Best Security News

Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed “Rainbow Ronin”), showing that spyware targets not only activists and journalists but also professionals and civilians.

The company’s newly launched Mobile Threat Hunting feature has detected multiple instances of the infamous Pegasus spyware, developed by NSO Group (dubbed “Rainbow Ronin” by iVerify), on devices belonging to ordinary professionals and civilians.

Researchers conducted an extensive scan by iVerify and uncovered the following key findings:

  • 2,500 self-scanned devices yielded seven Pegasus infections
  • Infection rate of 2.5 devices per 1,000 scans, significantly higher than previous estimates
  • Infections dating back to 2021, spanning multiple iOS versions

“These findings validate what we’ve long suspected: if you scan for it, you will find it,” said an iVerify spokesperson. “We’re uncovering threats that have been hiding in plain sight, undetected by traditional security measures.”

The investigation’s results challenge the prevailing notion that advanced spyware like Pegasus only targets high-profile individuals such as journalists, activists, and government officials. While the scanned devices did belong to higher-risk populations, the detection rate suggests a more widespread problem than previously acknowledged.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Pegasus: A Sophisticated Adversary

NSO Group (Rainbow Ronin) developed Pegasus, which embodies cutting-edge spyware technology.

  • Capable of complete device control
  • Utilizes zero-click attacks for infection
  • Exploits vulnerabilities in both iOS and Android

iVerify’s research uncovered five unique malware types across both major mobile operating systems, with forensic artifacts detected in various system logs.

This investigation highlights a critical gap in current mobile security practices. “As an industry, we’ve believed that mobile device security is good enough,” the iVerify spokesperson noted.

“But our findings suggest the threat landscape is far more complex and dangerous than we thought.” In the coming weeks, iVerify plans to release a detailed technical analysis of their Pegasus findings.

As mobile threats continue to evolve, iVerify’s work underscores the importance of proactive, user-accessible security measures. By putting powerful threat detection capabilities directly into users’ hands, the company aims to revolutionize how we approach mobile device security in an increasingly complex digital world.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

2 hours ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

3 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

3 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

4 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

4 hours ago

CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a…

5 hours ago