Saturday, 13 April 2024

The digital forensics - Pegasus spyware

Digital forensics, often known as computer forensics, is the art of gathering, analyzing, and archiving electronic data so that it can be used as evidence in court. It entails using specialized techniques and equipment to investigate digital devices for evidence, such as laptops, smartphones, and other electronic storage devices.

You might have crossed the days wherein Pegasus spyware was reportedly found to have intruded onto the smart phones of influential activists to track there activities against the authoritarian governments. 

NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime”  and “leaves no traces whatsoever”. A Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project, a collaborative investigation that involves more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories with technical support of Amnesty International’s Security Lab.

Amnesty has hosted the main aspects of research on its webpage with link https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ 

It has mentioned key features of its research on Pegasus spyware under the headings a below:

1. Discovering Pegasus network injection attacks

2. Pegasus’ BridgeHead and other malicious processes appear

3. Pegasus processes following potential Apple Photos exploitation

4. An iMessage zero-click 0day used widely in 2019

5. Apple Music leveraged to deliver Pegasus in 2020

6. Megalodon: iMessage zero-click 0-days return in 2021

7. Incomplete attempts to hide evidence of compromise

8. Pegasus processes disguised as iOS system services

9. Unravelling the Pegasus attack infrastructure over the years

10. Mobile devices, security and auditability

11. With our Methodology, we release our tools and indicators

 

 

 

 

No comments:

Post a Comment