{"id":44839,"date":"2022-01-13T20:35:47","date_gmt":"2022-01-13T20:35:47","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts"},"modified":"2022-01-13T20:35:47","modified_gmt":"2022-01-13T20:35:47","slug":"how-to-protect-your-phone-from-pegasus-and-other-apts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/","title":{"rendered":"How to Protect Your Phone from Pegasus and Other APTs"},"content":{"rendered":"<p>Amnesty International reports that&nbsp;Pegasus, the &#8220;legal surveillance software&#8221; from Israeli company NSO Group which has been used to surveil human rights activists, journalists, and lawyers around the world, has been found on 37 devices belonging to <a href=\"https:\/\/www.wired.com\/story\/nso-group-pegasus-el-salvador\/\" target=\"_blank\" rel=\"noopener\">35 journalists in El Salvador<\/a> as late as last November.<\/p>\n<p>Over the past few months, I received a lot of questions from concerned users worldwide about how to <a href=\"https:\/\/www.darkreading.com\/edge-articles\/fighting-back-against-pegasus-other-advanced-mobile-malware\" target=\"_blank\" rel=\"noopener\">protect their mobile devices from Pegasus<\/a> and other similar tools and malware. First, let me warn you that no list of defense techniques can ever be exhaustive. Additionally, as attackers change their modus operandi, defense techniques need to adapt. <\/p>\n<p>We should start by saying that Pegasus is a toolkit sold to nation-states at relatively high prices. The cost of a full deployment may easily reach millions of dollars. Similarly, other advanced persistent threat (APT) mobile malware may be deployed through zero-click zero-day exploits. These are also extremely expensive \u2014 as an example, Zerodium, an exploit brokerage firm, pays up to $2.5 million USD for an Android zero-click infection chain with persistence.<\/p>\n<p>From the start, we come to an important conclusion \u2014 nation-state sponsored cyberespionage is a vastly resource-intensive endeavor. When a threat actor can afford to spend millions, tens of millions, or even hundreds of millions of dollars on their offensive programs, it is very unlikely that a target will be able to avoid getting infected. To put it bluntly: It\u2019s not a question of whether you get infected, it\u2019s just a matter of time and resources before you get infected.<\/p>\n<p>Now for the good news \u2014 exploit development and offensive cyberwarfare are often more of an art than an exact science. Exploits need to be tuned for specific OS versions and hardware, and they can be easily thwarted by new OSes, new mitigation techniques, or even small random events.<\/p>\n<p>With that in mind, avoiding infection also comes down to making things more expensive and difficult for the attackers. Although we may not always be able to prevent the successful exploitation and infection of our mobile device, we can try to make it as hard as possible for the attackers. How do we do this in practice? Here\u2019s a simple checklist:<\/p>\n<p><strong>On Apple iOS Devices<\/strong><br \/><strong>Reboot daily.<\/strong> According to research from Amnesty and CitizenLab, the Pegasus infection chain often relies on zero-click zero days with no persistence, so regular reboot helps clean the device. If the device is rebooted daily, the attackers will have to re-infect it over and over again. Over time, this increases the chances of detection; a crash or artifacts could be logged that give away the nature of the stealthy infection. This is not just theory, it\u2019s practice \u2014 we analyzed a case in which a mobile device was targeted through a zero-click exploit (likely FORCEDENTRY). The device owner rebooted their device regularly and did so in the 24 hours following the attack. The attackers tried to target them a few more times but eventually gave up after getting kicked a few times through reboots.<\/p>\n<p><strong>Disable iMessage<\/strong>. iMessage is built into iOS and is enabled by default, making it an attractive exploitation vector. Because it\u2019s enabled by default, it is a top delivery mechanism for zero-click chains. For many years, iMessage exploits were in high demand, with top payouts at exploit brokerage companies. &#8220;During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we&#8217;ve recently started refusing some (of) them,&#8221; Zerodium&#8217;s founder <a href=\"https:\/\/www.wired.com\/story\/android-zero-day-more-than-ios-zerodium\/\" target=\"_blank\" rel=\"noopener\">Chaouki Bekrar wrote back in 2019 to Wired<\/a>. We realize this may be very difficult for some (more later), but if Pegasus and other high-end APT mobile malware is in your threat model, this is a tradeoff worth taking.<\/p>\n<p><strong>Disable Facetime.<\/strong> Same as above.<\/p>\n<p><strong>Keep the mobile device up to date. <\/strong>Install the latest iOS patches as soon as they come out. Not all attackers can afford zero-click zero days; many of the iOS exploit kits we are seeing target already patched vulnerabilities. Nevertheless, many people run older phones and postpone updates for various reasons. If you want to be ahead of (some) nation-state hackers, update as soon as possible and teach yourself <a href=\"https:\/\/twitter.com\/ryanaraine\/status\/1324445133668974592\" target=\"_blank\" rel=\"noopener\">not to need emojis to install the patches<\/a>. <\/p>\n<p><strong>Don&#8217;t ever click on links received via SMS messages<\/strong>. This is simple advice, yet effective. To save the cost of zero-click chains, many hackers rely on one-click exploits. These arrive in the form of a message \u2014 sometimes by SMS, but also via other messengers or even email. If you receive an interesting SMS (or any other message) with a link, open it on a desktop computer, preferably using TOR Browser or a secure non-persistent OS such as Tails.<\/p>\n<p><strong>Browse the Internet with an alternate browser such as Firefox Focus.<\/strong> Despite the fact that all browsers on iOS pretty much use the same WebKit rendering engine, some exploits do not work well (see <a href=\"https:\/\/securelist.com\/ios-exploit-chain-deploys-lightspy-malware\/96407\/\">LightRighter \/ TwoSailJunk<\/a>) on some alternate browsers.<\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"wztjjnxh8rov\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"blt6f900d75a3bad0f0\" alt=\"Showing the User Agent String\">\n<\/picture><figcaption>Source: Costin Raiu, Kaspersky GReAT<\/figcaption><\/figure>\n<p>User agent strings on iOS from Chrome: <em>Mozilla\/5.0 (iPhone; CPU iPhone OS 15_1 like Mac OS X) AppleWebKit\/605.1.15 (KHTML, like Gecko) CriOS\/96.0.4664.53 Mobile\/15E148 Safari\/604.1<\/em><\/p>\n<p>User agent strings on iOS from Firefox Focus: <em>Mozilla\/5.0 (iPhone; CPU iPhone OS 15_1 like Mac OS X) AppleWebKit\/605.1.15 (KHTML, like Gecko) FxiOS\/39 Mobile\/15E148 Version\/15.0<\/em><\/p>\n<p><strong>Always use a VPN that masks your traffic<\/strong>. Some exploits are delivered through GSM operator MitM attacks, when browsing HTTP sites or by DNS hijack. Using a VPN to mask the traffic makes it difficult for your GSM operator to target you directly over the Internet. It also complicates the targeting process if the attackers have control over your data stream, such as while in roaming. Do note that not all VPNs are the same, and not every VPN is fine to use. Without favoring any specific VPN, here\u2019s a few things to consider when purchasing a VPN subscription:<\/p>\n<ul>\n<li>\u201cPurchasing\u201d means just that \u2014 no \u201cfree\u201d VPNs<\/li>\n<li>Look for services that accept payment with cryptocurrencies<\/li>\n<li>Look for services that do not require you to provide any registration info<\/li>\n<li>Try to avoid VPN apps \u2014 instead, use open source tools such as WireGuard and OpenVPN and VPN profiles<\/li>\n<li>Avoid new VPN services and look for established services that have been around for some time<\/li>\n<\/ul>\n<p><strong>Install a security application that checks and warns if the device is jailbroken.<\/strong> Frustrated from getting kicked over and over, the attackers will eventually deploy a persistence mechanism and jailbreak your device in the process. This is where the chance of catching them increases tenfold, and we can take advantage of the fact that the device is jailbroken.\n<\/p>\n<p><strong>Make iTunes backups once per month.<\/strong> This allows you to diagnose and find infections later, through the use of the wonderful <a href=\"https:\/\/github.com\/mvt-project\/mvt\" target=\"_blank\" rel=\"noopener\">MVT package from Amnesty<\/a>.<\/p>\n<p><strong>Trigger sysdiags often and save them to external backups.<\/strong> Forensics artifacts can help you determine at a later time if you have been targeted. Triggering a sysdiag depends on the phone model \u2014 for instance, on some iPhones, you do this by pressing VOL Up + Down + Power at the same time. You may need to play with this a couple of times until the phone buzzes. Once the sysdiag is created, it will appear in diagnostics:<\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt153858d2f485d2ef\/61e0971c2509765bcb2776ba\/analytics-Costin.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt153858d2f485d2ef\/61e0971c2509765bcb2776ba\/analytics-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt153858d2f485d2ef\/61e0971c2509765bcb2776ba\/analytics-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt153858d2f485d2ef\/61e0971c2509765bcb2776ba\/analytics-Costin.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"pezdjhlgdbwa\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt153858d2f485d2ef\/61e0971c2509765bcb2776ba\/analytics-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"blt153858d2f485d2ef\" alt=\"Analytics Options on iOS\">\n<\/picture><figcaption>Source: Costin Raiu, Kaspersky GReAT<\/figcaption><\/figure>\n<p><strong>On Android Devices <\/strong><br \/><strong>Reboot daily.<\/strong> Persistence on latest Android versions is difficult; many APTs and exploit sellers avoid any persistence whatsoever!<\/p>\n<p><strong>Keep your phone up to date.<\/strong> Install all the latest patches.<\/p>\n<p><strong>Don&#8217;t ever click on links received in SMS messages.<\/strong><\/p>\n<p><strong>Browse the internet with an alternate browser.<\/strong> Again, try using Firefox Focus instead of Chrome.<\/p>\n<p><strong>Always use a VPN that masks your traffic.<\/strong> Some exploits are delivered through GSM operator MitM attacks, when browsing HTTP sites or by DNS hijack.<\/p>\n<p><strong>Install a security suite that scans for malware and checks and warns if the device is jailbroken.<\/strong><\/p>\n<p>At a more sophisticated level, <strong>always check your network traffic using live IOCs<\/strong>. A good setup might include a Wireguard always-on VPN to a server under your control that uses <a href=\"https:\/\/pi-hole.net\">pi-hole<\/a> to filter out bad stuff and logs all the traffic for further inspection. <\/p>\n<p><strong>Bro, This Makes No Sense! Life Without iMessage Is Green and Emoji-less.<\/strong><\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbebdaca1f437e334\/61e09669755c735a78044400\/imessage-Costin.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbebdaca1f437e334\/61e09669755c735a78044400\/imessage-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbebdaca1f437e334\/61e09669755c735a78044400\/imessage-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbebdaca1f437e334\/61e09669755c735a78044400\/imessage-Costin.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"q10powk9ytjr\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbebdaca1f437e334\/61e09669755c735a78044400\/imessage-Costin.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"bltbebdaca1f437e334\" alt=\"Message from George about iMessage.\">\n<\/picture><figcaption>Source: Costin Raiu, Kaspersky GReAT<\/figcaption><\/figure>\n<p><strong><\/strong><br \/>Ah yes, I hear you \u2014 been there myself. Talking to my friend Ryan Naraine yesterday, he said, \u201ciMessage and FaceTime \u2014 these are <em>the<\/em> reasons why people use iPhones!\u201d and for sure, he\u2019s right. I myself have been an iPhone user since 2008, and I think iMessage and FaceTime were two of the greatest things Apple added to this ecosystem. When I realized that these are also some of the most exploited features that let nation-states spy on your phone, I tried to escape the iMessage <a href=\"https:\/\/www.youtube.com\/watch?v=FVsbvFkhzY4\">Hotel California<\/a>. The hardest thing? Getting the family to stop using it too. Surprising as it may sound, this was one of the most difficult things in this whole security saga.<\/p>\n<p>At first, I tried to switch everyone to Telegram. This didn\u2019t go too well. Then, Signal got better, implementing video calls and group calling. In time, more and more friends started moving onto Signal. And this worked well with my family, too. <\/p>\n<p>I\u2019m not saying you should do the same. Perhaps you can keep those apps enabled and live happily and malware free \u2014 truth be told, Apple greatly improved the <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/01\/a-look-at-imessage-in-ios-14.html\">security sandbox around iMessage<\/a> with BlastDoor in iOS 14. Nevertheless, the <a href=\"https:\/\/citizenlab.ca\/2021\/09\/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild\/\">FORCEDENTRY exploit<\/a> NSO used to deliver Pegasus bypassed BlastDoor, and of course, no security feature is ever 100% hack-proof.<\/p>\n<p>So, what is the best of both worlds, you may ask? Some people, including myself, have multiple iPhones \u2014 one where iMessage is disabled, and a \u201choneypot\u201d iPhone where iMessage is enabled. Both are associated with the same Apple ID and phone number. If someone decides to target me this way, there\u2019s a good chance they will end up in the honeypot phone. <\/p>\n<p>Keep in mind that I weighed the costs and benefits for my own situation. I have experienced these kinds of attacks, and I therefore know I could be a target again. To avoid this higher level of risk, I will take more effort and make more sacrifices of features I find both useful and fun. If you are taking actions that might make a nation-state notice you and consider you an enemy, you might want to lock down your phone as much as possible.<\/p>\n<p>Otherwise, maybe just set up a honeypot.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44839","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T20:35:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to Protect Your Phone from Pegasus and Other APTs\",\"datePublished\":\"2022-01-13T20:35:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/\"},\"wordCount\":1764,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6f900d75a3bad0f0\\\/61e09f976d8d2475b0383900\\\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/\",\"name\":\"How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6f900d75a3bad0f0\\\/61e09f976d8d2475b0383900\\\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2022-01-13T20:35:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6f900d75a3bad0f0\\\/61e09f976d8d2475b0383900\\\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6f900d75a3bad0f0\\\/61e09f976d8d2475b0383900\\\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-protect-your-phone-from-pegasus-and-other-apts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Phone from Pegasus and Other APTs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-13T20:35:47+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to Protect Your Phone from Pegasus and Other APTs","datePublished":"2022-01-13T20:35:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/"},"wordCount":1764,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/","name":"How to Protect Your Phone from Pegasus and Other APTs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2022-01-13T20:35:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6f900d75a3bad0f0\/61e09f976d8d2475b0383900\/User-Agent-Costin_.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-protect-your-phone-from-pegasus-and-other-apts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Phone from Pegasus and Other APTs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44839"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44839\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}