{"id":44804,"date":"2022-01-13T21:29:19","date_gmt":"2022-01-13T21:29:19","guid":{"rendered":"https:\/\/www.darkreading.com\/edge-articles\/fighting-back-against-pegasus-other-advanced-mobile-malware"},"modified":"2022-01-13T21:29:19","modified_gmt":"2022-01-13T21:29:19","slug":"fighting-back-against-pegasus-other-advanced-mobile-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/","title":{"rendered":"Fighting Back Against Pegasus, Other Advanced Mobile Malware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>One of the biggest stories of 2021 \u2014 an investigation by the Guardian and 16 other media organizations, published in mid-July \u2014 suggested that over 30,000 human rights activists, journalists, and lawyers across the world may have been targeted using Pegasus. The list of targeted individuals includes world leaders and many activists, human rights advocates, dissidents, and opposition figures. The report, called the <a href=\"https:\/\/www.amnesty.org\/en\/latest\/press-release\/2021\/07\/the-pegasus-project\/\">Pegasus Project<\/a>, alleged that the malware was deployed widely through a variety of exploits, including several iOS zero-click zero days.<\/p>\n<p>Most recently, <a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2022\/01\/el-salvador-pegasus-spyware-surveillance-journalists\/\" target=\"_blank\" rel=\"noopener\">Amnesty International identified Pegasus<\/a> in use against &#8220;journalists and members of civil society organizations&#8221; in El Salvador. <\/p>\n<p>Based on forensic analysis of numerous mobile devices, Amnesty International\u2019s Security Lab found that the software was repeatedly used in an abusive manner for surveillance. Over the past year, representatives from the <a href=\"https:\/\/www.theguardian.com\/news\/2021\/jul\/29\/israeli-authorities-inspect-nso-group-offices-after-pegasus-revelations\">Israeli government visited NSO\u2019s Herzliya office<\/a> to investigate the claims, and India\u2019s Supreme Court commissioned a technical committee to investigate the national government\u2019s use of Pegasus <a href=\"https:\/\/www.theregister.com\/2021\/10\/29\/india_nso_pegasus_probe\/\">to spy on its own citizens<\/a>. In November, Apple announced that it was taking <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/nov\/23\/apple-sues-israeli-cyber-firm-nso-group\">legal action against NSO Group<\/a> for developing software that targets its users with \u201cmalicious malware and spyware.\u201d And in December, Reuters published that several <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03\/\">US State Department iPhones were hacked<\/a> using NSO Pegasus malware.<\/p>\n<p>Detecting infection traces from Pegasus and other advanced mobile malware is very tricky, and it\u2019s complicated by the security features of modern OSs like iOS and Android. Based on our observations, this is further obscured by the deployment of non-persistent malware, which leaves almost no traces after reboot. Many forensics frameworks require a device jailbreak, which results in the malware being removed from memory during the reboot, thus destroying evidence. Currently, several methods can detect Pegasus and other mobile malware. The free, open source <a href=\"https:\/\/github.com\/mvt-project\/mvt\">MVT (Mobile Verification Toolkit)<\/a> from Amnesty International allows technologists and investigators to inspect mobile phones for signs of infection. MVT is further boosted by a list of indicators of compromise (IoCs) collected from high-profile cases and made available by Amnesty International.<\/p>\n<p>Everyone wants to know how to protect their mobile devices from Pegasus and other similar tools and malware. We pulled together <a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts\" target=\"_blank\" rel=\"noopener\">some recommendations in this Tech Tip<\/a>, with the caveat that it is not an exhaustive list. Attack techniques are always evolving, and so must defenses. Go check out the list \u2014 and then come back here to keep reading.<\/p>\n<p><strong>I Want My Money Back, Costin \u2014 I Did All You Recommended and Still Got Infected!<\/strong><br \/>So you followed all these recommendations carefully and still got infected. Sadly, this is the reality we live in nowadays. I feel for you, really. You may not be a bad guy at all \u2014 on the contrary, I\u2019m sure you\u2019re one of the good guys. Perhaps you spoke against powerful people, or participated in some protests against a questionable decision from certain political figures, or simply used encryption software or been in the wrong place at the wrong time. Look on the bright side \u2014 you <em>know<\/em> you\u2019ve been infected, because artifacts and knowledge allowed you to determine that.<\/p>\n<p>Think of the following things:<\/p>\n<ol>\n<li><strong>Who targeted you and why?<\/strong> Try to figure out what it was that brought you to the attention of the big guys. Is this something that you can avoid in the future through more stealthy behavior? <\/li>\n<li><strong>Can you speak about it?<\/strong> The thing that eventually brought down many surveillance companies was bad publicity: reporters writing about abuses and exposing the lies, the wrongdoing, and all the evil. If you\u2019ve been targeted, try to find a journalist and tell them your story.<\/li>\n<li><strong>Change your device.<\/strong> If you were on iOS, try moving to Android for a while. If you were on Android, move to iOS. This might confuse attackers for some time; for instance, some threat actors are known to have purchased exploitation systems that only work on a certain brand of phone and OS.<\/li>\n<li><strong>Get a secondary device, preferably running GrapheneOS<\/strong>, for secure comms. Use a prepaid card in it, or only connect by Wi-Fi and TOR while in airplane mode. Avoid messengers where you need to provide your contacts with your phone number. Once an attacker has your phone number they can easily target you across many different messengers via this: iMessage, WhatsApp, Signal, Telegram \u2014 they are all tied to your phone number. An interesting new choice here is Session, which automatically routes your messages through an Onion-style network and doesn\u2019t rely on phone numbers.<\/li>\n<li><a href=\"https:\/\/twitter.com\/craiu\"><strong>Get in touch<\/strong><\/a><strong> with a security researcher<\/strong> in your area and discuss best practices frequently. Share artifacts, suspicious messages, or logs whenever you think something is odd. Security is never a single snapshot solution that is 100% hackproof; think of it like a stream that flows, and you need to adjust your sailing depending on the speed, currents, and obstacles.<\/li>\n<\/ol>\n<p>At the end of this, I\u2019d like to leave you with a thought. If you get targeted by nation-states, that means you are important. Remember: it\u2019s nice to be important, but it\u2019s more important to be nice. Alone, we are weak; together, we are strong. The world may be broken, but I believe we are living at a time when we can still change things. According to a <a href=\"https:\/\/edition.cnn.com\/2021\/12\/09\/media\/journalists-imprisoned-cpj-census\/index.html\" target=\"_blank\" rel=\"noopener\">report from the nonprofit group Committee to Protect Journalists<\/a>, 293 journalists were imprisoned in 2021, the highest number CPJ has ever reported since it started tracking it back in 1992. It\u2019s up to us to shape how the world will look like for us in 10 years, for our children, and for our children\u2019s children.\n<\/p>\n<p><em>You, the people, have the power to make this life free and beautiful, to make this life a wonderful adventure. Then \u2014 in the name of democracy \u2014 let us use that power \u2014 let us all unite. \u2026 Let us fight to free the world \u2014 to do away with national barriers \u2014 to do away with greed, with hate and intolerance. Let us fight for a world of reason, a world where science and progress will lead to all men\u2019s happiness. Soldiers! In the name of democracy, let us all unite!<br \/><em>\u2014<\/em>&nbsp;Final speech from <a href=\"https:\/\/www.imdb.com\/title\/tt0032553\/\" target=\"_blank\" rel=\"noopener\">The Great Dictator<\/a><\/em><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/fighting-back-against-pegasus-other-advanced-mobile-malware\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/fighting-back-against-pegasus-other-advanced-mobile-malware\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44804","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T21:29:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fighting Back Against Pegasus, Other Advanced Mobile Malware\",\"datePublished\":\"2022-01-13T21:29:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/\"},\"wordCount\":1030,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4bddad5870a21606\\\/61b1908e49813175aa360f05\\\/cyberattack_Anucha_Cheechang_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/\",\"name\":\"Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4bddad5870a21606\\\/61b1908e49813175aa360f05\\\/cyberattack_Anucha_Cheechang_shutterstock.jpg\",\"datePublished\":\"2022-01-13T21:29:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4bddad5870a21606\\\/61b1908e49813175aa360f05\\\/cyberattack_Anucha_Cheechang_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4bddad5870a21606\\\/61b1908e49813175aa360f05\\\/cyberattack_Anucha_Cheechang_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fighting-back-against-pegasus-other-advanced-mobile-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fighting Back Against Pegasus, Other Advanced Mobile Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/","og_locale":"en_US","og_type":"article","og_title":"Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-13T21:29:19+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fighting Back Against Pegasus, Other Advanced Mobile Malware","datePublished":"2022-01-13T21:29:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/"},"wordCount":1030,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/","url":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/","name":"Fighting Back Against Pegasus, Other Advanced Mobile Malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg","datePublished":"2022-01-13T21:29:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4bddad5870a21606\/61b1908e49813175aa360f05\/cyberattack_Anucha_Cheechang_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fighting-back-against-pegasus-other-advanced-mobile-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fighting Back Against Pegasus, Other Advanced Mobile Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44804"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44804\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}