Predator and Pegasus are spyware programs that can be covertly installed on mobile phones and other devices running Android and iOS, exploiting all the latest versions of mobile operating systems. Various studies and publications indicate that journalists, politicians, government officials, chief executives and directors are the most common targets.
Modus Operandi
The examination of infected devices in our Forensic Lab indicates that these
spyware programs infect the devices by triggering a crafted SMS or instant
Message to urge the targeted individuals to click on malicious links, coming
however from “known” senders. There are other mechanisms via which the targeted user is not even required to click on malicious URLs and still their devices get compromised, through the use of apps. Such spyware can be customized to capture screenshots, intercept communication and copy browsing history and contacts from the infected device. It can also compromise the most common used messaging platforms.
Indicators of Compromise
Studies, researches and our experience from infected devices indicate a variety of different methods to identify cases of compromise from spyware like Pegasus and Predator:
1. Network injection attacks
These spyware programs forcefully redirect benign pages to malicious ones leading to exposure of the targeted devices.
2. Malicious processes
The presence of certain processes in the phone memory may indicate that the device is compromised.
3. Usage of inbuilt applications
4. Camouflaging itself
Detective measures:
How to be protected:
How Deloitte can help you
Our Digital Forensic Specialists can investigate all suspected devices for indicators of compromise, the magnitude of the breach and the files accessed from the Spyware. This type of investigation requires specialized software and hardware that we possess locally in our Athens Digital Forensic Lab, while our Certified Digital Forensic Specialists can provide clarity under globally admissible methodologies and strict confidentiality.