We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

iVerify Report: Pegasus Spyware Rampant Across Smartphones

iVerify Report: Pegasus Spyware Rampant Across Smartphones
Husain Parvez Published on 9th December 2024 Cybersecurity Researcher

Pegasus spyware, created by the Israeli firm NSO Group, has been identified on a growing number of smartphones worldwide. It targets individuals ranging from journalists and activists to business leaders and government officials. A report by mobile security company iVerify uncovered seven infections out of 2,500 devices scanned using its Mobile Threat Hunting tool, revealing the widespread reach of the Pegasus malware.

These findings demonstrated the commercial spyware’s ability to infiltrate iOS and Android devices. According to Dark Reading, Pegasus leverages zero-click vulnerabilities to extract sensitive data, such as emails, messages, credentials, and location information, without the victim's knowledge.

Researchers detected these infections through diagnostic data, shutdown logs, and crash reports, which provided evidence of the malware’s presence on devices using iOS versions 14, 15, and 16.6 and Android systems. Matthias Frielingsdorf, the iVerify co-founder, noted the implications: “Our investigation detected 2.5 infected devices per 1,000 scans — a rate significantly higher than any previously published reports.”

This discovery challenges previous assumptions about Pegasus's limited targeting scope. Traditionally believed to be a tool for state-sponsored surveillance against high-profile individuals, the new findings indicate that it is being used more broadly. In the Wired report, iVerify’s Chief Operating Officer Rocky Cole emphasized this evolution, stating, “The age of assuming that iPhones and Android phones are safe out of the box is over.”

The spyware's reach was further highlighted in a TechCrunch report detailing an attack on a major business leader. Cole described the targeted individual as “completely surprised” by the spyware’s presence, underscoring the risk of Pegasus being misused for commercial espionage. This case joins others, including attempts to breach the phones of political campaign officials, suggesting a diversification of targets that extends beyond activists and dissidents.

Legal actions and past investigations have also shed light on Pegasus's operations. A Record report cited court filings from WhatsApp, revealing how NSO Group exploited vulnerabilities in its platform to target 1,400 users in 2019. The spyware’s zero-click feature, which bypasses user interaction to install itself, was a key factor in these breaches. WhatsApp has accused NSO of violating US laws, a claim the company denies.

As Pegasus infections continue to surface, security experts emphasize the importance of frequent software updates and proactive detection tools. These findings highlight the evolving threat of spyware and its implications for privacy and security across all sectors of society.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address