In recent years, commercial spyware such as NSO Group's Pegasus has targeted high-profile individuals, including journalists, politicians, and business leaders, while the general public seemed less at risk. However, a new report from security research firm iVerify indicates that spyware like Pegasus might also affect ordinary users. In May, iVerify introduced a "Mobile Threat Hunting" feature for its customers, designed to detect threats like Pegasus.


During an initial investigation involving 2,500 devices, the company reported, they “uncovered seven Pegasus infections – a number that might seem small, but represents a massive red flag in the world of mobile security.”


ALSO READ | 'Anytime, Anywhere...', Google CEO Sundar Pichai Throws An Open Challenge To Microsoft CEO For AI-Showdown


How Long Has This Been Going On For?


Interestingly, the Pegasus infections identified by iVerify were not recent. The company reports uncovering a "complex timeline of compromises" during its analysis, with some infections dating back as far as 2021 and extending into late 2023.


The study conducted by iVerify also revealed an infection rate of approximately 2.5 devices per 1,000 scans. Although the sample size may not represent iVerify’s entire user base, this rate is notably higher than previous estimates.


ALSO READ | WhatsApp Adds Bouncing Three-Dot Feature To Make Chats Feel More Interactive. Here's How It Works


iVerify explains that its Mobile Threat Hunting feature employs a mix of signature-based detection, machine learning, and heuristic analysis to identify potential infections. Paying customers have access to regular scans for added security. However, free users are limited to conducting just one scan per month.


Pegasus is a sophisticated spyware tool that enables attackers to access sensitive data such as messages, emails, photos, and call logs. Its ability to infiltrate both Android and iOS devices without user interaction and to employ advanced techniques to remain hidden makes detection challenging using conventional methods.