Please disable your adblock and script blockers to view this page

This tool tells you if NSO's Pegasus spyware targeted your phone


NSO Group
Forbidden Stories
Amnesty International
The Washington Post
Guardian
the European Union
TechCrunch
the Citizen Lab
the University of Toronto
iPhone
The Mobile Verification Toolkit
MVT
iPhones
violence’
Google
VMware
Microsoft
WhatsApp
NSO
GitHub
Signal


Bill Marczak
Android
TechCrunch

Dozens of journalists’ iPhones
SecureDrop

No matching tags

No matching tags

No matching tags


Mexico
Morocco
the United Arab Emirates
Paris
Hungary
Android
Cisco

No matching tags

Positivity     38.00%   
   Negativity   62.00%
The New York Times
SOURCE: https://techcrunch.com/2021/07/19/toolkit-nso-pegasus-iphone-android/
Write a review: TechCrunch
Summary

NSO has long said that it doesn’t know who its customers target, which it reiterated in a statement to TechCrunch on Monday.Researchers at Amnesty, whose work was reviewed by the Citizen Lab at the University of Toronto, found that NSO can deliver Pegasus by sending a victim a link which when opened infects the phone, or silently and without any interaction at all through a “zero-click” exploit, which takes advantage of vulnerabilities in the iPhone’s software. Citizen Lab researcher Bill Marczak said in a tweet that NSO’s zero-clicks worked on iOS 14.6, which until today was the most up-to-date version.Amnesty’s researchers showed their work by publishing meticulously detailed technical notes and a toolkit that they said may help others identify if their phones have been targeted by Pegasus.The Mobile Verification Toolkit, or MVT, works on both iPhones and Android devices, but slightly differently. Image Credits: TechCrunchThe Terminal output from the MVT toolkit, which scans iPhone and Android backup files for indicators of compromise.

As said here by Zack Whittaker