DIY Pegasus Spyware Scan

You have probably heard the news that Pegasus, the spyware created by NSO Group, is still potentially infecting targeted fully-patched Android and iOS phones. The new interest in this software comes after a list of over 50,000 phone numbers believed to have been identified as those of people of interest by clients of NSO since 2016 was leaked to several media outlets. The leak itself provides no evidence of any infection or compromise, but that shouldn't stop websites from panic-brokering in order to sell ad clicks. One of the main announcements came from The Guardian, which delivers 22 trackers to your browser if you want to read their version of the story.

I highly doubt you have Pegasus on your device, but countless people have been asking me about ways to scan for potential infection. The following could be executed on a Mac computer to check an iPhone.

Make sure you have Brew installed. If you do not, execute the following within Terminal:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

After you have Brew installed, execute the following commands within Terminal.

brew install python3
brew install python3 libusb
pip3 install mvt

You now have the MVT tool which can scan for CURRENT Pegasus infection.However, it cannot scan a mobile device directly. You must generate an iOS backup through the Finder app by connecting your device via USB, selecting the device within Finder, then choosing "Back Up Now".

Since I encrypt my device backups, I must first make a decrypted version. If you do not encrypt your backups. Skip this step. Enter the following within Terminal but do not execute.

mvt-ios decrypt-backup -p THE.PASSWORD.TO.YOUR.DEVICE.BACKUP -d ~/Desktop/decrypted/

Open Finder and navigate to your home directory, then locate Library/Application Support/MobileSync/Backup. Find the randomly generated folder in this directory and drag and drop it into Terminal at the end of your previous command. The entire command should now be similar to the following.

mvt-ios decrypt-backup -p PASSWORD -d ~/Desktop/decrypted/ /Users/YOURUSERNAME/Library/Application\ Support/MobileSync/Backup/5587346598736592834765928345932

This command will decrypt your backup and store it on your Desktop. The following command will scan this backup.

mvt-ios check-backup ~/Desktop/decrypted/ --output ~/Desktop/results/

You now have a folder on your Desktop with the results. Look through it for any files which end in "_detected.json". These COULD indicate infection, but the content would need to be scrutinized.

Android users have a bit more hassle. See the official MVT docs at https://mvt.readthedocs.io/en/latest/ios/records.html if you want to check your own system.

I highly suspect that you do not have any infection, but these steps could set your mind at ease if you believe you were targeted by this software between 2016 and today. All of my devices were clean.

The Privacy, Security, & OSINT Show – Episode 225

EPISODE 225-Lessons Learned This Week

This week I discuss the recent CTemplar data loss, Mint Mobile's breach, and another Crypto Investment attack. We can all benefit from the lessons learned during these events.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

None

UPDATES:

None

LESSONS LEARNED THIS WEEK:

CTemplar Data Loss
Mint Mobile Data Breach
AltoIRA Data Breach

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


The Privacy, Security, & OSINT Show – Episode 224

EPISODE 224-Employment Privacy & Security

This week I discuss privacy concerns surrounding employment, plus the latest news and updates.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

History of Employment Privacy

UPDATES:

Audacity

EMPLOYMENT PRIVACY & SECURITY:

Scope
Intuit/Equifax Deal
LinkedIn Scrape
Traditional Employment
Address
Phone
Credit Freeze
Resumes
Recruiters
Background checks
Photos
LinkedIn
Copies of ID
Birthday
Company Email
Company Equipment
Your Equipment
Mobile Devices
Video Collaboration
General Advice
Book

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


The Privacy, Security, & OSINT Show – Episode 223

EPISODE 223-Secure Messaging Woes (and Solutions)

This week I discuss the acquisition of Wickr by Amazon and other secure messaging issues (with my preferred solutions).

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

None

UPDATES:

https://www.inteltechniques.net/

SECURE MESSAGING WOES (AND SOLUTIONS):

Wickr Acquisition by Amazon
Choosing Secure Communications
Convincing Others to Use Secure Communications
Communications Redundancy
Unwanted Communications Contacts

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


The Privacy, Security, & OSINT Show – Episode 222

EPISODE 222-Spoiler: We all die

This week I discuss privacy issues surrounding death including last wills, living wills, trusts, asset distribution, cryptocurrency, and most importantly, helping our beneficiaries untangle our privacy webs after we die.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

tiktok.com/@murasakisweetpotatoes/video/6972710415092550918

UPDATES:

None

SPOILER: WE ALL DIE:

Last Will
Living Trust
Property Trust
Individual Instructions/Notes
Living Will
Final Arrangements

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J