{"id":43453,"date":"2022-02-02T06:58:31","date_gmt":"2022-02-02T11:58:31","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=43453"},"modified":"2025-07-18T11:41:29","modified_gmt":"2025-07-18T15:41:29","slug":"how-to-protect-from-pegasus-spyware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/","title":{"rendered":"Staying safe from Pegasus, Chrysaor and other APT mobile malware"},"content":{"rendered":"<p>Possibly the biggest story of 2021 \u2014 an investigation by the Guardian and 16 other media organizations, published in July \u2014 suggested that over 30,000 human rights activists, journalists and lawyers across the world may have been targeted using Pegasus. Pegasus is a so-called \u201clegal surveillance software\u201d developed by the Israeli company NSO. The report, called the <a href=\"https:\/\/www.amnesty.org\/en\/latest\/press-release\/2021\/07\/the-pegasus-project\/\" target=\"_blank\" rel=\"nofollow noopener\">Pegasus Project<\/a>, alleged that the malware was deployed widely through a variety of exploits, including several iOS zero-click zero-days.<\/p>\n<p>Based on forensic analysis of numerous mobile devices, Amnesty International\u2019s Security Lab found that the software was repeatedly used in an abusive manner for surveillance. The list of targeted individuals includes 14 world leaders and many other activists, human rights advocates, dissidents and opposition figures.<\/p>\n<p>Later in July, representatives from the Israeli government <a href=\"https:\/\/www.theguardian.com\/news\/2021\/jul\/29\/israeli-authorities-inspect-nso-group-offices-after-pegasus-revelations\" target=\"_blank\" rel=\"nofollow noopener\">visited the offices of NSO<\/a> as part of an investigation into the claims. In October, India\u2019s Supreme Court commissioned a technical committee to <a href=\"https:\/\/www.theregister.com\/2021\/10\/29\/india_nso_pegasus_probe\/\" target=\"_blank\" rel=\"nofollow noopener\">investigate the use of Pegasus<\/a> to spy on its citizens. Apple announced, in November, that it was taking <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/nov\/23\/apple-sues-israeli-cyber-firm-nso-group\" target=\"_blank\" rel=\"nofollow noopener\">legal action against NSO Group<\/a> for developing software that targets its users with \u201cmalicious malware and spyware.\u201d Last but not least, in December, Reuters published that <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03\/\" target=\"_blank\" rel=\"nofollow noopener\">US State Department phones were hacked<\/a> with the NSO Pegasus malware, as alerted by Apple.<\/p>\n<p>Over the past few months I have received a lot of questions from concerned users worldwide on how to protect their mobile devices from Pegasus and other similar tools and malware. We are trying to address this in the current article, with the observation that no list of defence techniques can ever be exhaustive. Additionally, as attackers change their modus operandi, protection techniques should also be adapted.<\/p>\n<h2>How to stay safe from Pegasus and other advanced mobile spyware<\/h2>\n<p>First of all, we should start by saying that <strong>Pegasus is a toolkit sold to nation states at relatively high prices<\/strong>. The cost of a full deployment may easily reach millions of USD. Similarly, other APT mobile malware may be deployed through zero-click 0-day exploits. These are extremely expensive \u2014 as an example, Zerodium, an exploit brokerage firm pays up to $2.5 million for an Android zero-click infection chain with persistence:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140725\/how-to-protect-from-pegasus-spyware-zerodium-price-list.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140725\/how-to-protect-from-pegasus-spyware-zerodium-price-list.png\" alt=\"In Zerodium's price list persistence vulnerabilities fetch up to $2.5 million\" width=\"824\" height=\"603\" class=\"aligncenter size-full wp-image-43463\"><\/a><\/p>\n<p>From the start, this draws an important conclusion \u2014 nation state sponsored cyberespionage is a vastly resourceful endeavor. When a threat actor can afford to spend millions, potentially tens of millions or even hundreds of millions of USD on their offensive programs, it is very unlikely that a target will be able to avoid getting infected. To put this in simpler words, if you are targeted by such an actor, it\u2019s not a question of \u201cwhether you can get infected,\u201d it\u2019s actually <strong>just a matter of time and resources before you get infected<\/strong>.<\/p>\n<p>Now, for the good news \u2014 exploit development and offensive cyberwarfare are often more of an art rather than an exact science. Exploits need to be tuned for specific OS versions and hardware and can be easily thwarted by new OS releases, new mitigation techniques or even small things such as random events.<\/p>\n<p>With that in mind, infection and targeting is also a question of cost and making things more difficult for the attackers. Although we may not always be able to prevent the successful exploitation and infection of the mobile device, we can try to make it as hard as possible for the attackers.<\/p>\n<p>How do we do this in practice? Here\u2019s a simple checklist.<\/p>\n<h3>How to protect from advanced spyware on iOS<\/h3>\n<p><strong>Reboot daily.<\/strong> According to research from Amnesty International and Citizen Lab, the Pegasus infection chain often relies on zero-click 0-days with no persistence, so regular reboot helps clean the device. If the device is rebooted daily, the attackers will have to re-infect it over and over again. In time, this increases the chances of detection; a crash might happen or artifacts could be logged that give away the stealthy nature of the infection. Actually, this is not just theory, it\u2019s practice \u2014 we analyzed one case in which a mobile device was targeted through a zero-click exploit (likely FORCEDENTRY). The device owner rebooted their device regularly and did so in the next 24 hours following the attack. The attackers tried to target them a few more times but eventually gave up after getting kicked a few times through reboots.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"D9Rgiu3MZ6\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-noreboot-attack-and-how-to-protect-your-smartphone\/43292\/\" target=\"_blank\" rel=\"noopener nofollow\">NoReboot: A fake restart to gain a foothold in the system<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cNoReboot: A fake restart to gain a foothold in the system\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/what-is-noreboot-attack-and-how-to-protect-your-smartphone\/43292\/embed\/#?secret=lD6z3ms7KT#?secret=D9Rgiu3MZ6\" data-secret=\"D9Rgiu3MZ6\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><strong>Disable iMessage.<\/strong> iMessage is built into iOS and is enabled by default, making it an attractive exploitation vector. Because it\u2019s enabled by default, it is a top delivery mechanism for zero-click chains and for many years, iMessage exploits were in high demand, with top payouts at exploit brokerage companies. \u201cDuring the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. <strong>The zero-day market is so flooded by iOS exploits that we\u2019ve recently started refusing some (of) them<\/strong>,\u201d Zerodium\u2019s founder <a href=\"https:\/\/www.wired.com\/story\/android-zero-day-more-than-ios-zerodium\/\" target=\"_blank\" rel=\"nofollow noopener\">Chaouki Bekrar wrote back in 2019 to WIRED<\/a>. We realize life without iMessage may be very difficult for some (more on that later), but if Pegasus and other high-end APT mobile malware is in your threat model, this is a tradeoff worth taking.<\/p>\n<p><strong>Disable Facetime.<\/strong> Same advice as above.<\/p>\n<p><strong>Keep the mobile device up to date; install the latest iOS patches as soon as they are out.<\/strong> Not everyone can afford zero-click 0-day\u2019s, actually many of the iOS exploit kits we are seeing are targeting already patched vulnerabilities. Nevertheless, many people run older phones and postpone updates for various reasons. If you want to be ahead of (at least some) nation state hackers, update as soon as possible and teach yourself <a href=\"https:\/\/twitter.com\/ryanaraine\/status\/1324445133668974592\" target=\"_blank\" rel=\"nofollow noopener\">not to need Emojis to install the patches<\/a>.<\/p>\n<p><strong>Don\u2019t ever click on links received in messages.<\/strong> This is simple advice yet effective. Not all Pegasus customers can afford to buy zero-click 0-day chains at a cost of millions so they rely on 1-click exploits. These arrive in the form of a message, sometimes by SMS, but can also be via other messengers or even e-mail. If you receive an interesting SMS (or by any other messenger) with a link, open it on a desktop computer, preferably using TOR Browser, or better yet using a secure non-persistent OS such as Tails.<\/p>\n<div id=\"attachment_43462\" style=\"width: 756px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140721\/how-to-protect-from-pegasus-spyware-malicious-sms.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-43462\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140721\/how-to-protect-from-pegasus-spyware-malicious-sms.png\" alt=\"SMS with a malicious link used to target a political activist\" width=\"746\" height=\"568\" class=\"size-full wp-image-43462\"><\/a><p id=\"caption-attachment-43462\" class=\"wp-caption-text\">SMS with a malicious link used to target a political activist. Source: <a href=\"https:\/\/citizenlab.ca\/2018\/10\/the-kingdom-came-to-canada-how-saudi-linked-digital-espionage-reached-canadian-soil\/\" target=\"_blank\" rel=\"noopener nofollow\">Citizen Lab<\/a><\/p><\/div>\n<p><strong>Browse the Internet with an alternate browser such as Firefox Focus instead of Safari or Chrome.<\/strong> Despite the fact that all browsers on iOS pretty much use the same engine, Webkit, some exploits do not work well (see <a href=\"https:\/\/securelist.com\/ios-exploit-chain-deploys-lightspy-malware\/96407\/\" target=\"_blank\" rel=\"nofollow noopener\">LightRighter \/ TwoSailJunk APT case<\/a>) on some alternate browsers:<\/p>\n<div id=\"attachment_43461\" style=\"width: 2058px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140712\/how-to-protect-from-pegasus-spyware-lightriver-exploit.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-43461\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140712\/how-to-protect-from-pegasus-spyware-lightriver-exploit.png\" alt=\"LightRiver exploit kit check for \" safari in the user agent string width=\"2048\" height=\"743\" class=\"size-full wp-image-43461\"><\/a><p id=\"caption-attachment-43461\" class=\"wp-caption-text\">LightRiver exploit kit check for \u201cSafari\u201d in the user agent string<\/p><\/div>\n<p>User agent strings on iOS from Safari, Chrome and Firefox Focus browsers:<\/p>\n<ul>\n<li><strong>Safari:<\/strong> Mozilla\/5.0 (iPhone; CPU iPhone OS 15_1 like Mac OS X) AppleWebKit\/605.1.15 (KHTML, like Gecko) Version\/15.1 Mobile\/15E148 <strong style=\"color: red;\">Safari<\/strong>\/604.1<\/li>\n<li><strong>Chrome:<\/strong> Mozilla\/5.0 (iPhone; CPU iPhone OS 15_1 like Mac OS X) AppleWebKit\/605.1.15 (KHTML, like Gecko) CriOS\/96.0.4664.53 Mobile\/15E148 <strong style=\"color: red;\">Safari<\/strong>\/604.1<\/li>\n<li><strong>Firefox Focus:<\/strong> Mozilla\/5.0 (iPhone; CPU iPhone OS 15_1 like Mac OS X) AppleWebKit\/605.1.15 (KHTML, like Gecko) FxiOS\/39 Mobile\/15E148 Version\/15.0<\/li>\n<\/ul>\n<p><strong>Always use a VPN that masks your traffic.<\/strong> Some exploits are delivered through GSM operator MitM attacks, when browsing HTTP sites or by DNS hijack. Using a VPN to mask the traffic makes it difficult for your GSM operator to target you directly over the Internet. It also complicates the targeting process if the attackers have control over your data stream, such as while in roaming. Please note that not all VPNs are the same and not any VPN is fine to use. Without favoring any specific VPN provider, here\u2019s a few things to consider when you shop for a VPN subscription with anonymity being a top priority:<\/p>\n<ul>\n<li>Purchase means just that \u2014 <strong>no \u201cfree\u201d VPNs.<\/strong><\/li>\n<li>Look for services that you can <strong>accept payment with cryptocurrencies.<\/strong><\/li>\n<li>Look for services that <strong>do not require you to provide any registration info.<\/strong><\/li>\n<li>Try to avoid VPN apps \u2014 instead, use open-source tools such as OpenVPN, WireGuard and VPN profiles.<\/li>\n<li>Avoid new VPN services and look for established services that have been around for some time.<\/li>\n<\/ul>\n<p><strong>Install a security application that checks and warns if the device is jailbroken.<\/strong> Frustrated from getting kicked over and over, the attackers will eventually deploy a persistence mechanism and jailbreak your device in the process. This is where the chance of catching them increases tenfold and we can take advantage of the fact that the device is jailbroken.<\/p>\n<p><strong>Make iTunes backups once per month.<\/strong> this allows diagnosing and finding infections later, through the use of the <a href=\"https:\/\/github.com\/mvt-project\/mvt\" target=\"_blank\" rel=\"nofollow noopener\">wonderful MVT package from Amnesty International<\/a> (more on that later).<\/p>\n<p><strong>Trigger sysdiags often and save them to external backups.<\/strong> Forensics artifacts can help you determine at a later time if you have been targeted. Triggering a sysdiag depends on the phone model \u2014 for instance, on some iPhone\u2019s, this is done by pressing <em>Volume Up + Volume Down + Power<\/em> at the same time. You may need to play with this a couple of times, until the phone buzzes. Once the sysdiag is created, it will appear in diagnostics:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140701\/how-to-protect-from-pegasus-spyware-ios-sysdiagnoses.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140701\/how-to-protect-from-pegasus-spyware-ios-sysdiagnoses.png\" alt=\"Sysdiagnoses in iOS' Analytics &amp; Improvements\" width=\"2100\" height=\"1200\" class=\"aligncenter size-full wp-image-43460\"><\/a><\/p>\n<h3>How to protect from advanced spyware on Android<\/h3>\n<p>A similar list for Android users (for details and reasoning check the list for iOS above):<\/p>\n<ul>\n<li><strong>Reboot daily.<\/strong> Persistence on the latest Android versions is difficult, many APTs and exploit sellers avoid persistence whatsoever!<\/li>\n<li><strong>Keep phone up to date; install latest patches.<\/strong><\/li>\n<li><strong>Don\u2019t ever click on links received in text messages.<\/strong><\/li>\n<li><strong>Browse the internet with an alternate browser such as Firefox Focus<\/strong> instead of the default Chrome.<\/li>\n<li><strong>Always use a VPN that masks your traffic.<\/strong> Some exploits are delivered through GSM operator MitM attacks, when browsing HTTP sites or by DNS hijack.<\/li>\n<li><strong>Install a <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">security suite<\/a> that scans for malware and checks and warns if the device is rooted.<\/strong><\/li>\n<\/ul>\n<p>At a more sophisticated level \u2014 both for iOS and Android \u2014 always check your network traffic using live IoCs. A good setup might include a Wireguard always-on VPN to a server under your control, that uses <a href=\"https:\/\/pi-hole.net\" target=\"_blank\" rel=\"nofollow noopener\">pihole<\/a> to filter out bad stuff and logs all the traffic for further inspection.<\/p>\n<h2>How to get by without iMessage<\/h2>\n<p>I was talking to my friend Ryan Naraine recently, and he said \u2014 <em>\u201ciMessage and FaceTime \u2014 these are <strong>the<\/strong> reasons why people use iPhones!\u201d<\/em> and for sure, he\u2019s right. I\u2019ve myself been an iPhone user since 2008 and think iMessage and FaceTime were two of the greatest things Apple added to this ecosystem. When I realized that these are also some of the most exploited features that let nation states spy on your phone, I tried to escape the iMessage <a href=\"https:\/\/www.youtube.com\/watch?v=FVsbvFkhzY4\" target=\"_blank\" rel=\"nofollow noopener\">Hotel California<\/a>. The hardest thing? Getting the family to stop using it too. Surprising as it may sound, this was one of the most difficult things in this whole security saga.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140652\/how-to-protect-from-pegasus-spyware-imessage-disabled.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/01\/25140652\/how-to-protect-from-pegasus-spyware-imessage-disabled.png\" alt=\"Life without iMessage is green and emoji-less\" width=\"1125\" height=\"1086\" class=\"aligncenter size-full wp-image-43459\"><\/a><\/p>\n<p>At first, I tried to switch everyone to <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/38444\/\" target=\"_blank\" rel=\"noopener nofollow\">Telegram<\/a>. This didn\u2019t go too well. Then, Signal got better and better, implemented Video calls and group calling. In time, more and more friends started moving to <a href=\"https:\/\/www.kaspersky.com\/blog\/signal-privacy-security\/40377\/\" target=\"_blank\" rel=\"noopener nofollow\">Signal<\/a>. And this worked well with my family too. I\u2019m not saying you should do the same. Perhaps you can keep iMessage enabled and live happily and malware free \u2014 truth be told, Apple <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/01\/a-look-at-imessage-in-ios-14.html\" target=\"_blank\" rel=\"nofollow noopener\">greatly improved<\/a> the security sandbox around iMessage with BlastDoor in iOS 14. Nevertheless, the FORCEDENTRY exploit used by NSO to deliver Pegasus <a href=\"https:\/\/citizenlab.ca\/2021\/09\/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild\/\" target=\"_blank\" rel=\"nofollow noopener\">bypassed BlastDoor<\/a> and of course, no security feature is ever 100% hack-proof.<\/p>\n<p>So, what is the best of both worlds, you may ask? Some people, including myself, have several phones \u2014 one where iMessage is disabled, and a \u201choneypot\u201d iPhone where iMessage is enabled. Both are nicely associated with the same Apple ID and phone number. If someone decides to target me this way, there\u2019s a good chance they will end up in the honeypot phone.<\/p>\n<h2>How to detect Pegasus and other advanced mobile malware<\/h2>\n<p>Detecting infection traces from Pegasus and other advanced mobile malware is very tricky, and complicated by the security features of modern operating systems such as iOS and Android. Based on our observations, this is further complicated by the deployment of non-persistent malware, which leaves almost no traces after reboot. Since many forensics frameworks require a device jailbreak, which in turn requires a reboot, this results in the malware being removed from memory during the reboot.<\/p>\n<p>Currently, several methods can be used for detection of Pegasus and other mobile malware. <a href=\"https:\/\/github.com\/mvt-project\/mvt\" target=\"_blank\" rel=\"nofollow noopener\">MVT (Mobile Verification Toolkit)<\/a> from Amnesty International is free, open source and allows technologists and investigators to inspect mobile phones for signs of infection. MVT is further boosted by a list of IoCs (indicators of compromise) collected from high profile cases and made available by Amnesty International.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/1p0Xm-Opzjg?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h2>What to do if you got infected with Pegasus<\/h2>\n<p>So you followed all these recommendations carefully and still got infected. Sadly, this is the reality we live in nowadays. I feel for you, really. You may not be a bad guy at all \u2014 on the contrary, I\u2019m sure you\u2019re one of the good guys. Perhaps you spoke against powerful people, or participated in some protests against a questionable decision from certain political figures, or simply used encryption software or been in the wrong place at the wrong time. Look on the bright side \u2014 you <em>know<\/em> you\u2019ve been infected, because artifacts and knowledge allowed you to determine that. Think of the following things:<\/p>\n<ul>\n<li><strong>Who targeted you and why?<\/strong> Try to figure out what it was that brought you into the attention of the big guys. Is this something that you can avoid in the future through more stealthy behavior?<\/li>\n<li><strong>Can you speak about it?<\/strong> The thing that eventually brought down many surveillance companies was bad publicity. Reporters and journalists writing about abuses and exposing the lies, wrongdoing and all the evil. If you\u2019ve been targeted try to find a journalist and tell them your story.<\/li>\n<li><strong>Change your device<\/strong> \u2014 if you were on iOS, try moving to Android for a while. If you were on Android, move to iOS. This might confuse attackers for some time; for instance, some threat actors are known to have purchased exploitation systems that only work on a certain brand of phone and OS.<\/li>\n<li><strong>Get a secondary device, preferably running GrapheneOS,<\/strong> for secure comms. Use a prepaid card in it, or, only connect by Wi-Fi and TOR while in airplane mode.<\/li>\n<li><strong>Avoid messengers where you need to provide your contacts with your phone number.<\/strong> Once an attacker has your phone number they can easily target you across many different messengers via this \u2014 iMessage, WhatsApp, Signal, Telegram, they are all tied to your phone number. An interesting new choice here is Session, which automatically routes your messages through an Onion-style network and doesn\u2019t rely on phone numbers.<\/li>\n<li>Try to <strong><a href=\"https:\/\/twitter.com\/craiu\" target=\"_blank\" rel=\"nofollow noopener\">get in touch<\/a> with a security researcher<\/strong> in your area and constantly discuss best practices. Share artifacts, suspicious messages or logs whenever you think something is odd. Security is never a single snapshot solution that is 100% proof; think of it like a stream that flows and you need to adjust your sailing depending on the speed, currents and obstacles.<\/li>\n<\/ul>\n<p>At the end of this, I\u2019d like to leave you with a thought. If you get targeted by nation states, that means <strong>you are important<\/strong>. Remember: it\u2019s nice to be important, but it\u2019s more important to be nice. Alone, we are weak, together, we are strong. The world may be broken, but I believe we are living at a time when we can still change things. According to a <a href=\"https:\/\/edition.cnn.com\/2021\/12\/09\/media\/journalists-imprisoned-cpj-census\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">report from the nonprofit group Committee to Protect Journalists<\/a>, 293 journalists were imprisoned in 2021, the highest number CPJ has ever reported since it started tracking it, in 1992. It\u2019s up to us to shape how the world will look like for us in 10 years, for our children and our children\u2019s children.<\/p>\n<p><em>You, the people have the power \u2014 the power to create machines. The power to create happiness! You, the people, have the power to make this life free and beautiful, to make this life a wonderful adventure.<\/em><\/p>\n<p><em>Then \u2014 in the name of democracy \u2014 let us use that power \u2014 let us all unite. Let us fight for a new world \u2014 a decent world that will give men a chance to work \u2014 that will give youth a future and old age a security. By the promise of these things, brutes have risen to power. But they lie! They do not fulfil that promise. They never will!<\/em><\/p>\n<p><em>Dictators free themselves but they enslave the people! Now let us fight to fulfil that promise! Let us fight to free the world \u2014 to do away with national barriers \u2014 to do away with greed, with hate and intolerance. Let us fight for a world of reason, a world where science and progress will lead to all men\u2019s happiness. Soldiers! in the name of democracy, let us all unite!<\/em><\/p>\n<p style=\"text-align: right;\"><em>Final speech from The Great Dictator<\/em><\/p>\n<p>This post originally ran as a series of op-eds in Dark Reading (<a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts\" target=\"_blank\" rel=\"nofollow noopener\">part 1<\/a>, <a href=\"https:\/\/www.darkreading.com\/edge-articles\/fighting-back-against-pegasus-other-advanced-mobile-malware\" target=\"_blank\" rel=\"nofollow noopener\">part 2<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.<\/p>\n","protected":false},"author":378,"featured_media":43458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[1343,105,499,1718,605,1250,423,1991,714],"class_list":{"0":"post-43453","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-0days","9":"tag-android","10":"tag-apt","11":"tag-costin-raiu","12":"tag-great","13":"tag-ios","14":"tag-mobile-devices","15":"tag-pegasus","16":"tag-spyware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-from-pegasus-spyware\/23861\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/19358\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/26103\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-protect-from-pegasus-spyware\/24071\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/23841\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-protect-from-pegasus-spyware\/26812\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-protect-from-pegasus-spyware\/26405\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-protect-from-pegasus-spyware\/32942\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-from-pegasus-spyware\/10492\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-protect-from-pegasus-spyware\/18515\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-protect-from-pegasus-spyware\/18973\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/how-to-protect-from-pegasus-spyware\/15741\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-protect-from-pegasus-spyware\/28055\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-to-protect-from-pegasus-spyware\/32437\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-protect-from-pegasus-spyware\/28069\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-protect-from-pegasus-spyware\/24866\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-from-pegasus-spyware\/30207\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-protect-from-pegasus-spyware\/29996\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/spyware\/","name":"spyware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/378"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=43453"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43453\/revisions"}],"predecessor-version":[{"id":43530,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43453\/revisions\/43530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/43458"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=43453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=43453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}