Pegasus

Description

(Citizen Lab) Israel-based “Cyber Warfare” vendor NSO Group produces and sells a mobile phone spyware suite called Pegasus. To monitor a target, a government operator of Pegasus must convince the target to click on a specially crafted exploit link, which, when clicked, delivers a chain of zero-day exploits to penetrate security features on the phone and installs Pegasus without the user’s knowledge or permission. Once the phone is exploited and Pegasus is installed, it begins contacting the operator’s command and control (C&C) servers to receive and execute operators’ commands, and send back the target’s private data, including passwords, contact lists, calendar events, text messages, and live voice calls from popular mobile messaging apps. The operator can even turn on the phone’s camera and microphone to capture activity in the phone’s vicinity.

Names

Name
Pegasus
Q Suite
Chrysaor
JigglyPuff

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Credential stealer
  • Exfiltration

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

ff64b1c1-6846-4f3f-9dae-0e23f866299e

Last Card Change

2025-04-21