Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Are there technical details about Pegasus available?

If the public could look into the installed executable, map out its internals, see the attack vector,... then some countermeasures could be developed by interested people.

Sunlight is the best disinfectant.



You can start here.

"Technical Analysis of Pegasus Spyware" [PDF]:

https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegas...


“Pegasus” is supposed to be a bundle of exploits with a dashboard. There’s no open sourcing that could help since each exploit is zero day or close to it.


Isn't the exploit only for the malware drop? The malware itself can then be analyzed even if tje exploit cant.


Yes, and from what we have seen so far the malware taking advantage of the exploits is extremely sophisticated, such as the one taking advantage of a flaw in the iPhones PDF reader which was used to bootstrap an entire custom made virtual machine used to read contents from memory.

Even if you patch one exploit and analyze the malware, there are plenty more to be found, and it seems like they develop custom made malware solutions for each one.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: