
Yeah, I’ll just assume that my GrapheneOS install is safe, the checker probably wouldn’t work anyway…
I haven’t checked, does GrapheneOS do reproducible/deterministic builds so that you could verify that the published release matches your image? The boot attestation should not be able to be circumvented, if you trust Google hardware to do what it says on the tin.
Thanks, interesting. I have used boot attestation but not yet Auditor. Hope to have some quality time reading up on the documentation in the coming three weeks.
What do you mean??? WikiHow is a collection of only the most reliable tutorials and information. Now be good and install the shady app.
That’s outdated stuff. Pegasus doesn’t need phishing methods to get on your phone. It just installs itself when an actor sends it your way. You won’t notice it and the only way to prevent it is to not use a phone.
It technically uses various zero-day zero-click exploits to get there. Which is why it functions like a service - they need to maintain relevance of those exploits. Imagine, a whole service of clearly illegal activity, which doesn’t get absolutely destroyed simply because it’s useful to spy on dissidents.
It worked with antivirus scanning - more than half of Windows PCs have spyware on them their users consciously installed so that it would scan and report what they run.
All windows PCs have spyware on them by definition
Damn, I oughtta give my phone a check
Let’s say there are signs of it being infected. What can you do next?
Buy/replace your phone
How do you keep that one from reinfecting?
You can try factory reset, but more than likely they control the boot process, so you can’t get rid of the malware no matter what you do.
You might be able to trade it in with your manufacturer. They might be interested in having an infected phone to study.