Friday, February 21, 2025
Homecyber securityPegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

Published on

SIEM as a Service

Follow Us on Google News

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a stark pivot from targeting journalists and activists to infiltrating the private sector.

In December 2024, mobile security firm iVerify detected 11 new Pegasus infections among 18,000 scanned devices—a 1.5 per 1,000 incidence rate—exposing finance, real estate, and logistics executives to unprecedented surveillance risks.

These findings underscore a systemic shift in cyber-espionage tactics, leveraging zero-click exploits and advanced persistence mechanisms to compromise high-value corporate targets.

Pegasus’s Technical Evolution and Corporate Targeting

Developed by Israel’s NSO Group, Pegasus employs zero-click infiltration methods, exploiting vulnerabilities in iMessage, WhatsApp, and other apps to gain root access without user interaction.

Once installed, it exfiltrates emails, encrypted messages, and sensitive documents while activating microphones and cameras for real-time monitoring.

Recent variants exhibit multi-year persistence, evidenced by forensic artifacts in iOS sys diagnose archives and Android crash logs.

The spyware’s expanded targeting aligns with its ability to bypass traditional defenses.

iVerify’s December 2024 scans revealed infections dating to 2021, including iOS 15–17 devices and Android 12–14.

Unlike conventional malware, Pegasus avoids detection by encrypting payloads in memory and using ephemeral C2 servers, leaving minimal traces outside specialized forensic tools.

Detection Breakthroughs: From Shutdown Logs to Machine Learning

Kaspersky’s GReAT team pioneered a lightweight detection method analyzing iOS shutdown logs (Shutdown.log), which record reboot anomalies caused by Pegasus’s “sticky” processes.

Open-source tools like iShutdown.py parse these logs to identify path irregularities (e.g., /private/var/db/) linked to NSO Group’s frameworks.

Concurrently, Amnesty International’s Mobile Verification Toolkit (MVT) cross-references device backups with known Pegasus Indicators of Compromise (IOCs), such as domain names and process hashes.

iVerify’s Mobile Threat Hunting feature combines these approaches with machine learning, scanning 18,000 devices via heuristic analysis of network traffic, memory patterns, and behavioral anomalies.

The system flagged 11 infections missed by Apple’s Threat Notifications, highlighting gaps in commercial security models.

Financial and Operational Implications

The economic fallout extends beyond data theft.

Compromised devices in merger negotiations or regulatory discussions could leak insider information, destabilizing markets.

One European logistics firm reported a 12% stock dip post-infection, though causality remains unconfirmed.

Pegasus’s operators—often state-aligned actors—exploit such intelligence to manipulate commodity prices or sabotage competitors.

Mitigation Strategies for Enterprises

  1. Lockdown Mode: Enable iOS 16+ restrictions to block zero-click vectors.
  2. Sysdiagnose Analysis: Regularly inspect Shutdown.log using iShutdown.py or MVT.
  3. Network Segmentation: Isolate executive devices from critical infrastructure using VLANs and TLS 1.3 encryption.
  4. Threat Hunting: Deploy EDR solutions with Pegasus-specific IOCs and memory-scanning capabilities.

A Call for Transparency

As Pegasus reshapes corporate risk landscapes, the cybersecurity community urges NSO Group to disclose client lists and infection patterns.

Until then, tools like iVerify and MVT remain vital for democratizing threat detection—one scan at a time.

The age of passive mobile security is over. For businesses, the question is no longer if but when Pegasus will strike—and whether their defenses can outpace an adversary that thrives in silence.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...