Thursday, May 1, 2025
Homecyber securityPegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

Published on

SIEM as a Service

Follow Us on Google News

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a stark pivot from targeting journalists and activists to infiltrating the private sector.

In December 2024, mobile security firm iVerify detected 11 new Pegasus infections among 18,000 scanned devices—a 1.5 per 1,000 incidence rate—exposing finance, real estate, and logistics executives to unprecedented surveillance risks.

These findings underscore a systemic shift in cyber-espionage tactics, leveraging zero-click exploits and advanced persistence mechanisms to compromise high-value corporate targets.

- Advertisement - Google News

Pegasus’s Technical Evolution and Corporate Targeting

Developed by Israel’s NSO Group, Pegasus employs zero-click infiltration methods, exploiting vulnerabilities in iMessage, WhatsApp, and other apps to gain root access without user interaction.

Once installed, it exfiltrates emails, encrypted messages, and sensitive documents while activating microphones and cameras for real-time monitoring.

Recent variants exhibit multi-year persistence, evidenced by forensic artifacts in iOS sys diagnose archives and Android crash logs.

The spyware’s expanded targeting aligns with its ability to bypass traditional defenses.

iVerify’s December 2024 scans revealed infections dating to 2021, including iOS 15–17 devices and Android 12–14.

Unlike conventional malware, Pegasus avoids detection by encrypting payloads in memory and using ephemeral C2 servers, leaving minimal traces outside specialized forensic tools.

Detection Breakthroughs: From Shutdown Logs to Machine Learning

Kaspersky’s GReAT team pioneered a lightweight detection method analyzing iOS shutdown logs (Shutdown.log), which record reboot anomalies caused by Pegasus’s “sticky” processes.

Open-source tools like iShutdown.py parse these logs to identify path irregularities (e.g., /private/var/db/) linked to NSO Group’s frameworks.

Concurrently, Amnesty International’s Mobile Verification Toolkit (MVT) cross-references device backups with known Pegasus Indicators of Compromise (IOCs), such as domain names and process hashes.

iVerify’s Mobile Threat Hunting feature combines these approaches with machine learning, scanning 18,000 devices via heuristic analysis of network traffic, memory patterns, and behavioral anomalies.

The system flagged 11 infections missed by Apple’s Threat Notifications, highlighting gaps in commercial security models.

Financial and Operational Implications

The economic fallout extends beyond data theft.

Compromised devices in merger negotiations or regulatory discussions could leak insider information, destabilizing markets.

One European logistics firm reported a 12% stock dip post-infection, though causality remains unconfirmed.

Pegasus’s operators—often state-aligned actors—exploit such intelligence to manipulate commodity prices or sabotage competitors.

Mitigation Strategies for Enterprises

  1. Lockdown Mode: Enable iOS 16+ restrictions to block zero-click vectors.
  2. Sysdiagnose Analysis: Regularly inspect Shutdown.log using iShutdown.py or MVT.
  3. Network Segmentation: Isolate executive devices from critical infrastructure using VLANs and TLS 1.3 encryption.
  4. Threat Hunting: Deploy EDR solutions with Pegasus-specific IOCs and memory-scanning capabilities.

A Call for Transparency

As Pegasus reshapes corporate risk landscapes, the cybersecurity community urges NSO Group to disclose client lists and infection patterns.

Until then, tools like iVerify and MVT remain vital for democratizing threat detection—one scan at a time.

The age of passive mobile security is over. For businesses, the question is no longer if but when Pegasus will strike—and whether their defenses can outpace an adversary that thrives in silence.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Latest articles

Managing Shadow IT Risks – CISO’s Practical Toolkit

Managing Shadow IT risks has become a critical challenge for Chief Information Security Officers...

Application Security in 2025 – CISO’s Priority Guide

Application security in 2025 has become a defining concern for every Chief Information Security...

Preparing for Quantum Cybersecurity Risks – CISO Insights

Quantum cybersecurity risks represent a paradigm shift in cybersecurity, demanding immediate attention from Chief...

Securing Digital Transformation – CISO’s Resource Hub

In today’s hyper-connected world, securing digital transformation is a technological upgrade and a fundamental...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender...

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own...

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code

A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered,...